http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-114972827-A
Outgoing Links
Predicate | Object |
---|---|
assignee | http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_61cff2591e3d6f3dac2a73d5d5f0d630 |
classificationCPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F18-214 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F18-23 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F18-24 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1416 |
classificationIPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06V10-774 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06V10-764 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06V10-762 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06V10-40 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-40 |
filingDate | 2021-02-26-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor | http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_39a29a6157228c75b00522080cab4e2b |
publicationDate | 2022-08-30-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber | CN-114972827-A |
titleOfInvention | Asset identification method, apparatus, device, and computer-readable storage medium |
abstract | The present application provides an asset identification method, device, device and computer-readable storage medium; applied to the technical field of network security, the method includes: performing information clustering and feature extraction on at least one dimension of current network alarm information, and obtaining at least one The current attack characteristics of the dimension; the operating system detection and identification of the original traffic data is carried out to obtain the current attacking host system; the current attacking characteristics and the current attacking host system are taken as the current asset characteristic set, and the current asset characteristic set and at least one preset attacking asset characteristic are calculated. The aggregation degree of the set, and then realize the identification of the current asset based on the aggregation degree; at least one preset attack asset feature set is obtained by performing hierarchical clustering on the feature dimension of the historical asset feature set corresponding to the historical attack source address, and is used for Indicates the identity information of at least one attacking object. Through the present application, the accuracy of asset identification can be improved. |
isCitedBy | http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-115277248-A http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-115277248-B http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-116069380-A http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-116069380-B |
priorityDate | 2021-02-26-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type | http://data.epo.org/linked-data/def/patent/Publication |
Incoming Links
Predicate | Subject |
---|---|
isDiscussedBy | http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID415828001 http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID130640 |
Total number of triples: 24.