Threat intelligence processing method and device
The embodiment of the invention relates to the field of threat intelligence processing, and particularly discloses a threat intelligence processing method and device. According to the embodiment of the invention, the threat intelligence source data is initially intercepted within the preset intercep...
Saved in:
Main Author | |
---|---|
Format | Patent |
Language | Chinese English |
Published |
24.06.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The embodiment of the invention relates to the field of threat intelligence processing, and particularly discloses a threat intelligence processing method and device. According to the embodiment of the invention, the threat intelligence source data is initially intercepted within the preset interception times; obtaining a selection operation of a user, and judging whether interception is agreed or not; when the user agrees to intercept, deeply intercepting the threat intelligence source data; when the user does not agree to intercept, restoring the threat intelligence source data; and after the preset number of interception times is reached, carrying out interception protection closing or automatic deep interception guidance on the threat intelligence source data through the restoration judgment model. According to the method, the processing of the threat intelligence can be divided into two stages of manual intervention and automatic processing, and the threat intelligence source data is automatically interc |
---|---|
Bibliography: | Application Number: CN202210299730 |