Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quality assessment method and device for multi-source threat intelligence

A quality assessment and intelligence technology, applied in the field of Internet security, can solve the problems of lack of intelligence richness assessment, inability to judge the quality of intelligence, and inability to judge the timeliness of intelligence products, and achieve the effect of standardization.

Active Publication Date: 2021-10-08
北京微步在线科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the existing method has the following disadvantages: 1. It is impossible to judge the timeliness of intelligence products through past samples, and only timely threat intelligence has its value
2. The quantity of intelligence products cannot fully reflect the value of intelligence products, and it is impossible to judge the quality of intelligence that misses
3. There is no evaluation of intelligence richness, which can evaluate the comprehensive strength of intelligence vendors
4. There is no assessment of the differences between intelligence sources. The timeliness and differential performance of intelligence reflect whether intelligence vendors obtain intelligence through open source intelligence, and the intelligence produced by themselves

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quality assessment method and device for multi-source threat intelligence
  • Quality assessment method and device for multi-source threat intelligence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to enable those skilled in the art to better understand the technical solutions of the present invention, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0035] Threat intelligence data is a non-physical object in a special industry, and it is not convenient to evaluate data quality in actual production and application. This invention summarizes an effective multi-angle systematic evaluation method based on years of accumulation in the threat intelligence field. like figure 1 As shown, this embodiment carries out the following steps:

[0036] Obtain threat intelligence from multiple sources that needs to be assessed;

[0037] performing normalization processing on multiple threat intelligence corresponding to different intelligence sources;

[0038] Based on multiple preset characteristics, the quality of threat intelligence is evaluated separately, and the intelligence source s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for evaluating the quality of multi-source threat intelligence. The method includes: step 1, obtaining threat information from multiple sources that needs to be evaluated; Threat intelligence is normalized; step 3, based on a plurality of preset features, the quality of the threat intelligence is evaluated respectively, and an intelligence source sequence is generated according to the evaluation results. This method can accurately evaluate different intelligence sources. On the one hand, it can help enterprises make better investment decisions, purchase and use higher-quality intelligence sources; For intelligence sources with low evaluation accuracy, the overall credibility score of the threat intelligence sent by the intelligence source can be adjusted.

Description

technical field [0001] The invention relates to the technical field of Internet security, in particular to a method and device for evaluating the quality of multi-source threat intelligence. Background technique [0002] With the rapid development of the Internet, especially the mobile Internet, the network environment is becoming more and more complex, different attacks are more industrialized, gang-based, and intrusion methods are becoming more diverse and complex, which makes traditional security solutions continue to be challenged. Threat intelligence based on big data association analysis can promote enterprises and organizations to quickly understand internal threat information, thereby helping enterprises to take security precautions in advance, detect and respond to attacks faster, and trace the source of attacks more efficiently after the event. In this context, threat intelligence has attracted more and more attention from enterprises, and more and more enterprises...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/55
CPCG06F21/55H04L63/302
Inventor 刘阳
Owner 北京微步在线科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products