Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Threat vulnerability mining method based on information security big data and information security system

An information security and big data technology, applied in the field of big data, can solve problems affecting the effectiveness of security protection and reinforcement, and achieve the effect of improving decision-making accuracy and effectiveness

Inactive Publication Date: 2022-03-25
天津智宝通大数据服务有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In traditional technical solutions, usually only the triggering activity of threat behavior itself is considered to make threat penetration vulnerability decision-making. The accuracy of decision-making affects the effectiveness of security protection reinforcement.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat vulnerability mining method based on information security big data and information security system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of them. According to the embodiments in the present application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present application.

[0013] Step S101 , searching for traversal threat protection activities and traversal sensitive service request activities of the core subscription service interface in the real-time protection list.

[0014] In an embodiment concept, in the current process of security protection reinforcement, when it is necessary to analyze the threat penetration routing relationship between a specific threat protection activity and a sensitive service request activit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a threat vulnerability decision-making method based on information security big data and an information security system, and the method comprises the steps: considering a threat intelligence chain expressed by a penetration relation between behavior track nodes in a historical threat behavior model according to chain intelligence formed through the arrangement of multiple types of historical threat behavior information; the threat penetration vulnerability decision is performed according to the threat intelligence chain, so that the situation that vulnerability decision errors exist due to the fact that threat penetration vulnerability decision is performed by only considering the triggering activity of the threat behavior in the traditional scheme can be improved, and the decision accuracy of the threat penetration vulnerability between the threat protection activity and the sensitive service request activity is improved; therefore, the effectiveness of subsequent safety protection reinforcement is improved.

Description

technical field [0001] This application relates to the field of big data technology, in particular, to a threat vulnerability mining method based on information security big data and an information security system. Background technique [0002] With the development of big data technology, data and data protection are crucial considerations for cloud platforms. The so-called information security threat refers to the source and means of a specific type of attack, and usually refers to a new or newly discovered accident that may endanger the system or the entire organization of the cloud platform. Therefore, threat vulnerability decision-making testing is particularly important to ensure continuous system security. The so-called vulnerability testing is to identify the penetration relationship of threat vulnerabilities, and strengthen the security protection based on the threat penetration on the existing basis, so as to improve the performance of information security protecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 邓华
Owner 天津智宝通大数据服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products