Threat intelligence processing method and device

The embodiment of the invention relates to the field of threat intelligence processing, and particularly discloses a threat intelligence processing method and device. According to the embodiment of the invention, the threat intelligence source data is initially intercepted within the preset intercep...

Full description

Saved in:
Bibliographic Details
Main Author ZHANG YONGYIN
Format Patent
LanguageChinese
English
Published 24.06.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The embodiment of the invention relates to the field of threat intelligence processing, and particularly discloses a threat intelligence processing method and device. According to the embodiment of the invention, the threat intelligence source data is initially intercepted within the preset interception times; obtaining a selection operation of a user, and judging whether interception is agreed or not; when the user agrees to intercept, deeply intercepting the threat intelligence source data; when the user does not agree to intercept, restoring the threat intelligence source data; and after the preset number of interception times is reached, carrying out interception protection closing or automatic deep interception guidance on the threat intelligence source data through the restoration judgment model. According to the method, the processing of the threat intelligence can be divided into two stages of manual intervention and automatic processing, and the threat intelligence source data is automatically interc
Bibliography:Application Number: CN202210299730