Security risk assessment method and device and storage medium

The invention relates to a security risk assessment method and device and a storage medium. The security risk assessment method comprises the following steps: acquiring security alarm logs and asset information of an object system comprising a plurality of security domains, and preprocessing the acq...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: SHI GUOSHUI, LIU DONGXIN, WANG LAIFU, QIN YUE, HUANG DONGMEI
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator SHI GUOSHUI
LIU DONGXIN
WANG LAIFU
QIN YUE
HUANG DONGMEI
description The invention relates to a security risk assessment method and device and a storage medium. The security risk assessment method comprises the following steps: acquiring security alarm logs and asset information of an object system comprising a plurality of security domains, and preprocessing the acquired security alarm logs and asset information; converting the preprocessed text information of the security alarm log and the asset information into Euclidean space vectors, and filtering based on cosine correlation of a security alarm log vector and an asset information vector; assigning a security level weight for each security domain based on security tag information representing a security level of the security domain; generating a typical feature vector of each security domain according to the security alarm log of each security domain in a preset time period; for each security domain, calculating an included angle cosine correlation value according to the typical feature vector and a plurality of predetermi
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN114095225A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN114095225A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN114095225A3</originalsourceid><addsrcrecordid>eNrjZLANTk0uLcosqVQoyizOVkgsLk4tLs5NzStRyE0tychPUUjMS1FISS3LTE4FM4tL8osS01OBsimZpbk8DKxpiTnFqbxQmptB0c01xNlDN7UgPz61uCAxOTUvtSTe2c_Q0MTA0tTIyNTRmBg1ADTQMEI</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Security risk assessment method and device and storage medium</title><source>esp@cenet</source><creator>SHI GUOSHUI ; LIU DONGXIN ; WANG LAIFU ; QIN YUE ; HUANG DONGMEI</creator><creatorcontrib>SHI GUOSHUI ; LIU DONGXIN ; WANG LAIFU ; QIN YUE ; HUANG DONGMEI</creatorcontrib><description>The invention relates to a security risk assessment method and device and a storage medium. The security risk assessment method comprises the following steps: acquiring security alarm logs and asset information of an object system comprising a plurality of security domains, and preprocessing the acquired security alarm logs and asset information; converting the preprocessed text information of the security alarm log and the asset information into Euclidean space vectors, and filtering based on cosine correlation of a security alarm log vector and an asset information vector; assigning a security level weight for each security domain based on security tag information representing a security level of the security domain; generating a typical feature vector of each security domain according to the security alarm log of each security domain in a preset time period; for each security domain, calculating an included angle cosine correlation value according to the typical feature vector and a plurality of predetermi</description><language>chi ; eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; HANDLING RECORD CARRIERS ; PHYSICS ; PRESENTATION OF DATA ; RECOGNITION OF DATA ; RECORD CARRIERS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220225&amp;DB=EPODOC&amp;CC=CN&amp;NR=114095225A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220225&amp;DB=EPODOC&amp;CC=CN&amp;NR=114095225A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>SHI GUOSHUI</creatorcontrib><creatorcontrib>LIU DONGXIN</creatorcontrib><creatorcontrib>WANG LAIFU</creatorcontrib><creatorcontrib>QIN YUE</creatorcontrib><creatorcontrib>HUANG DONGMEI</creatorcontrib><title>Security risk assessment method and device and storage medium</title><description>The invention relates to a security risk assessment method and device and a storage medium. The security risk assessment method comprises the following steps: acquiring security alarm logs and asset information of an object system comprising a plurality of security domains, and preprocessing the acquired security alarm logs and asset information; converting the preprocessed text information of the security alarm log and the asset information into Euclidean space vectors, and filtering based on cosine correlation of a security alarm log vector and an asset information vector; assigning a security level weight for each security domain based on security tag information representing a security level of the security domain; generating a typical feature vector of each security domain according to the security alarm log of each security domain in a preset time period; for each security domain, calculating an included angle cosine correlation value according to the typical feature vector and a plurality of predetermi</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>HANDLING RECORD CARRIERS</subject><subject>PHYSICS</subject><subject>PRESENTATION OF DATA</subject><subject>RECOGNITION OF DATA</subject><subject>RECORD CARRIERS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLANTk0uLcosqVQoyizOVkgsLk4tLs5NzStRyE0tychPUUjMS1FISS3LTE4FM4tL8osS01OBsimZpbk8DKxpiTnFqbxQmptB0c01xNlDN7UgPz61uCAxOTUvtSTe2c_Q0MTA0tTIyNTRmBg1ADTQMEI</recordid><startdate>20220225</startdate><enddate>20220225</enddate><creator>SHI GUOSHUI</creator><creator>LIU DONGXIN</creator><creator>WANG LAIFU</creator><creator>QIN YUE</creator><creator>HUANG DONGMEI</creator><scope>EVB</scope></search><sort><creationdate>20220225</creationdate><title>Security risk assessment method and device and storage medium</title><author>SHI GUOSHUI ; LIU DONGXIN ; WANG LAIFU ; QIN YUE ; HUANG DONGMEI</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN114095225A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2022</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>HANDLING RECORD CARRIERS</topic><topic>PHYSICS</topic><topic>PRESENTATION OF DATA</topic><topic>RECOGNITION OF DATA</topic><topic>RECORD CARRIERS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>SHI GUOSHUI</creatorcontrib><creatorcontrib>LIU DONGXIN</creatorcontrib><creatorcontrib>WANG LAIFU</creatorcontrib><creatorcontrib>QIN YUE</creatorcontrib><creatorcontrib>HUANG DONGMEI</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>SHI GUOSHUI</au><au>LIU DONGXIN</au><au>WANG LAIFU</au><au>QIN YUE</au><au>HUANG DONGMEI</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Security risk assessment method and device and storage medium</title><date>2022-02-25</date><risdate>2022</risdate><abstract>The invention relates to a security risk assessment method and device and a storage medium. The security risk assessment method comprises the following steps: acquiring security alarm logs and asset information of an object system comprising a plurality of security domains, and preprocessing the acquired security alarm logs and asset information; converting the preprocessed text information of the security alarm log and the asset information into Euclidean space vectors, and filtering based on cosine correlation of a security alarm log vector and an asset information vector; assigning a security level weight for each security domain based on security tag information representing a security level of the security domain; generating a typical feature vector of each security domain according to the security alarm log of each security domain in a preset time period; for each security domain, calculating an included angle cosine correlation value according to the typical feature vector and a plurality of predetermi</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN114095225A
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
HANDLING RECORD CARRIERS
PHYSICS
PRESENTATION OF DATA
RECOGNITION OF DATA
RECORD CARRIERS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Security risk assessment method and device and storage medium
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T20%3A44%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=SHI%20GUOSHUI&rft.date=2022-02-25&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN114095225A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true