Network safety integrated estimation system

A comprehensive assessment and network security technology, applied in the field of information security, can solve the problems that network security assessment methods and tools cannot give scientific and objective technical judgments

Inactive Publication Date: 2008-02-06
NO 510 INST THE FIFTH RES INST OFCHINA AEROSPAE SCI & TECH
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

How to determine whether the security level of an information network meets the requirements of users, the existing network security assessment methods and tools cannot give scientific and objective technical judgments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network safety integrated estimation system
  • Network safety integrated estimation system
  • Network safety integrated estimation system

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0029] As shown in Figure 1, a network security comprehensive evaluation system is characterized in that it includes three subsystems: database, model library, and function library. The database system includes an index database, an index sample library, and a user authority library. The index database is used to record Each specific indicator value; the indicator sample library is used to record the standards for evaluating sample values ​​and the names and connotations of each indicator; the user authority library is used to record the user's name and corresponding authority; the model library system includes gray evaluation, fuzzy evaluation, neural network evaluation , combined evaluation four modules; the function library system includes a data processing module, a model management module, and a result output module. The data processing module realizes the calculation process of various indicators under different models; The goal is to formulate corresponding standards and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a network security comprehensive evaluation system which includes a database, a model base and a function base, wherein, the database contains an indicator database, an indicator specimen base and a user privilege base; the model base includes a gray evaluation module, a vague evaluation module, a nerve network evaluation module and a combination evaluation module; the function base includes a data processing module, a model managing module and a result output module. The present invention integrates the judgment and knowledge, the test data and information, the mathematic module and method and the relevant computer technologies, and provides a scientific and practical security evaluating instrument for the network security evaluation.

Description

technical field [0001] The invention relates to the field of information security, in particular to a network security comprehensive evaluation system. Background technique [0002] Currently, the most commonly used network security assessment method is to use vulnerability scanning and intrusion detection methods to test and evaluate the security level of the system. For example, the Chinese patent publication number is CN 1412714A "Network hidden danger scanning system", and the Chinese patent authorization announcement number is CN 1246996C "A network security risk detection method", these methods can detect and evaluate the host computer, system software, network, etc. . However, a network composed of security products is not a secure network. Computer network is a complex man-machine system. Network security involves computer, communication, physics, management, society and many other disciplines. It is a complex system engineering. Network security assessment has bo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/26H04L12/24H04L29/06
Inventor 申健佘世刚王锴周毅
Owner NO 510 INST THE FIFTH RES INST OFCHINA AEROSPAE SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products