Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability restoration method based on knowledge graph

A knowledge graph, vulnerability repair technology, applied in knowledge expression, special data processing applications, instruments, etc., can solve the problems of easy attack of hosts and systems, long repair time, etc., to reduce errors, improve security, improve efficiency and effect of speed

Active Publication Date: 2021-08-10
SHENZHEN Y& D ELECTRONICS CO LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Based on this, it is necessary to provide a knowledge graph-based vulnerability repair method for the technical problems that need to manually update the solution and the vulnerability library when repairing the vulnerability, the repair time is long, and the host and system are vulnerable to attacks during the repair period.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability restoration method based on knowledge graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the above objects, features and advantages of the present invention more comprehensible, specific implementations of the present invention will be described in detail below in conjunction with the accompanying drawings. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, the present invention can be implemented in many other ways different from those described here, and those skilled in the art can make similar improvements without departing from the connotation of the present invention, so the present invention is not limited by the specific embodiments disclosed below.

[0020] The present invention provides a vulnerability repair method based on a knowledge map. The vulnerability repair method first constructs a vulnerability knowledge base based on a knowledge map, which can also be understood as a knowledge map-based vulnerability knowledge base. Vulne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network security, and particularly discloses a vulnerability restoration method based on a knowledge graph, and the method is high in restoration efficiency, low in error rate and safe. The method comprises the following steps: S1, extracting features which can be identified and retrieved by a computer in a new vulnerability; S2, substituting the extracted new vulnerability features into a knowledge mapping vulnerability knowledge base for retrieval and identification; S3, when the new vulnerability feature is matched with any vulnerability in the vulnerability knowledge base, repairing the new vulnerability according to a preset repairing method corresponding to the vulnerability in the vulnerability knowledge base; S4, when the new vulnerability features are not matched with the vulnerabilities in the vulnerability knowledge base, summarizing associated vulnerability information in the matching process, and jointly performing decision fusion arrangement on the associated vulnerability information and the new vulnerability features extracted in the step S1 to output decision information; S5, reasoning the output decision information to generate a vulnerability solution; and S6, repairing a new vulnerability by using the vulnerability solution generated in the step S5, and updating the vulnerability solution in the step S5 to the vulnerability knowledge base.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method for repairing vulnerabilities based on knowledge graphs. Background technique [0002] Network security vulnerabilities are defects or weaknesses that are unintentionally or intentionally generated in the process of network system requirements, design, implementation, configuration, operation, etc., and need to be repaired in time to ensure the security of data information. With the increasing complexity of existing hosts and software systems, the possibility of loopholes is also increasing, which brings new challenges to the security maintenance of information technology. The traditional vulnerability repair method is that after the vulnerability appears, the technicians propose a solution, then update the vulnerability database, and repair the vulnerability. The vulnerability repair needs to last for a period of time. During the repair period, the host and sys...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06F16/36G06N5/02
CPCG06F21/577G06N5/02G06F16/367
Inventor 戚建淮李英英唐娟刘建辉
Owner SHENZHEN Y& D ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products