Method for analysing large scale network safety

A security analysis and security technology, applied in the field of network security, can solve problems that affect the normal operation of the network, security issues, and manual analysis difficulties

Inactive Publication Date: 2007-10-03
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The obvious defect of this method is that threatening operations need to be performed on the actual network, which may affect the normal operation o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for analysing large scale network safety

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] First, collect host, network, attacker, attack method and important asset information, organize and store them in the form of xml set, so as to structure the overall information of the network; then, use the above information as input to construct a finite state machine as a network model, and use The defined system security attributes are used as detection conditions, and model detection technology is used to simulate attacks on the basis of network models, and further combine the application environment to analyze and process the results of simulated attacks, and obtain targeted results such as the relative destructiveness of attacks and the set of key vulnerabilities. in conclusion.

[0025] Referring to the accompanying drawings, the detailed process is given below.

[0026] Step 1: Gather information and organize that information; information is divided into five categories: hosts, networks, attackers, attack methods, and critical assets.

[0027] 1. The host (Hos...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for analyzing safety of large-capacity network includes collecting information of each host, network, attacker and attack means in network and carrying out model detection by setting up finite state unit; obtaining state sequence from initial state to safe attribute being violated by detection and finding out conversion condition of state sequence; utilizing said state sequence and conversion condition to plot out a safety-analysis state diagram being used to analyze and evaluate safety of network.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to a large-scale network security analysis method. Background technique [0002] In today's society, the operation and development of many industries rely on computer networks and various applications running on them. As the scale of the network becomes larger and the distribution of services and personnel becomes more and more complex, the attacks on the network are also increasing. Many, frequently causing the leakage of commercial secrets and the paralysis of services. Therefore, in a specific application environment, it is very necessary to analyze the security of large-scale networks. [0003] The current security analysis methods are mainly vulnerability scanning and penetration testing. [0004] Vulnerability scanners are based on feature recognition, and identify known vulnerabilities by sending detection data containing judgment features to target hosts and colle...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24
Inventor 施妍苏璞睿冯登国
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products