Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability information matching processing method and device

A processing method and technology of a processing device, which are applied in the computer field, can solve problems such as low efficiency, disadvantageous processing loopholes and reduce losses, and achieve the effects of improving matching efficiency, reducing labor costs, and fast matching.

Active Publication Date: 2020-02-18
BEIJING QIANXIN TECH +1
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing technology uses manual reading to find vulnerability information in the network, but when the amount of vulnerability information is large, it is very inefficient to manually read each lengthy vulnerability description information to detect public opinion, which is not conducive to timely processing of vulnerabilities and reduce losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability information matching processing method and device
  • Vulnerability information matching processing method and device
  • Vulnerability information matching processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0045] figure 1 It shows a schematic flowchart of a vulnerability information matching processing method provided in this embodiment, including:

[0046] S101. Obtain vulnerability-related information in the network, perform part-of-speech tagging and block extraction on the vulnerability-related information, and obtain preprocessed vulnerability information.

[0047] Wherein, the vulnerability-related information is information related to the vulnerability in the network, such as text describing details of the vulnerability.

[0048] The part-of-speech tagging is a process of tagging the part-of-speech of each word in the vulnerability-related information, so that ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a vulnerability information matching processing method and device. The method comprises the following steps: obtaining vulnerability related information in anetwork, carrying out the part-of-voice tagging and block extraction of vulnerability related information, and obtaining preprocessed vulnerability information; combining a plurality of blocks conforming to a preset grammatical structure in the preprocessed vulnerability information into a new noun block to obtain block vulnerability information; and matching verbs in the block vulnerability information according to preset sensitive verbs, and determining a target noun connected with the matched target verbs as vulnerability information. Part-of-voice tagging and block extraction are carried out on vulnerability related believes in a network; according to the vulnerability information matching method and device, the blocks conforming to the combined grammatical structure of adjectives andnouns are combined, so that each block can be quickly matched when vulnerability information matching is performed, the vulnerability information matching efficiency is greatly improved, the labor cost is reduced, Meanwhile, vulnerability processing in time and loss reduction are facilitated.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for matching processing of vulnerability information. Background technique [0002] With the development and popularization of the network, there are more and more vulnerability information on the network. These vulnerability information mainly exist in the CVE (Common Vulnerabilities & Exposures, public vulnerabilities and exposures) information base, security websites or personal blogs. [0003] The existing technology uses manual reading to find vulnerability information in the network, but when the amount of vulnerability information is large, it is very inefficient to manually read each lengthy vulnerability description information to detect public opinion, which is not conducive to timely processing of vulnerabilities and Cut your losses. Contents of the invention [0004] Due to the above-mentioned problems in the existing methods, the embodiments ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1433
Inventor 禹庆华李凯沈鹏李国辉
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products