Acquisition agent deployment method and device
A collection tree and collection technology, which is applied in the field of network security and can solve problems such as under-collection and over-collection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] In order to more clearly illustrate the technical solutions in the embodiments of the present invention or the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description These are some embodiments of the present invention. Those skilled in the art can also obtain other drawings based on these drawings without creative work.
[0028] In one embodiment of the present invention, a collection agent deployment method is provided, figure 1 It is a schematic diagram of the overall flow of the collection agent deployment method provided by the embodiment of the present invention, the method includes: S101, according to the target network-data service library, data service-threat event library, threat event-feature beacon library and collection agent-threat detection atom The data item library builds a network threat-collection tree; am...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com