Method for realizing network security information tagging processing based on NLP

A network security and information labeling technology, applied in the field of network security information labeling processing based on NLP, can solve problems such as low accuracy, lack of relevance in the label system, and low efficiency of data organization, and achieve precise construction and solve manual screening inefficient effect

Inactive Publication Date: 2022-01-18
河南金盾信安检测评估中心有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the purpose of the present invention is to address the deficiencies in the prior art and provide a method for labeling network security information based on NLP. In the field of network security, due to the low efficiency of data organization and the lack of organization in the label system in the field, the field Propose solutions to problems such as the lack of correlation between inter-label systems, and solve the problems of incomplete construction of network security terminology / label libraries, low efficiency of data analysis, and low accuracy in existing technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing network security information tagging processing based on NLP
  • Method for realizing network security information tagging processing based on NLP

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] A method for tagging network security information based on NLP, comprising the following steps: S1. information collection; S2. information processing; S3. tag library construction; S4. tag storage.

[0034] In S1, the information collection module is used to collect network security industry information from official channels or third-party channels based on software technology and manual integration and entry. The information collected by the information collection module is divided into subject information databases of legal database, policy database, standard database, character database and product database. Software technology is used to collect external information resources, and the two data collection methods will be used comprehensively depending on the situation.

[0035] In S2, the information processing module is used to analyze and process the collected information data through data cleaning and attribute alignment technology to ensure the data quality and...

Embodiment 2

[0039]The difference between this embodiment and Embodiment 1 is that the tag library construction module in S3 utilizes the network security ontology to realize the construction of the tag library in the network security field. The network security ontology is constructed based on the analysis of the interrelationships between the six cross-domain label entity systems, which include the legal system, policy system, standard system, protection system, defense system, and guarantee system. The next level of the six major tag entity systems are domain tags, direction tags and application tags. Domain tags and direction tags determine the attribution of tag categories, while the application tag layer is more detailed and has a wide variety.

Embodiment 3

[0041] The difference between this embodiment and Embodiment 2 is that the network security domain tag library is designed and implemented in a bottom-up order, and the structure of numbers, graphs, and spectra is constructed to process network security industry information labeling. The tag library in the field of network security analyzes data from the perspectives of systems, people, and products, adopts cross-domain and multi-dimensional methods, and has a panoramic view of the network security ecology from multiple dimensions, striving to achieve the best information classification method.

[0042] The label library in the field of network security includes the first layer domain information database, the second layer domain label space map, and the spectrum formed by the six information systems in the third layer network security field.

[0043] Field information database According to the needs of network security ecological construction, combined with expert opinions, a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing network security information tagging processing based on NLP. The method comprises the following steps: S1, collecting information; S2, carrying out information processing; S3, constructing a label library; and S4, storing the labels. The method comprises the following steps: S1, acquiring network security industry information of an official channel or a third-party channel; S2, adopting an information processing module to analyze and process the collected information data through data cleaning and attribute alignment technologies, and extracting key information data required for constructing the tag library; S3, performing label library construction on the key information data obtained through information analysis and extraction by adopting a label library construction module; and S4, adopting a tag storage module to store tag library data through a memory. According to the method for realizing network security information tagging processing based on the NLP, a network security domain tag system is quickly and accurately constructed, a network security knowledge graph is further constructed, and network security ecosystem data is better organized.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method for realizing tagging processing of network security information based on NLP. Background technique [0002] Network security information helps the society grasp the ecological development of network security and provide data assistance for the development of related industries. However, there are a large number of network security information subjects, which affect a wide range of areas; technology is updated rapidly, and there are many new threats; social sentiment and public opinion are intertwined and infiltrated, and there are many hot spots of public opinion; These phenomena bring great difficulties to comprehensively understand, grasp and build an efficient and practical network security ecosystem. [0003] Natural Language Processing (NLP) refers to allowing computers to accept user input in the form of natural language, and internally perform a series ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/38G06F16/36G06Q50/18G06Q50/26
CPCG06F16/381G06F16/367G06Q50/18G06Q50/26
Inventor 梁宏刘祥兰符佳慧李芳东张素平陈蔚吴皓赵梦绚李力恒孙玉龙刘涛陈少峰
Owner 河南金盾信安检测评估中心有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products