WO2023051235A1 - 一种威胁情报大数据共享方法及系统 - Google Patents

一种威胁情报大数据共享方法及系统 Download PDF

Info

Publication number
WO2023051235A1
WO2023051235A1 PCT/CN2022/118573 CN2022118573W WO2023051235A1 WO 2023051235 A1 WO2023051235 A1 WO 2023051235A1 CN 2022118573 W CN2022118573 W CN 2022118573W WO 2023051235 A1 WO2023051235 A1 WO 2023051235A1
Authority
WO
WIPO (PCT)
Prior art keywords
dbs
data
sharing
homology
tables
Prior art date
Application number
PCT/CN2022/118573
Other languages
English (en)
French (fr)
Inventor
张鹏
伍军
谢礼炮
尹方平
朱志华
黎婷婷
Original Assignee
广东机电职业技术学院
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 广东机电职业技术学院 filed Critical 广东机电职业技术学院
Publication of WO2023051235A1 publication Critical patent/WO2023051235A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Definitions

  • the disclosure belongs to the technical field of data security, and specifically relates to a threat intelligence big data sharing method and system.
  • threat intelligence big data is an exclusive and encrypted Structured database information data.
  • the large-scale generation and large-scale storage of threat intelligence big data are more complex than ever, and new information security issues continue to emerge in the process of sharing and transmitting intelligence big data.
  • a big data security sharing method and device are provided. Although cross-system and cross-platform data sharing can be carried out to realize cross-system data sharing between different platforms, it still cannot effectively process each table in the database. exclusive rights assignment.
  • the purpose of the present invention is to propose a threat intelligence big data sharing method and system to solve one or more technical problems existing in the prior art, and at least provide a beneficial option or create conditions.
  • This disclosure provides a method and system for sharing threat intelligence big data.
  • obtaining intelligence big data from server clusters calculating the degree of homology of each table to construct a data tree, and using the data tree to allocate the sharing authority of each table, and then according to the sharing Permissions determine the order of access.
  • a method for sharing threat intelligence big data includes the following steps:
  • S500 determines the access sequence according to the sharing authority.
  • the method of acquiring big intelligence data from the server cluster, where the big intelligence data is a plurality of tables, and the tables are objects used to store data in the database is as follows: acquiring big intelligence data from the server cluster, so The intelligence big data is a plurality of tables, that is, the intelligence big data is a collection of multiple tables and is recorded as Dbs.
  • the tables are objects used to store data in the database, and the data in the tables are divided into rows and columns.
  • the format organization arrangement wherein, one line of the table is one record, the serial number of each record in the table is the serial number of the row where it is located, and each column of the table has the serial number of the column in the table and the column name of the column, said
  • the column name is a string
  • the element that determines a certain column in a certain row of the table is called a data field of the table.
  • the data field is a string
  • the data field has the serial number of the row where it is located and the column name of the column where it is located.
  • the table can obtain the modification time of the table by reading its records in the server cluster; let n represent the number of elements in the collection Dbs, and represent the serial number of the elements in the collection Dbs with variable i, i ⁇ [1,n] , record the element with the serial number i in the set Dbs as table Dbs_i; the number of rows in the element table Dbs_i with the serial number i in the set Dbs is row_i, the number of columns in the element table Dbs_i with the serial number i in the set Dbs is col_i, and the variable k represents the serial number of the row in any table in the set Dbs and there is k ⁇ [1, row_i] in the table Dbs_i where it is located, and the row whose serial number is k in the table Dbs_i is denoted as Dbs(k,), with the variable q represents the serial number of the column in any table in the set Dbs and there is q ⁇ [1,col_i
  • the method for calculating the degree of homology between the tables is: define the degree of homology as the degree of coincidence between the data contained in the two tables, and write the function equals() to judge whether the two character strings For the same function, if the two strings are the same, the function equals() will output a value of 1, otherwise it will output a value of 0. Take any two serial numbers from [1,n] and record them as a and b to obtain the table Dbs_a and table Dbs_b.
  • the function Lap() is a function to calculate the degree of homology between two tables. The calculation process of the function Lap() is as follows:
  • variable b (ra) represents the overlapping degree of each row of Dbs_a (ra,) and Dbs_b;
  • Dbs_a(ra,ca)_col indicates the column name of the column where Dbs_a(ra,ca) is located
  • Dbs_b(rb,cb)_col indicates the column name of the column where Dbs_b(rb,cb) is located
  • the calculation process of inputting Dbs_a(ra,ca) and Dbs_b(rb,cb) into the function Comp() is: if Dbs_a(ra, ca)_col is equal to Dbs_b(rb,cb)_col, the function outputs the calculation result of equals(Dbs_a(ra,ca),Dbs_b(rb,cb)), if Dbs_a(ra,ca)_col is equal to Dbs_b(rb,cb) If _col is not equal
  • the array elist is the value of each dimension in the array elist, indicating the homology degree of each row in Dbs_a corresponding to the table Dbs_b, and the arithmetic mean of the values of each dimension in the array elist represents the homology degree of Dbs_a corresponding to the table Dbs_b, and el is the function Lap() calculates the result of homology between two tables.
  • the method of constructing the data tree according to the degree of homology of each table is as follows: the data tree is a data structure composed of each table in Dbs as a node, and records the modification time of table Dbs_i whose sequence number is i in Dbs is t(i), by comparing the order of modification time of each table in Dbs, the sequence number of the table with the earliest modification time in Dbs is recorded as al, then the table with the earliest modification time in Dbs is recorded as Dbs_al; by The function Lap() calculates the different homology degrees between each table in Dbs except Dbs_al and Dbs_al respectively, and sets the set of different homology degrees between each table in Dbs except Dbs_al and Dbs_al with the serial number al of Dbs_al In order to mark it as the alth complement set, the homology degree of each element in the alth complement set and Dbs_al is calculated respectively through the function Lap(), and the
  • the method of distributing the sharing rights of each table in the data tree is as follows: select any node in the data tree and record it as the table Dbs_bt, and the sharing rights are for one table in the data tree to modify another table Permissions, which define the number of tables that can be modified for a table in the data tree is the number of permissions for the table, that is, the number of permissions is the number of tables that have sharing permissions for a table.
  • the steps for judging and assigning the sharing permissions of each table are:
  • S4041 assign the sharing authority of all the nodes in the data tree to Dbs_bt, and obtain the number of tables that Dbs_bt has the sharing authority as its authority number; go to S405;
  • the method of determining the access order is: sort each node according to the numerical value of the authority number of each node in the data tree from large to small , the ordered sequence of each node in the data tree obtained by sorting is the access order sequence, and the order of accessing each node is determined by the access order sequence.
  • the access refers to the operation of querying the table using a structured query language. According to the access A sequence of sequential queries and prints the individual tables on the output device.
  • the present disclosure also provides a threat intelligence big data sharing system
  • the threat intelligence big data sharing system includes: a processor, a memory, and a computer program stored in the memory and operable on the processor, When the processor executes the computer program, the steps in the threat intelligence big data sharing method are implemented, and the threat intelligence big data sharing system can run on desktop computers, notebooks, palmtop computers and cloud data
  • the operable system may include, but not limited to, a processor, a memory, and a server cluster, and the processor executes the computer program to run in the following system units:
  • the intelligence big data acquisition unit is used to acquire intelligence big data from the server cluster
  • Homology calculation unit used to calculate the homology between tables
  • the data tree construction unit is used to construct the data tree according to the homology degree of each table
  • a shared authority allocation unit used for allocating the shared authority of each table in a data tree
  • the sequential access unit is used to determine the access sequence according to the sharing authority.
  • the present disclosure provides a threat intelligence big data sharing method and system, by obtaining intelligence big data from server clusters, calculating the degree of homology of each table to construct a data tree, and using the data tree to allocate each table shared authority, and then determine the access order according to the shared authority, and realize the beneficial effect of effectively processing the exclusive authority allocation of each table in the database.
  • Fig. 1 is a flowchart of a threat intelligence big data sharing method
  • Figure 2 shows a system structure diagram of a threat intelligence big data sharing system.
  • FIG. 1 is a flow chart of a threat intelligence big data sharing method according to the present invention, and a threat intelligence big data sharing method and system according to an embodiment of the present invention will be described below in conjunction with FIG. 1 .
  • the present disclosure proposes a method for sharing threat intelligence big data, and the method specifically includes the following steps:
  • S500 determines the access sequence according to the sharing authority.
  • the method of acquiring big intelligence data from the server cluster, where the big intelligence data is a plurality of tables, and the tables are objects used to store data in the database is as follows: acquiring big intelligence data from the server cluster, so The intelligence big data is a plurality of tables, that is, the intelligence big data is a collection of multiple tables and is recorded as Dbs.
  • the tables are objects used to store data in the database, and the data in the tables are divided into rows and columns.
  • the format organization arrangement wherein, one line of the table is one record, the serial number of each record in the table is the serial number of the row where it is located, and each column of the table has the serial number of the column in the table and the column name of the column, said
  • the column name is a string
  • the element that determines a certain column in a certain row of the table is called a data field of the table.
  • the data field is a string
  • the data field has the serial number of the row where it is located and the column name of the column where it is located.
  • the table can obtain the modification time of the table by reading its records in the server cluster; let n represent the number of elements in the collection Dbs, and represent the serial number of the elements in the collection Dbs with variable i, i ⁇ [1,n] , record the element with the serial number i in the set Dbs as table Dbs_i; the number of rows in the element table Dbs_i with the serial number i in the set Dbs is row_i, the number of columns in the element table Dbs_i with the serial number i in the set Dbs is col_i, and the variable k represents the serial number of the row in any table in the set Dbs and there is k ⁇ [1, row_i] in the table Dbs_i where it is located, and the row whose serial number is k in the table Dbs_i is denoted as Dbs(k,), with the variable q represents the serial number of the column in any table in the set Dbs and there is q ⁇ [1,col_i
  • the method for calculating the degree of homology between the tables is: define the degree of homology as the degree of coincidence between the data contained in the two tables, and write the function equals() to judge whether the two character strings For the same function, if the two strings are the same, the function equals() will output a value of 1, otherwise it will output a value of 0. Take any two serial numbers from [1,n] and record them as a and b to obtain the table Dbs_a and table Dbs_b.
  • the function Lap() is a function to calculate the degree of homology between two tables. The calculation process of the function Lap() is as follows:
  • Dbs_a(ra,ca)_col indicates the column name of the column where Dbs_a(ra,ca) is located
  • Dbs_b(rb,cb)_col indicates the column name of the column where Dbs_b(rb,cb) is located
  • the calculation process of inputting Dbs_a(ra,ca) and Dbs_b(rb,cb) into the function Comp() is: if Dbs_a(ra, ca)_col is equal to Dbs_b(rb,cb)_col, the function outputs the calculation result of equals(Dbs_a(ra,ca),Dbs_b(rb,cb)), if Dbs_a(ra,ca)_col is equal to Dbs_b(rb,cb) If _col is not equal
  • the array elist is the value of each dimension in the array elist, indicating the homology degree of each row in Dbs_a corresponding to the table Dbs_b, and the arithmetic mean of the values of each dimension in the array elist represents the homology degree of Dbs_a corresponding to the table Dbs_b, and el is the function Lap() calculates the result of homology between two tables.
  • the method of constructing the data tree according to the degree of homology of each table is as follows: the data tree is a data structure composed of each table in Dbs as a node, and records the modification time of table Dbs_i whose sequence number is i in Dbs is t(i), by comparing the order of modification time of each table in Dbs, the sequence number of the table with the earliest modification time in Dbs is recorded as al, then the table with the earliest modification time in Dbs is recorded as Dbs_al; by The function Lap() calculates the different homology degrees between each table in Dbs except Dbs_al and Dbs_al respectively, and sets the set of different homology degrees between each table in Dbs except Dbs_al and Dbs_al with the serial number al of Dbs_al In order to mark it as the alth complement set, the homology degree of each element in the alth complement set and Dbs_al is calculated respectively through the function Lap(), and the
  • the method of distributing the sharing rights of each table in the data tree is as follows: select any node in the data tree and record it as the table Dbs_bt, and the sharing rights are for one table in the data tree to modify another table Permissions, which define the number of tables that can be modified for a table in the data tree is the number of permissions for the table, that is, the number of permissions is the number of tables that have sharing permissions for a table.
  • the steps for judging and assigning the sharing permissions of each table are:
  • S4041 assign the sharing authority of all the nodes in the data tree to Dbs_bt, and obtain the number of tables that Dbs_bt has the sharing authority as its authority number; go to S405;
  • the key part of the Python implementation code of the step of judging and assigning the sharing authority of each table may include:
  • the method of determining the access order is: sort each node according to the numerical value of the authority number of each node in the data tree from large to small , the ordered sequence of each node in the data tree obtained by sorting is the access order sequence, and the order of accessing each node is determined by the access order sequence.
  • the access refers to the operation of querying the table using a structured query language. According to the access A sequence of sequential queries and prints the individual tables on the output device.
  • the threat intelligence big data sharing system includes: a processor, a memory, and a computer program stored in the memory and operable on the processor.
  • the processor executes the computer program, the above-mentioned one
  • the threat intelligence big data sharing system can run on computing devices such as desktop computers, notebooks, palmtop computers, and cloud data centers, and the operable system can include: But not limited to, processors, memory, server clusters.
  • An embodiment of the present disclosure provides a threat intelligence big data sharing system, as shown in FIG.
  • a computer program running on the processor when the processor executes the computer program, implements the steps in the above embodiment of a threat intelligence big data sharing method, the processor executes the computer program and runs on the following systems In the unit:
  • the intelligence big data acquisition unit is used to acquire intelligence big data from the server cluster
  • Homology calculation unit used to calculate the homology between tables
  • the data tree construction unit is used to construct the data tree according to the homology degree of each table
  • a shared authority allocation unit used for allocating the shared authority of each table in a data tree
  • the sequential access unit is used to determine the access sequence according to the sharing authority.
  • the threat intelligence big data sharing system can run on computing devices such as desktop computers, notebooks, palmtop computers, and cloud data centers.
  • the threat intelligence big data sharing system includes, but is not limited to, a processor and a memory.
  • a processor and a memory.
  • the above example is only an example of a threat intelligence big data sharing method and system, and does not constitute a limitation on a threat intelligence big data sharing method and system, and may include more or more A few components, or a combination of certain components, or different components, for example, the threat intelligence big data sharing system may also include input and output devices, network access devices, buses, and so on.
  • the so-called processor can be a central processing unit (Central Processing Unit, CPU), and can also be other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), on-site Programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete component gate circuits or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor can be a microprocessor or the processor can also be any conventional processor, etc., the processor is the control center of the threat intelligence big data sharing system, using various interfaces and lines to connect the entire Each sub-area of a threat intelligence big data sharing system.
  • the memory can be used to store the computer programs and/or modules, and the processor realizes the one by running or executing the computer programs and/or modules stored in the memory and calling the data stored in the memory.
  • the memory may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, at least one application program required by a function (such as a sound playback function, an image playback function, etc.) and the like; the storage data area may store Data created based on the use of the mobile phone (such as audio data, phonebook, etc.), etc.
  • the memory can include high-speed random access memory, and can also include non-volatile memory, such as hard disk, internal memory, plug-in hard disk, smart memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card , flash card (Flash Card), at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
  • non-volatile memory such as hard disk, internal memory, plug-in hard disk, smart memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card , flash card (Flash Card), at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
  • This disclosure provides a method and system for sharing threat intelligence big data.
  • obtaining intelligence big data from server clusters calculating the degree of homology of each table to construct a data tree, and using the data tree to allocate the sharing authority of each table, and then according to the sharing
  • the access order is determined by the authority, and the beneficial effect of effectively handling the exclusive authority assignment of each table in the database is realized.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

本公开提供了一种威胁情报大数据共享方法及系统,通过从服务器集群获取情报大数据,计算各个表的同源度构建数据树,并以数据树进行分配各个表的共享权限,进而按照共享权限决定访问顺序,实现了有效处理数据库中各个表的排他性权限分配的有益效果。

Description

一种威胁情报大数据共享方法及系统 技术领域
本公开属于数据安全技术领域,具体涉及一种威胁情报大数据共享方法及系统。
背景技术
现代社会的信息化和大数据的高速建设使得大数据、物联网、云计算和移动互联网等技术的应用日趋普及,在社会管理的过程中,威胁情报大数据是一种具有排他性与加密性的结构化数据库信息数据。威胁情报大数据的大量产生和大规模存储比以往更复杂的局面,在共享传输情报大数据的过程中新的信息安全问题不断涌现。在公开号CN109344941A的专利文献中提供了一种大数据安全共享方法及装置,尽管可以进行跨系统跨平台数据共享实现跨系统在不同的平台间的数据共享,但仍不能有效处理数据库中各个表的排他性权限分配。
发明内容
本发明的目的在于提出一种威胁情报大数据共享方法及系统,以解决现有技术中所存在的一个或多个技术问题,至少提供一种有益的选择或创造条件。
威胁情报大数据的大量产生和大规模存储比以往更复杂的局面,在共享传输情报大数据的过程中新的信息安全问题不断涌现,需要有效处理数据库中各个表的排他性权限分配。
本公开提供了一种威胁情报大数据共享方法及系统,通过从服务器集群获取情报大数据,计算各个表的同源度构建数据树,并以数据树进行分配各个表的共享权限,进而按照共享权限决定访问顺序。
为了实现上述目的,根据本公开的一方面,提供一种威胁情报大数据共享方法,所述方法包括以下步骤:
S100,从服务器集群获取情报大数据,所述情报大数据为多个表,所述表为数据库中用来存储数据的对象;
S200,计算表之间的同源度;
S300,根据各个表的同源度构建数据树;
S400,以数据树进行分配各个表的共享权限;
S500,按照共享权限,决定访问顺序。
进一步地,在S100中,从服务器集群获取情报大数据,所述情报大数据为多个表,所述表为数据库中用来存储数据的对象的方法为:从服务器集群获取情报大数据,所述情报大数据为多个表,即所述情报大数据为多个表组成的集合并记作Dbs,所述表为数据库中用来存储数据的对象,所述表中的数据按行和列的格式组织排列,其中,表的一行为一个记录,每一个记录在表中的序号为其所在行的序号,表的每一列有该列在表中的序号和该列的列名,所述列名为字符串,在表的确定某一行确定某一列的元素称为表的一个数据字段,所述数据字段为字符串,所述数据字段有其所在行的序号以及其所在列的列名,所述表可以通过读取其在服务器集群中的记录获取该表的修改时间;令n表示集合Dbs中元素的数量,以变量i表示集合Dbs中元素的序号,i∈[1,n],记集合Dbs中序号为i的元素为表Dbs_i;集合Dbs中序号为i的元素表Dbs_i的行的数量为row_i,集合Dbs中序号为i的元素表Dbs_i的列的数量为col_i,以变量k表示集合Dbs中任一表中的行的序号且在其所在的表Dbs_i中有k∈[1,row_i],在表Dbs_i中行的序号为k的行记作Dbs(k,),以变量q表示集合Dbs中任一表中的列的序号且在其所在的表Dbs_i中有q∈[1,col_i],在表Dbs_i中列的序号为q的列记作Dbs_i(,q),在表Dbs_i中Dbs_i(,q)的列名记作Dbs_i(,q)_col,在表Dbs_i中的在第k行第q列的数据字段记作Dbs_i(k,q),在表Dbs_i中Dbs_i(k,q)所在列的列名为Dbs_i(k,q)_col。
进一步地,在S200中,计算表之间的同源度的方法为:定义同源度为表示两个表所包含的数据之间的重合程度,记函数equals()为判断两个字符串是否相同的函数,若两个字符串相同则函数equals()输出为数值1否则输出数值0,从[1,n]中取任意两个序号记为a、b,获取表Dbs_a和表Dbs_b,令函数Lap()为计算两个表之间的同源度的函数,函数Lap()的计算过程如下:
S201,开始程序;
S202,获取表Dbs_a中的行的数量为row_a;获取表Dbs_a中的列的数量为col_a;获取表Dbs_b中的行的数量为row_b;获取表Dbs_b中的列的数量为col_b;
S203,设置变量ra,令ra的数值为1;设置变量ca,令ca的数值为1;设置变量rb,令rb的数值为1;设置变量cb,令cb的数值为1;设置空数组elist;
S204,获取Dbs_a(ra,);设置变量b(ra),以变量b(ra)表示Dbs_a(ra,)与Dbs_b的各 行的重合程度;
S2051,定义函数Comp()为根据输入的两个数据字段的列名进行判断进而计算两个数据字段是否相同的函数,Dbs_a(ra,ca)_col表示Dbs_a(ra,ca)所在列的列名,Dbs_b(rb,cb)_col表示Dbs_b(rb,cb)所在列的列名,将Dbs_a(ra,ca)和Dbs_b(rb,cb)输入函数Comp()的计算过程为:若Dbs_a(ra,ca)_col与Dbs_b(rb,cb)_col相等则函数输出equals(Dbs_a(ra,ca),Dbs_b(rb,cb))的计算结果,若Dbs_a(ra,ca)_col与Dbs_b(rb,cb)_col不相等则输出0;
S2052,进行计算变量b(ra)的数值,求得变量b(ra)的数值的计算公式如下:
Figure PCTCN2022118573-appb-000001
将b(ra)的数值加入到数组elist中;
S2053,判断数组elist中元素的数量是否大于或等于row_a的数值,若是则转到S2062,若否则转到S2061;
S2061,令ra的数值增加1,转到S204;
S2062,输出数组elist中各维度的数值的算术平均数为el;结束程序;
其中,数组elist即为数组elist中各维度的数值表示Dbs_a中各行对应表Dbs_b的同源度,数组elist中各维度的数值的算术平均数表示Dbs_a对应表Dbs_b的同源度,el即为函数Lap()进行计算两个表之间的同源度的得到的结果。
进一步地,在S300中,根据各个表的同源度构建数据树的方法为:所述数据树为以Dbs中各个表为节点构成的数据结构,记Dbs中序号为i的表Dbs_i的修改时间为t(i),通过比较Dbs中各个表的修改时间的先后顺序,将Dbs中的修改时间最先的表的序号记作al,则Dbs中的修改时间最先的表记作Dbs_al;通过函数Lap()分别计算Dbs中除Dbs_al以外的各个表与Dbs_al的各个不同的同源度,将Dbs中除Dbs_al以外的各个表与Dbs_al的各个不同的同源度组成的集合以Dbs_al的序号al为标识记作第al补集,通过函数Lap()分别计算第al补集中各元素与Dbs_al的同源度,计算第al补集中各元素与Dbs_al的同源度的算术平均值记作第al阈值,以Dbs中的各个表作为数据树的各个节点,以Dbs_al为起点节点,所述起点节点为对数据树进行遍历的第一个节点,将第al补集中同源度小于或等于第al阈值的元素作为起点节点的左边的叶子节点并记左边的叶子节点的集合为左边集合,将第al补集中同源度大于第al阈值的元素作为起点节点的右边的叶子节点并记右边的叶子节点的集合为右边集合,由起点节点和左边集合、右边集合构成数据树。
进一步地,在S400中,以数据树进行分配各个表的共享权限的方法为:选取数据树中的任意节点记作表Dbs_bt,所述共享权限为数据树中一个表对另一个表进行修改的权限,定义数据树中一个表可以进行修改的表的数量为该表的权限数,即权限数为一个表拥有共享权限的表的数量,对各个表的共享权限进行判断和分配的步骤为:
S401,获取表Dbs_bt;转到S402;
S402,判断表Dbs_bt是否为起点节点,若是则转到S4041,若否则转到S403;
S403,判断表Dbs_bt是在左边集合中还是在右边集合中,若在左边集合中则转到S4042,若在右边集合中则转到S4043;
S4041,将数据树中所有的节点的共享权限分配给Dbs_bt,并获取Dbs_bt拥有共享权限的表的数量为其权限数;转到S405;
S4042,将左边集合中的与Dbs_al的同源度小于或等于表Dbs_bt与Dbs_al的同源度的节点的共享权限分配给Dbs_bt,并获取Dbs_bt拥有共享权限的表的数量为其权限数;转到S405;
S4043,将右边集合中的与Dbs_al的同源度小于或等于表Dbs_bt与Dbs_al的同源度的节点的共享权限分配给Dbs_bt,并获取Dbs_bt拥有共享权限的表的数量为其权限数;转到S405;
S405,结束判断,得到分配给表Dbs_bt的共享权限及其权限数;
由此,根据数据树,以步骤S401至S405得到对各个表的共享权限的分配。
进一步地,在S500中,按照共享权限,决定访问顺序的方法为:以数据树中的各个节点的权限数的数值大小,对各个节点按照其权限数的数值从大到小的先后顺序进行排序,排序得到数据树中的各个节点的有序序列即为访问顺序序列,以访问顺序序列决定访问各个节点的顺序,所述访问指使用结构化查询语言对表进行查询的操作,按所述访问顺序序列的顺序查询并在输出设备打印各个表。
本公开还提供了一种威胁情报大数据共享系统,所述一种威胁情报大数据共享系统包括:处理器、存储器及存储在所述存储器中并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现所述一种威胁情报大数据共享方法中的步骤,所述一种威胁情报大数据共享系统可以运行于桌上型计算机、笔记本、掌上电脑及云端数据中心等计算设备中,可运行的系统可包括,但不仅限于,处理器、存储器、服务器集群,所述处理器执行所述计算机程序运行在以下系统的单元中:
情报大数据获取单元,用于从服务器集群获取情报大数据;
同源度计算单元,用于计算表之间的同源度;
数据树构建单元,用于根据各个表的同源度构建数据树;
共享权限分配单元,用于以数据树进行分配各个表的共享权限;
顺序访问单元,用于按照共享权限决定访问顺序。
本公开的有益效果为:本公开提供了一种威胁情报大数据共享方法及系统,通过从服务器集群获取情报大数据,计算各个表的同源度构建数据树,并以数据树进行分配各个表的共享权限,进而按照共享权限决定访问顺序,实现了有效处理数据库中各个表的排他性权限分配的有益效果。
附图说明
通过对结合附图所示出的实施方式进行详细说明,本公开的上述以及其他特征将更加明显,本公开附图中相同的参考标号表示相同或相似的元素,显而易见地,下面描述中的附图仅仅是本公开的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图,在附图中:
图1所示为一种威胁情报大数据共享方法的流程图;
图2所示为一种威胁情报大数据共享系统的系统结构图。
具体实施方式
以下将结合实施例和附图对本公开的构思、具体结构及产生的技术效果进行清楚、完整的描述,以充分地理解本公开的目的、方案和效果。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。
在本发明的描述中,若干的含义是一个或者多个,多个的含义是两个以上,大于、小于、超过等理解为不包括本数,以上、以下、以内等理解为包括本数。如果有描述到第一、第二只是用于区分技术特征为目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量或者隐含指明所指示的技术特征的先后关系。
如图1所示为根据本发明的一种威胁情报大数据共享方法的流程图,下面结合图1来阐述根据本发明的实施方式的一种威胁情报大数据共享方法及系统。
本公开提出一种威胁情报大数据共享方法,所述方法具体包括以下步骤:
S100,从服务器集群获取情报大数据,所述情报大数据为多个表,所述表为数据库中用来存储数据的对象;
S200,计算表之间的同源度;
S300,根据各个表的同源度构建数据树;
S400,以数据树进行分配各个表的共享权限;
S500,按照共享权限,决定访问顺序。
进一步地,在S100中,从服务器集群获取情报大数据,所述情报大数据为多个表,所述表为数据库中用来存储数据的对象的方法为:从服务器集群获取情报大数据,所述情报大数据为多个表,即所述情报大数据为多个表组成的集合并记作Dbs,所述表为数据库中用来存储数据的对象,所述表中的数据按行和列的格式组织排列,其中,表的一行为一个记录,每一个记录在表中的序号为其所在行的序号,表的每一列有该列在表中的序号和该列的列名,所述列名为字符串,在表的确定某一行确定某一列的元素称为表的一个数据字段,所述数据字段为字符串,所述数据字段有其所在行的序号以及其所在列的列名,所述表可以通过读取其在服务器集群中的记录获取该表的修改时间;令n表示集合Dbs中元素的数量,以变量i表示集合Dbs中元素的序号,i∈[1,n],记集合Dbs中序号为i的元素为表Dbs_i;集合Dbs中序号为i的元素表Dbs_i的行的数量为row_i,集合Dbs中序号为i的元素表Dbs_i的列的数量为col_i,以变量k表示集合Dbs中任一表中的行的序号且在其所在的表Dbs_i中有k∈[1,row_i],在表Dbs_i中行的序号为k的行记作Dbs(k,),以变量q表示集合Dbs中任一表中的列的序号且在其所在的表Dbs_i中有q∈[1,col_i],在表Dbs_i中列的序号为q的列记作Dbs_i(,q),在表Dbs_i中Dbs_i(,q)的列名记作Dbs_i(,q)_col,在表Dbs_i中的在第k行第q列的数据字段记作Dbs_i(k,q),在表Dbs_i中Dbs_i(k,q)所在列的列名为Dbs_i(k,q)_col。
进一步地,在S200中,计算表之间的同源度的方法为:定义同源度为表示两个表所包含的数据之间的重合程度,记函数equals()为判断两个字符串是否相同的函数,若两个字符串相同则函数equals()输出为数值1否则输出数值0,从[1,n]中取任意两个序号记为a、b,获取表Dbs_a和表Dbs_b,令函数Lap()为计算两个表之间的同源度的函数,函数Lap()的计算过程如下:
S201,开始程序;
S202,获取表Dbs_a中的行的数量为row_a;获取表Dbs_a中的列的数量为col_a;获取表Dbs_b中的行的数量为row_b;获取表Dbs_b中的列的数量为col_b;
S203,设置变量ra,令ra的数值为1;设置变量ca,令ca的数值为1;设置变量rb,令rb的数值为1;设置变量cb,令cb的数值为1;设置空数组elist;
S204,获取Dbs_a(ra,);设置变量b(ra),以变量b(ra)表示Dbs_a(ra,)与Dbs_b的各行的重合程度;
S2051,定义函数Comp()为根据输入的两个数据字段的列名进行判断进而计算两个数据字段是否相同的函数,Dbs_a(ra,ca)_col表示Dbs_a(ra,ca)所在列的列名,Dbs_b(rb,cb)_col表示Dbs_b(rb,cb)所在列的列名,将Dbs_a(ra,ca)和Dbs_b(rb,cb)输入函数Comp()的计算过程为:若Dbs_a(ra,ca)_col与Dbs_b(rb,cb)_col相等则函数输出equals(Dbs_a(ra,ca),Dbs_b(rb,cb))的计算结果,若Dbs_a(ra,ca)_col与Dbs_b(rb,cb)_col不相等则输出0;
S2052,进行计算变量b(ra)的数值,求得变量b(ra)的数值的计算公式如下:
Figure PCTCN2022118573-appb-000002
将b(ra)的数值加入到数组elist中;
S2053,判断数组elist中元素的数量是否大于或等于row_a的数值,若是则转到S2062,若否则转到S2061;
S2061,令ra的数值增加1,转到S204;
S2062,输出数组elist中各维度的数值的算术平均数为el;结束程序;
其中,数组elist即为数组elist中各维度的数值表示Dbs_a中各行对应表Dbs_b的同源度,数组elist中各维度的数值的算术平均数表示Dbs_a对应表Dbs_b的同源度,el即为函数Lap()进行计算两个表之间的同源度的得到的结果。
进一步地,在S300中,根据各个表的同源度构建数据树的方法为:所述数据树为以Dbs中各个表为节点构成的数据结构,记Dbs中序号为i的表Dbs_i的修改时间为t(i),通过比较Dbs中各个表的修改时间的先后顺序,将Dbs中的修改时间最先的表的序号记作al,则Dbs中的修改时间最先的表记作Dbs_al;通过函数Lap()分别计算Dbs中除Dbs_al以外的各个表与Dbs_al的各个不同的同源度,将Dbs中除Dbs_al以外的各个表与Dbs_al的各个不同的同源度组成的集合以Dbs_al的序号al为标识记作第al补集,通过函数Lap()分别计算第al补集中各元素与Dbs_al的同源度,计算第al补集中各元素与Dbs_al的同源度的算术平均值记作第al阈值,以Dbs中的各个表作为数据树的各个节点,以Dbs_al为起点节点,所述起点节点为对数据树进行遍历的第一个节点,将第al补集中同源度小于或等于第al阈值的元素作为起点节点的左边的叶子节点并记左边的叶子节点的集合为左边集合,将第al补集中同源度大于第al阈值的元素作为起点节点的右边的叶子节点并记右边的叶子节点的集合为右 边集合,由起点节点和左边集合、右边集合构成数据树。
进一步地,在S400中,以数据树进行分配各个表的共享权限的方法为:选取数据树中的任意节点记作表Dbs_bt,所述共享权限为数据树中一个表对另一个表进行修改的权限,定义数据树中一个表可以进行修改的表的数量为该表的权限数,即权限数为一个表拥有共享权限的表的数量,对各个表的共享权限进行判断和分配的步骤为:
S401,获取表Dbs_bt;转到S402;
S402,判断表Dbs_bt是否为起点节点,若是则转到S4041,若否则转到S403;
S403,判断表Dbs_bt是在左边集合中还是在右边集合中,若在左边集合中则转到S4042,若在右边集合中则转到S4043;
S4041,将数据树中所有的节点的共享权限分配给Dbs_bt,并获取Dbs_bt拥有共享权限的表的数量为其权限数;转到S405;
S4042,将左边集合中的与Dbs_al的同源度小于或等于表Dbs_bt与Dbs_al的同源度的节点的共享权限分配给Dbs_bt,并获取Dbs_bt拥有共享权限的表的数量为其权限数;转到S405;
S4043,将右边集合中的与Dbs_al的同源度小于或等于表Dbs_bt与Dbs_al的同源度的节点的共享权限分配给Dbs_bt,并获取Dbs_bt拥有共享权限的表的数量为其权限数;转到S405;
S405,结束判断,得到分配给表Dbs_bt的共享权限及其权限数;
其中,可优选地,对各个表的共享权限进行判断和分配的步骤的Python实现代码的关键部分可包括:
Figure PCTCN2022118573-appb-000003
Figure PCTCN2022118573-appb-000004
由此,根据数据树,以步骤S401至S405得到对各个表的共享权限的分配。
进一步地,在S500中,按照共享权限,决定访问顺序的方法为:以数据树中的各个节点的权限数的数值大小,对各个节点按照其权限数的数值从大到小的先后顺序进行排序,排序得到数据树中的各个节点的有序序列即为访问顺序序列,以访问顺序序列决定访问各个节点 的顺序,所述访问指使用结构化查询语言对表进行查询的操作,按所述访问顺序序列的顺序查询并在输出设备打印各个表。
所述一种威胁情报大数据共享系统包括:处理器、存储器及存储在所述存储器中并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现上述一种威胁情报大数据共享方法实施例中的步骤,所述一种威胁情报大数据共享系统可以运行于桌上型计算机、笔记本、掌上电脑及云端数据中心等计算设备中,可运行的系统可包括,但不仅限于,处理器、存储器、服务器集群。
本公开的实施例提供的一种威胁情报大数据共享系统,如图2所示,该实施例的一种威胁情报大数据共享系统包括:处理器、存储器以及存储在所述存储器中并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现上述一种威胁情报大数据共享方法实施例中的步骤,所述处理器执行所述计算机程序运行在以下系统的单元中:
情报大数据获取单元,用于从服务器集群获取情报大数据;
同源度计算单元,用于计算表之间的同源度;
数据树构建单元,用于根据各个表的同源度构建数据树;
共享权限分配单元,用于以数据树进行分配各个表的共享权限;
顺序访问单元,用于按照共享权限决定访问顺序。
所述一种威胁情报大数据共享系统可以运行于桌上型计算机、笔记本、掌上电脑及云端数据中心等计算设备中。所述一种威胁情报大数据共享系统包括,但不仅限于,处理器、存储器。本领域技术人员可以理解,所述例子仅仅是一种威胁情报大数据共享方法及系统的示例,并不构成对一种威胁情报大数据共享方法及系统的限定,可以包括比例子更多或更少的部件,或者组合某些部件,或者不同的部件,例如所述一种威胁情报大数据共享系统还可以包括输入输出设备、网络接入设备、总线等。
所称处理器可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立元器件门电路或者晶体管逻辑器件、分立硬件组件等。 通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等,所述处理器是所述一种威胁情报大数据共享系统的控制中心,利用各种接口和线路连接整个一种威胁情报大数据共享系统的各个分区域。
所述存储器可用于存储所述计算机程序和/或模块,所述处理器通过运行或执行存储在所述存储器内的计算机程序和/或模块,以及调用存储在存储器内的数据,实现所述一种威胁情报大数据共享方法及系统的各种功能。所述存储器可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器可以包括高速随机存取存储器,还可以包括非易失性存储器,例如硬盘、内存、插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)、至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
本公开提供了一种威胁情报大数据共享方法及系统,通过从服务器集群获取情报大数据,计算各个表的同源度构建数据树,并以数据树进行分配各个表的共享权限,进而按照共享权限决定访问顺序,实现了有效处理数据库中各个表的排他性权限分配的有益效果。
尽管本公开的描述已经相当详尽且特别对几个所述实施例进行了描述,但其并非旨在局限于任何这些细节或实施例或任何特殊实施例,从而有效地涵盖本公开的预定范围。此外,上文以发明人可预见的实施例对本公开进行描述,其目的是为了提供有用的描述,而那些目前尚未预见的对本公开的非实质性改动仍可代表本公开的等效改动。

Claims (7)

  1. 一种威胁情报大数据共享方法,其特征在于,所述方法包括以下步骤:
    S100,从服务器集群获取情报大数据,所述情报大数据为多个表,所述表为数据库中用来存储数据的对象;
    S200,计算表之间的同源度;
    S300,根据各个表的同源度构建数据树;
    S400,以数据树进行分配各个表的共享权限;
    S500,按照共享权限,决定访问顺序。
  2. 根据权利要求1所述的一种威胁情报大数据共享方法,其特征在于,在S100中,从服务器集群获取情报大数据,所述情报大数据为多个表,所述表为数据库中用来存储数据的对象的方法为:从服务器集群获取情报大数据,所述情报大数据为多个表,即所述情报大数据为多个表组成的集合并记作Dbs,所述表为数据库中用来存储数据的对象,所述表中的数据按行和列的格式组织排列,其中,表的一行为一个记录,每一个记录在表中的序号为其所在行的序号,表的每一列有该列在表中的序号和该列的列名,所述列名为字符串,在表的确定某一行确定某一列的元素称为表的一个数据字段,所述数据字段为字符串,所述数据字段有其所在行的序号以及其所在列的列名,所述表可以通过读取其在服务器集群中的记录获取该表的修改时间;令n表示集合Dbs中元素的数量,以变量i表示集合Dbs中元素的序号,i∈[1,n],记集合Dbs中序号为i的元素为表Dbs_i;集合Dbs中序号为i的元素表Dbs_i的行的数量为row_i,集合Dbs中序号为i的元素表Dbs_i的列的数量为col_i,以变量k表示集合Dbs中任一表中的行的序号且在其所在的表Dbs_i中有k∈[1,row_i],在表Dbs_i中行的序号为k的行记作Dbs(k,),以变量q表示集合Dbs中任一表中的列的序号且在其所在的表Dbs_i中有q∈[1,col_i],在表Dbs_i中列的序号为q的列记作Dbs_i(,q),在表Dbs_i中Dbs_i(,q)的列名记作Dbs_i(,q)_col,在表Dbs_i中的在第k行第q列的数据字段记作Dbs_i(k,q),在表Dbs_i中Dbs_i(k,q)所在列的列名为Dbs_i(k,q)_col。
  3. 根据权利要求2所述的一种威胁情报大数据共享方法,其特征在于,在S200中,计算表之间的同源度的方法为:定义同源度为表示两个表所包含的数据之间的重合程度,记函数equals()为判断两个字符串是否相同的函数,若两个字符串相同则函数equals()输出为数值1否则输出数值0,从[1,n]中取任意两个序号记为a、b,获取表Dbs_a和表Dbs_b,令函数Lap()为计算两个表之间的同源度的函数,函数Lap()的计算过程如下:
    S201,开始程序;
    S202,获取表Dbs_a中的行的数量为row_a;获取表Dbs_a中的列的数量为col_a;获取表Dbs_b中的行的数量为row_b;获取表Dbs_b中的列的数量为col_b;
    S203,设置变量ra,令ra的数值为1;设置变量ca,令ca的数值为1;设置变量rb,令rb的数值为1;设置变量cb,令cb的数值为1;设置空数组elist;
    S204,获取Dbs_a(ra,);设置变量b(ra),以变量b(ra)表示Dbs_a(ra,)与Dbs_b的各行的重合程度;
    S2051,定义函数Comp()为根据输入的两个数据字段的列名进行判断进而计算两个数据字段是否相同的函数,Dbs_a(ra,ca)_col表示Dbs_a(ra,ca)所在列的列名,Dbs_b(rb,cb)_col表示Dbs_b(rb,cb)所在列的列名,将Dbs_a(ra,ca)和Dbs_b(rb,cb)输入函数Comp()的计算过程为:若Dbs_a(ra,ca)_col与Dbs_b(rb,cb)_col相等则函数输出equals(Dbs_a(ra,ca),Dbs_b(rb,cb))的计算结果,若Dbs_a(ra,ca)_col与Dbs_b(rb,cb)_col不相等则输出0;
    S2052,进行计算变量b(ra)的数值,求得变量b(ra)的数值的计算公式如下:
    Figure PCTCN2022118573-appb-100001
    将b(ra)的数值加入到数组elist中;
    S2053,判断数组elist中元素的数量是否大于或等于row_a的数值,若是则转到S2062,若否则转到S2061;
    S2061,令ra的数值增加1,转到S204;
    S2062,输出数组elist中各维度的数值的算术平均数为el;结束程序;
    其中,数组elist即为数组elist中各维度的数值表示Dbs_a中各行对应表Dbs_b的同源度,数组elist中各维度的数值的算术平均数表示Dbs_a对应表Dbs_b的同源度,el即为函数Lap()进行计算两个表之间的同源度的得到的结果。
  4. 根据权利要求3所述的一种威胁情报大数据共享方法,其特征在于,在S300中,根据各个表的同源度构建数据树的方法为:所述数据树为以Dbs中各个表为节点构成的数据结构,记Dbs中序号为i的表Dbs_i的修改时间为t(i),通过比较Dbs中各个表的修改时间的先后顺序,将Dbs中的修改时间最先的表的序号记作al,则Dbs中的修改时间最先的表记作Dbs_al;通过函数Lap()分别计算Dbs中除Dbs_al以外的各个表与Dbs_al的各个不同的同源度,将Dbs中除Dbs_al以外的各个表与Dbs_al的各个不同的同源度组成的集合以Dbs_al的序号al为标识记作第al补集,通过函数Lap()分别计算第al补集中各元素与Dbs_al的同源度,计 算第al补集中各元素与Dbs_al的同源度的算术平均值记作第al阈值,以Dbs中的各个表作为数据树的各个节点,以Dbs_al为起点节点,所述起点节点为对数据树进行遍历的第一个节点,将第al补集中同源度小于或等于第al阈值的元素作为起点节点的左边的叶子节点并记左边的叶子节点的集合为左边集合,将第al补集中同源度大于第al阈值的元素作为起点节点的右边的叶子节点并记右边的叶子节点的集合为右边集合,由起点节点和左边集合、右边集合构成数据树。
  5. 根据权利要求4所述的一种威胁情报大数据共享方法,其特征在于,在S400中,以数据树进行分配各个表的共享权限的方法为:选取数据树中的任意节点记作表Dbs_bt,所述共享权限为数据树中一个表对另一个表进行修改的权限,定义数据树中一个表可以进行修改的表的数量为该表的权限数,即权限数为一个表拥有共享权限的表的数量,对各个表的共享权限进行判断和分配的步骤为:
    S401,获取表Dbs_bt;转到S402;
    S402,判断表Dbs_bt是否为起点节点,若是则转到S4041,若否则转到S403;
    S403,判断表Dbs_bt是在左边集合中还是在右边集合中,若在左边集合中则转到S4042,若在右边集合中则转到S4043;
    S4041,将数据树中所有的节点的共享权限分配给Dbs_bt,并获取Dbs_bt拥有共享权限的表的数量为其权限数;转到S405;
    S4042,将左边集合中的与Dbs_al的同源度小于或等于表Dbs_bt与Dbs_al的同源度的节点的共享权限分配给Dbs_bt,并获取Dbs_bt拥有共享权限的表的数量为其权限数;转到S405;
    S4043,将右边集合中的与Dbs_al的同源度小于或等于表Dbs_bt与Dbs_al的同源度的节点的共享权限分配给Dbs_bt,并获取Dbs_bt拥有共享权限的表的数量为其权限数;转到S405;
    S405,结束判断,得到分配给表Dbs_bt的共享权限及其权限数;
    由此,根据数据树,以步骤S401至S405得到对各个表的共享权限的分配。
  6. 根据权利要求5所述的一种威胁情报大数据共享方法,其特征在于,在S500中,按照共享权限,决定访问顺序的方法为:以数据树中的各个节点的权限数的数值大小,对各个节点按照其权限数的数值从大到小的先后顺序进行排序,排序得到数据树中的各个节点的有序序列即为访问顺序序列,以访问顺序序列决定访问各个节点的顺序,所述访问指使用结构化查询语言对表进行查询的操作,按所述访问顺序序列的顺序查询并在输出设备打印各个表。
  7. 一种威胁情报大数据共享系统,其特征在于,所述一种威胁情报大数据共享系统包括:处理器、存储器及存储在所述存储器中并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现权利要求1中的一种威胁情报大数据共享方法中的步骤,所述一种威胁情报大数据共享系统运行于桌上型计算机、笔记本、掌上电脑及云端数据中心的计算设备中。
PCT/CN2022/118573 2021-09-28 2022-09-14 一种威胁情报大数据共享方法及系统 WO2023051235A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111139244.4A CN113591134B (zh) 2021-09-28 2021-09-28 一种威胁情报大数据共享方法及系统
CN202111139244.4 2021-09-28

Publications (1)

Publication Number Publication Date
WO2023051235A1 true WO2023051235A1 (zh) 2023-04-06

Family

ID=78242130

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/118573 WO2023051235A1 (zh) 2021-09-28 2022-09-14 一种威胁情报大数据共享方法及系统

Country Status (2)

Country Link
CN (1) CN113591134B (zh)
WO (1) WO2023051235A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113591134B (zh) * 2021-09-28 2021-12-14 广东机电职业技术学院 一种威胁情报大数据共享方法及系统
CN114241535B (zh) * 2021-12-01 2022-09-27 佛山市红狐物联网科技有限公司 一种快速掌静脉特征提取方法及系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108600212A (zh) * 2018-04-19 2018-09-28 北京邮电大学 基于多维度可信特征的威胁情报可信性判别方法及装置
CN111935131A (zh) * 2020-08-06 2020-11-13 中国工程物理研究院计算机应用研究所 一种基于资源权限树的SaaS资源访问控制方法
US11005869B2 (en) * 2017-11-24 2021-05-11 Korea Internet & Security Agency Method for analyzing cyber threat intelligence data and apparatus thereof
CN113591134A (zh) * 2021-09-28 2021-11-02 广东机电职业技术学院 一种威胁情报大数据共享方法及系统

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11182476B2 (en) * 2016-09-07 2021-11-23 Micro Focus Llc Enhanced intelligence for a security information sharing platform
CN107391598B (zh) * 2017-06-30 2021-01-26 北京航空航天大学 一种威胁情报自动生成方法及系统
CN110999249A (zh) * 2017-08-03 2020-04-10 T移动美国公司 发现多个向量攻击的相似搜索
US11055420B2 (en) * 2018-02-05 2021-07-06 International Business Machines Corporation Controlling access to data requested from an electronic information system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11005869B2 (en) * 2017-11-24 2021-05-11 Korea Internet & Security Agency Method for analyzing cyber threat intelligence data and apparatus thereof
CN108600212A (zh) * 2018-04-19 2018-09-28 北京邮电大学 基于多维度可信特征的威胁情报可信性判别方法及装置
CN111935131A (zh) * 2020-08-06 2020-11-13 中国工程物理研究院计算机应用研究所 一种基于资源权限树的SaaS资源访问控制方法
CN113591134A (zh) * 2021-09-28 2021-11-02 广东机电职业技术学院 一种威胁情报大数据共享方法及系统

Also Published As

Publication number Publication date
CN113591134B (zh) 2021-12-14
CN113591134A (zh) 2021-11-02

Similar Documents

Publication Publication Date Title
WO2023051235A1 (zh) 一种威胁情报大数据共享方法及系统
US10789231B2 (en) Spatial indexing for distributed storage using local indexes
US8725730B2 (en) Responding to a query in a data processing system
US20190205480A1 (en) Layered graph data structure
US11075991B2 (en) Partitioning data according to relative differences indicated by a cover tree
CN104516912B (zh) 一种动态的数据存储方法及装置
JP6940239B2 (ja) データストックを匿名化するための方法およびシステム
US8386445B2 (en) Reorganizing database tables
CN113220659B (zh) 一种数据迁移的方法、系统、电子装置和存储介质
CN115129782A (zh) 一种分布式数据库的分区级连接方法和装置
TW202020756A (zh) 數據權限管控方法及系統、計算機裝置及可讀存儲介質
CN109460406B (zh) 一种数据处理方法及装置
Patgiri et al. Role of bloom filter in big data research: A survey
CN104573112A (zh) Oltp集群数据库中页面查询方法及数据处理节点
CN112925792B (zh) 数据存储控制方法、装置、计算设备及介质
US20190073195A1 (en) Computing device sort function
WO2024078122A1 (zh) 数据库表扫描的方法、装置以及设备
JP6006740B2 (ja) インデックス管理装置
CN115221174A (zh) 基于人工智能的数据分级存储方法、装置、设备及介质
CN115328950A (zh) 一种基于二级索引的hbase查询方法、终端设备及存储介质
CN113849482A (zh) 一种数据迁移方法、装置及电子设备
CN112764935A (zh) 大数据处理方法、装置、电子设备及存储介质
CN112835873A (zh) 电网调控异构系统服务化访问方法、系统、设备及介质
CN117540056B (zh) 数据查询的方法、装置、计算机设备和存储介质
CN114328755B (zh) 一种数据写入方法、数据读取方法、装置及电子设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22874622

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE