CN114928493B - 基于威胁攻击大数据的威胁情报生成方法及ai安全系统 - Google Patents
基于威胁攻击大数据的威胁情报生成方法及ai安全系统 Download PDFInfo
- Publication number
- CN114928493B CN114928493B CN202210561689.XA CN202210561689A CN114928493B CN 114928493 B CN114928493 B CN 114928493B CN 202210561689 A CN202210561689 A CN 202210561689A CN 114928493 B CN114928493 B CN 114928493B
- Authority
- CN
- China
- Prior art keywords
- threat
- attack
- activity
- knowledge graph
- communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/302—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information gathering intelligence information for situation awareness or reconnaissance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/36—Creation of semantic tools, e.g. ontology or thesauri
- G06F16/367—Ontology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/045—Combinations of networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Evolutionary Computation (AREA)
- Computer Hardware Design (AREA)
- Computational Linguistics (AREA)
- General Physics & Mathematics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Data Mining & Analysis (AREA)
- Artificial Intelligence (AREA)
- Biophysics (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Molecular Biology (AREA)
- Health & Medical Sciences (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- Technology Law (AREA)
- Animal Behavior & Ethology (AREA)
- Databases & Information Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210561689.XA CN114928493B (zh) | 2022-05-23 | 2022-05-23 | 基于威胁攻击大数据的威胁情报生成方法及ai安全系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210561689.XA CN114928493B (zh) | 2022-05-23 | 2022-05-23 | 基于威胁攻击大数据的威胁情报生成方法及ai安全系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114928493A CN114928493A (zh) | 2022-08-19 |
CN114928493B true CN114928493B (zh) | 2023-04-21 |
Family
ID=82810397
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210561689.XA Active CN114928493B (zh) | 2022-05-23 | 2022-05-23 | 基于威胁攻击大数据的威胁情报生成方法及ai安全系统 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114928493B (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115622805B (zh) * | 2022-12-06 | 2023-08-25 | 深圳慧卡科技有限公司 | 基于人工智能的安全支付防护方法及ai系统 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108259449B (zh) * | 2017-03-27 | 2020-03-06 | 新华三技术有限公司 | 一种防御apt攻击的方法和系统 |
CN113297578B (zh) * | 2021-06-25 | 2022-03-04 | 铭台(北京)科技有限公司 | 基于大数据和人工智能的信息感知方法及信息安全系统 |
CN113961923A (zh) * | 2021-10-29 | 2022-01-21 | 绿盟科技集团股份有限公司 | 一种威胁情报获取方法、装置、设备及存储介质 |
-
2022
- 2022-05-23 CN CN202210561689.XA patent/CN114928493B/zh active Active
Also Published As
Publication number | Publication date |
---|---|
CN114928493A (zh) | 2022-08-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109347801B (zh) | 一种基于多源词嵌入和知识图谱的漏洞利用风险评估方法 | |
KR20220141276A (ko) | 샌드박스 및 인공지능을 사용한 블록체인 스마트 계약 기반 디지털 자산에 대한 지속적인 취약점 관리 시스템 | |
CN110414242A (zh) | 用于检测业务逻辑漏洞的方法、装置、设备及介质 | |
CN108347430A (zh) | 基于深度学习的网络入侵检测和漏洞扫描方法及装置 | |
CN114095273A (zh) | 基于深度学习的互联网漏洞挖掘方法及大数据挖掘系统 | |
CN114422224B (zh) | 面向攻击溯源的威胁情报智能分析方法及系统 | |
CN103577514A (zh) | 用于自动数据探索的方法和装置 | |
CN115174231B (zh) | 一种基于AI Knowledge Base的网络欺诈分析方法及服务器 | |
CN114866330B (zh) | 采用ai和大数据分析的威胁攻击防护决策方法及ai系统 | |
CN115048370B (zh) | 用于大数据清洗的人工智能处理方法及大数据清洗系统 | |
CN114928493B (zh) | 基于威胁攻击大数据的威胁情报生成方法及ai安全系统 | |
CN109522221A (zh) | 一种提高模糊测试效率的方法和系统 | |
CN112016138A (zh) | 一种车联网自动化安全建模的方法、装置和电子设备 | |
CN114691665B (zh) | 基于大数据分析的采集噪声点挖掘方法及大数据采集系统 | |
CN113468520A (zh) | 应用于区块链业务的数据入侵检测方法及大数据服务器 | |
CN113722719A (zh) | 针对安全拦截大数据分析的信息生成方法及人工智能系统 | |
CN114826768A (zh) | 应用大数据和ai技术的云端漏洞处理方法及ai分析系统 | |
CN112783508B (zh) | 文件的编译方法、装置、设备以及存储介质 | |
CN114978765B (zh) | 服务于信息攻击防御的大数据处理方法及ai攻击防御系统 | |
CN114780967B (zh) | 基于大数据漏洞挖掘的挖掘评估方法及ai漏洞挖掘系统 | |
US20200127973A1 (en) | Integrated behavior-based infrastructure command validation | |
CN115964701A (zh) | 应用安全检测方法、装置、存储介质及电子设备 | |
CN111190813B (zh) | 基于自动化测试的安卓应用网络行为信息提取系统及方法 | |
CN114331349A (zh) | 一种基于物联网技术的科研项目管理方法及系统 | |
CN112653683A (zh) | 基于大数据和云计算的数据流式处理方法及云服务器 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20221107 Address after: No. 289, Chuanjin Road North Station New Village, Panlong District, Kunming, Yunnan 650000 Applicant after: Li Rui Address before: No. 608, Guannan Square, Jincheng, Guandu District, Kunming City, Yunnan Province, 650000 Applicant before: Kunming Yuanxu Network Technology Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20230209 Address after: 100084 no.cg05-030, 1st floor, building 8, yard 1, Zhongguancun East Road, Haidian District, Beijing Applicant after: ZEN KING TECHNOLOGY Co.,Ltd. Address before: No. 289, Chuanjin Road North Station New Village, Panlong District, Kunming, Yunnan 650000 Applicant before: Li Rui |
|
GR01 | Patent grant | ||
GR01 | Patent grant |