Macro network security status assessment method based on exception measurement

A network security and status assessment technology, applied in the field of information security, can solve problems that are difficult to evaluate the daily operation status of the macro network

Inactive Publication Date: 2009-05-06
BEIJING VENUS INFORMATION TECH
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The data collection range of this method is the simulated host address, not the real IP address on the backbone network; its main pu...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Macro network security status assessment method based on exception measurement
  • Macro network security status assessment method based on exception measurement
  • Macro network security status assessment method based on exception measurement

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The security status evaluation method proposed by the present invention is mainly applied in the macroscopic network environment. The specific process of the evaluation process is as follows: figure 1 shown.

[0047] In order to make those skilled in the art understand the present invention better, below in conjunction with figure 1 The flow chart shown is a further detailed description of the present invention. Include the following steps:

[0048] Step 101: Initialize all user-defined parameters, specifically including:

[0049] Configurable information used by the data modeling process:

[0050] Number of sample lines: the number of continuous samples taken from the sampling point;

[0051] Number of sample columns: the dimensionality of the sample vector data itself;

[0052] Normal data fluctuation range: one of the basis for extracting normal principal components;

[0053] Contribution rate: the second basis for extracting normal principal components;

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A macro network safety state grade method based on abnormal measurement comprises: defining modeling parameter and grade standard, collecting sample data, extracting index variable for describing network safety state; extracting regularity factor capable of reflecting network operation state, filtering contingency factor, establishing network normal operation state model according to index variable extracted from sample data; collecting data to be detected, computing intensity of abnormality of detecting data and normal model; computing the normalized grade of the index according to intensity of abnormality of every index variable , giving the normalize grade of network integral state according to significance of the index variable. The invention can regulate modeling parameter and grading standard of every index variable, describe present state of important index variable of present network and integral state of network according to different involvement of every index variable in different network environment; the invention has merits of real time, accuracy, quantification and configurability.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for evaluating the security status of a macro network based on anomaly metrics. Background technique [0002] With the development of the Internet, the information and network security of the computer network are facing an unprecedented severe situation. The assessment of the security status of computer networks is becoming more and more important. In terms of the evaluation of network security status, at present, it mainly focuses on the risk assessment of important network assets in a local area, and there are very few research results involving the evaluation of the overall security status of the macro network. [0003] Among the technologies used in current risk assessment, whether it is the network risk status assessment model based on the analytic hierarchy process or the immune-based network intrusion risk assessment method, it is aimed at a specific network e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/26H04L12/24
Inventor 赵东宾邓炜许金鹏周涛叶润国
Owner BEIJING VENUS INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products