http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-114972827-A

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_61cff2591e3d6f3dac2a73d5d5f0d630
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F18-214
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F18-23
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F18-24
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1416
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06V10-774
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06V10-764
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06V10-762
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06V10-40
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-40
filingDate 2021-02-26-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_39a29a6157228c75b00522080cab4e2b
publicationDate 2022-08-30-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber CN-114972827-A
titleOfInvention Asset identification method, apparatus, device, and computer-readable storage medium
abstract The present application provides an asset identification method, device, device and computer-readable storage medium; applied to the technical field of network security, the method includes: performing information clustering and feature extraction on at least one dimension of current network alarm information, and obtaining at least one The current attack characteristics of the dimension; the operating system detection and identification of the original traffic data is carried out to obtain the current attacking host system; the current attacking characteristics and the current attacking host system are taken as the current asset characteristic set, and the current asset characteristic set and at least one preset attacking asset characteristic are calculated. The aggregation degree of the set, and then realize the identification of the current asset based on the aggregation degree; at least one preset attack asset feature set is obtained by performing hierarchical clustering on the feature dimension of the historical asset feature set corresponding to the historical attack source address, and is used for Indicates the identity information of at least one attacking object. Through the present application, the accuracy of asset identification can be improved.
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-115277248-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-115277248-B
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-116069380-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-116069380-B
priorityDate 2021-02-26-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID415828001
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID130640

Total number of triples: 24.