CN111931935A - 基于One-shot学习的网络安全知识抽取方法和装置 - Google Patents
基于One-shot学习的网络安全知识抽取方法和装置 Download PDFInfo
- Publication number
- CN111931935A CN111931935A CN202011028720.0A CN202011028720A CN111931935A CN 111931935 A CN111931935 A CN 111931935A CN 202011028720 A CN202011028720 A CN 202011028720A CN 111931935 A CN111931935 A CN 111931935A
- Authority
- CN
- China
- Prior art keywords
- paragraph
- knowledge
- domain
- segmentation
- threat
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000605 extraction Methods 0.000 title claims abstract description 54
- 230000011218 segmentation Effects 0.000 claims abstract description 49
- 238000000034 method Methods 0.000 claims abstract description 34
- 238000013145 classification model Methods 0.000 claims abstract description 22
- 230000007246 mechanism Effects 0.000 claims abstract description 18
- 239000013598 vector Substances 0.000 claims description 43
- 238000013527 convolutional neural network Methods 0.000 claims description 18
- 230000006870 function Effects 0.000 claims description 15
- 230000014509 gene expression Effects 0.000 claims description 15
- 238000004590 computer program Methods 0.000 claims description 14
- 239000011159 matrix material Substances 0.000 claims description 10
- 238000007781 pre-processing Methods 0.000 claims description 10
- 230000004913 activation Effects 0.000 claims description 6
- 238000013135 deep learning Methods 0.000 claims description 6
- 239000003550 marker Substances 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 6
- 230000001788 irregular Effects 0.000 claims description 5
- 238000012216 screening Methods 0.000 claims description 2
- 239000000284 extract Substances 0.000 abstract description 6
- 238000010586 diagram Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 5
- 238000004364 calculation method Methods 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000010168 coupling process Methods 0.000 description 2
- 238000005859 coupling reaction Methods 0.000 description 2
- 238000013480 data collection Methods 0.000 description 2
- 238000003058 natural language processing Methods 0.000 description 2
- 239000012466 permeate Substances 0.000 description 2
- 238000011176 pooling Methods 0.000 description 2
- 238000012706 support-vector machine Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 241000239290 Araneae Species 0.000 description 1
- 235000018821 Rhododendron arboreum Nutrition 0.000 description 1
- 244000218234 Rhododendron arboreum Species 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000005352 clarification Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000009193 crawling Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000001066 destructive effect Effects 0.000 description 1
- 238000011478 gradient descent method Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000004807 localization Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 210000005036 nerve Anatomy 0.000 description 1
- 238000003062 neural network model Methods 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001502 supplementing effect Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/02—Knowledge representation; Symbolic representation
- G06N5/022—Knowledge engineering; Knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/35—Clustering; Classification
- G06F16/353—Clustering; Classification into predefined classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/20—Natural language analysis
- G06F40/205—Parsing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/20—Natural language analysis
- G06F40/279—Recognition of textual entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/20—Natural language analysis
- G06F40/279—Recognition of textual entities
- G06F40/289—Phrasal analysis, e.g. finite state techniques or chunking
- G06F40/295—Named entity recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/02—Knowledge representation; Symbolic representation
- G06N5/022—Knowledge engineering; Knowledge acquisition
- G06N5/025—Extracting rules from data
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Artificial Intelligence (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- Evolutionary Computation (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biomedical Technology (AREA)
- Biophysics (AREA)
- Databases & Information Systems (AREA)
- Molecular Biology (AREA)
- Machine Translation (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011028720.0A CN111931935B (zh) | 2020-09-27 | 2020-09-27 | 基于One-shot 学习的网络安全知识抽取方法和装置 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011028720.0A CN111931935B (zh) | 2020-09-27 | 2020-09-27 | 基于One-shot 学习的网络安全知识抽取方法和装置 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111931935A true CN111931935A (zh) | 2020-11-13 |
CN111931935B CN111931935B (zh) | 2021-01-15 |
Family
ID=73333619
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011028720.0A Active CN111931935B (zh) | 2020-09-27 | 2020-09-27 | 基于One-shot 学习的网络安全知识抽取方法和装置 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111931935B (zh) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112926327A (zh) * | 2021-03-02 | 2021-06-08 | 首都师范大学 | 一种实体识别方法、装置、设备及存储介质 |
CN113449867A (zh) * | 2021-07-02 | 2021-09-28 | 电子科技大学 | 一种基于知识蒸馏的深度强化学习多智能体协作方法 |
CN114925856A (zh) * | 2022-05-27 | 2022-08-19 | 中国人民解放军国防科技大学 | 一种多粒度感知集成学习方法、装置、计算机设备和介质 |
CN114969316A (zh) * | 2021-02-24 | 2022-08-30 | 腾讯科技(深圳)有限公司 | 一种文本数据处理方法、装置、设备以及介质 |
CN116245178A (zh) * | 2023-05-08 | 2023-06-09 | 中国人民解放军国防科技大学 | 基于指针网络的解码器的生物医药知识抽取方法和装置 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015200308A1 (en) * | 2014-06-23 | 2015-12-30 | Niara, Inc. | Entity group behavior profiling |
WO2017069899A1 (en) * | 2015-10-22 | 2017-04-27 | Mcafee, Inc. | Advanced threat protection cross-product security controller |
CN108399194A (zh) * | 2018-01-29 | 2018-08-14 | 中国科学院信息工程研究所 | 一种网络威胁情报生成方法及系统 |
CN108829801A (zh) * | 2018-06-06 | 2018-11-16 | 大连理工大学 | 一种基于文档级别注意力机制的事件触发词抽取方法 |
CN109688105A (zh) * | 2018-11-19 | 2019-04-26 | 中国科学院信息工程研究所 | 一种威胁报警信息生成方法及系统 |
CN109857917A (zh) * | 2018-12-21 | 2019-06-07 | 中国科学院信息工程研究所 | 面向威胁情报的安全知识图谱构建方法及系统 |
CN109918505A (zh) * | 2019-02-26 | 2019-06-21 | 西安电子科技大学 | 一种基于文本处理的网络安全事件可视化方法 |
-
2020
- 2020-09-27 CN CN202011028720.0A patent/CN111931935B/zh active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015200308A1 (en) * | 2014-06-23 | 2015-12-30 | Niara, Inc. | Entity group behavior profiling |
WO2017069899A1 (en) * | 2015-10-22 | 2017-04-27 | Mcafee, Inc. | Advanced threat protection cross-product security controller |
CN108399194A (zh) * | 2018-01-29 | 2018-08-14 | 中国科学院信息工程研究所 | 一种网络威胁情报生成方法及系统 |
CN108829801A (zh) * | 2018-06-06 | 2018-11-16 | 大连理工大学 | 一种基于文档级别注意力机制的事件触发词抽取方法 |
CN109688105A (zh) * | 2018-11-19 | 2019-04-26 | 中国科学院信息工程研究所 | 一种威胁报警信息生成方法及系统 |
CN109857917A (zh) * | 2018-12-21 | 2019-06-07 | 中国科学院信息工程研究所 | 面向威胁情报的安全知识图谱构建方法及系统 |
CN109918505A (zh) * | 2019-02-26 | 2019-06-21 | 西安电子科技大学 | 一种基于文本处理的网络安全事件可视化方法 |
Non-Patent Citations (2)
Title |
---|
JUN ZHAO ET AL: "TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data", 《COMPUTERS & SECURITY》 * |
RUIYING GENG ET AL: "Induction Networks for Few-Shot Text Classification", 《ARXIV:1902.10482V2》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114969316A (zh) * | 2021-02-24 | 2022-08-30 | 腾讯科技(深圳)有限公司 | 一种文本数据处理方法、装置、设备以及介质 |
CN114969316B (zh) * | 2021-02-24 | 2024-04-26 | 腾讯科技(深圳)有限公司 | 一种文本数据处理方法、装置、设备以及介质 |
CN112926327A (zh) * | 2021-03-02 | 2021-06-08 | 首都师范大学 | 一种实体识别方法、装置、设备及存储介质 |
CN113449867A (zh) * | 2021-07-02 | 2021-09-28 | 电子科技大学 | 一种基于知识蒸馏的深度强化学习多智能体协作方法 |
CN114925856A (zh) * | 2022-05-27 | 2022-08-19 | 中国人民解放军国防科技大学 | 一种多粒度感知集成学习方法、装置、计算机设备和介质 |
CN114925856B (zh) * | 2022-05-27 | 2023-02-03 | 中国人民解放军国防科技大学 | 一种多粒度感知集成学习方法、装置、计算机设备和介质 |
CN116245178A (zh) * | 2023-05-08 | 2023-06-09 | 中国人民解放军国防科技大学 | 基于指针网络的解码器的生物医药知识抽取方法和装置 |
Also Published As
Publication number | Publication date |
---|---|
CN111931935B (zh) | 2021-01-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111931935B (zh) | 基于One-shot 学习的网络安全知识抽取方法和装置 | |
Wang et al. | PDRCNN: Precise phishing detection with recurrent convolutional neural networks | |
Uwagbole et al. | Applied machine learning predictive analytics to SQL injection attack detection and prevention | |
US20220197923A1 (en) | Apparatus and method for building big data on unstructured cyber threat information and method for analyzing unstructured cyber threat information | |
Ampel et al. | Labeling hacker exploits for proactive cyber threat intelligence: A deep transfer learning approach | |
CN112926327B (zh) | 一种实体识别方法、装置、设备及存储介质 | |
CN110191096B (zh) | 一种基于语义分析的词向量网页入侵检测方法 | |
Chai et al. | An explainable multi-modal hierarchical attention model for developing phishing threat intelligence | |
Zhang et al. | EX‐Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning | |
Yu et al. | Attention-based Bi-LSTM model for anomalous HTTP traffic detection | |
US20230075290A1 (en) | Method for linking a cve with at least one synthetic cpe | |
Nowroozi et al. | An adversarial attack analysis on malicious advertisement URL detection framework | |
Zhang et al. | Multifeature named entity recognition in information security based on adversarial learning | |
Wang et al. | Cyber threat intelligence entity extraction based on deep learning and field knowledge engineering | |
Tang et al. | Deep learning-based solution for smart contract vulnerabilities detection | |
Zhu et al. | CCBLA: a lightweight phishing detection model based on CNN, BiLSTM, and attention mechanism | |
CN113918936A (zh) | Sql注入攻击检测的方法以及装置 | |
Kim et al. | Towards attention based vulnerability discovery using source code representation | |
Du et al. | ExpSeeker: Extract public exploit code information from social media | |
CN117729003A (zh) | 基于机器学习的威胁情报可信分析系统及方法 | |
Seo et al. | Active learning for knowledge graph schema expansion | |
Li et al. | PipCKG-BS: A Method to Build Cybersecurity Knowledge Graph for Blockchain Systems via the Pipeline Approach | |
Xiao | Towards a two-phase unsupervised system for cybersecurity concepts extraction | |
CN115344563A (zh) | 数据去重方法及装置、存储介质、电子设备 | |
Elkouay et al. | Graph-based phishing detection: URLGBM model driven by machine learning |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Ding Zhaoyun Inventor after: Liu Yi Inventor after: Liu Kai Inventor after: Pan Yongqi Inventor after: Zhang Weiming Inventor after: Zhou Jun Inventor after: Huang Songping Inventor after: Zhu Xianqiang Inventor after: Tang Luohao Inventor after: Liu Bin Inventor before: Ding Zhaoyun Inventor before: Liu Yi Inventor before: Liu Kai Inventor before: Pan Yongqi Inventor before: Zhang Weiming Inventor before: Zhou Jun Inventor before: Huang Songping Inventor before: Zhu Xianqiang Inventor before: Tang Luohao Inventor before: Liu Bin |