- Time of issue:2019-12-04 00:00:00
The Company is committed to the research of advanced network security technologies at home and abroad, undertakes national key network security research projects and continuously enhances its ability to explore fundamental, strategic and forward-looking technologies. So far, the Company has applied for more than 300 invention patents with more than 200 patents being granted, undertaken over 20 national and internal core technology research projects, and made a large number of excellent scientific research achievements.
The current research interests of the Company include big data security analysis, artificial intelligence security applications, threat detection and situational awareness, security knowledge map, blockchain security, IPV6 security and 5G security.
AI-based malicious code detection: To conduct in-depth analysis on various types of malicious codes, extract the features automatically or semi-automatically, construct the detection model based on machine learning and deep learning algorithms, and achieve the precise identification of known and unknown malicious codes.
White list intelligent combing: To automatically extract the attributes related to network access behaviors with the network traffic, device log and other data as the input, to generate the relationship mode of mutual access and operation of network devices, achieve the automatic combing of white list rules by applying inductive generalization and other technologies and flexibly adjust the rule control granularity.
Application of security knowledge map: To achieve ontologization of the security concept, map the multi-source and heterogeneous data into security entities to form the security knowledge map, which is to be used for the study of association analysis, inference prediction, visual interaction analysis, situational awareness, etc.
Security big data analysis modeling:To provide security modeling solutions for multi-source data and typical scenarios by comprehensive application of the association analysis, timing analysis, machine learning, behavior modeling, anomaly detection and other technologies, with distributed systems such as Hadoop, Spark and ELK as the support.
Blockchain security research: To conduct in-depth analysis on blockchain security risks at multiple levels, make researches on key technologies like practical consensus mechanism, identity authentication and privacy protection, to form node identification, malicious traffic analysis, business security and other situational awareness capabilities, providing blockchain overall security solutions.
Scan the QR code to read on your phone