Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for extracting entity relationship from network threat intelligence document

A technology of entity relationship and extraction method, which is applied in the field of network security, can solve problems such as the inability to achieve extraction and the inability to effectively extract semantic features, and achieve the effect of improving threat analysis capabilities and solving the problem of inability to effectively extract key relationships

Active Publication Date: 2021-12-07
STATE GRID E COMMERCE CO LTD +2
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] During the research process, the inventor found that in network threat intelligence documents, entity relationships often appear in N consecutive sentences. By extracting entity relationships between N consecutive sentences, entity relationships at the network threat intelligence document level can be realized Extraction, based on this, this application provides a method and device for extracting entity relationships in cyber threat intelligence documents, the purpose of which is to solve the problem that existing entity relationship extraction methods cannot achieve entity relationship extraction based on network threat intelligence document levels, resulting in the inability to effectively extract semantics features, so that it is impossible to accurately detect network threat intelligence based on the extracted network threat intelligence entity relationship

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for extracting entity relationship from network threat intelligence document
  • Method and device for extracting entity relationship from network threat intelligence document
  • Method and device for extracting entity relationship from network threat intelligence document

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0072] The application is applicable to numerous general purpose or special purpose computing device environments or configurations. For example: personal computer, server computer, handheld or portable device, tablet type device, multiprocessor device, distributed computing environment including any of the above devices or devices, etc.

[0073] The embodiment of the present application provides a method for extracting entity relations of network threat intelligence documents, whic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application provides a method and device for extracting entity relations of network threat intelligence documents, which can obtain target documents and target entity sets; perform sentence splitting on target documents to obtain sentence sequences corresponding to target documents; Consecutive sentences are constructed into a sentence set corresponding to every N consecutive sentences; based on the target entity set, each target entity corresponding to each sentence set is determined; for each sentence set, each target entity corresponding to the sentence set is combined in pairs , generate at least one entity combination; for each entity combination, use the pre-built entity relationship extraction model to process the entity combination and the sentence set corresponding to the entity combination, and obtain the entity relationship result corresponding to the entity combination, realizing the network threat The entity relationship extraction at the intelligence document level solves the problem that the threat intelligence text is too long to effectively extract key relationships, and improves the blockchain network threat analysis capability.

Description

technical field [0001] The present application relates to the field of network security, and in particular to a method and device for extracting entity relations of network threat intelligence documents. Background technique [0002] At present, blockchain-oriented network attacks are becoming more and more complex and concealed, making it increasingly difficult to analyze and defend against blockchain attacks. A cyber threat intelligence document is evidence-based knowledge, including scenarios, mechanisms, indicators, implications, and actionable recommendations, that is intelligence information relevant to the threat being faced. By extracting entity relationships in known network threat intelligence documents, it is possible to detect unknown network threat intelligence documents based on the extracted network threat intelligence entity relationships, and the accurate detection of network threat intelligence is crucial for analyzing and defending against blockchain attac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/33G06F40/211G06F40/284G06F40/295
CPCG06F16/3344G06F40/211G06F40/295G06F40/284
Inventor 王栋杨珂李达王合建陈帅潘晓婷吕佳宇
Owner STATE GRID E COMMERCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products