Internal threat model establishing method based on layered mapping

A technology for model building and modeling, which is applied in the field of insider threat models based on the hierarchical mapping of subject and object, which can solve problems such as misuse and deliberate destruction by internal legal personnel.

Inactive Publication Date: 2009-08-12
XIDIAN UNIV +1
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] The present invention aims at security issues such as misuse and deliberate destruction of internal legal personnel in the current system security field, and aims at threats brought by internal personnel with legal authority in the system, and proposes an internal system based on subject-object layered mapping. threat model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internal threat model establishing method based on layered mapping
  • Internal threat model establishing method based on layered mapping
  • Internal threat model establishing method based on layered mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] A complete insider threat establishment method is:

[0060] 1) Establishment of the internal threat hierarchy model of subject and object: use the user's access control authority to resources defined in the access control relationship of the system to establish a partial order relationship, so as to establish a hierarchical model of subject and object through the established partial order. The process is as follows:

[0061] 1.1) Let U={u1, u2,...} be the set of system users, R={r1, r2,...} be the set of system resources, and the access relation matrix of the system A={(u, r)∈U×R : User u has access rights to resource r} defines the access control relationship between users and system resources.

[0062] For user u, R ( u ) ⊆ R Represents the set of resources that u can access; for resources r∈R, U ( r ) ⊆ ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for establishing an internal threat model based on layered mapping. The method comprises the following steps: establishing a partial ordering relation by using resource access control authority of a user defined by an access control relation of a system on resources, and establishing hierarchical models of a subject and an object according to the partial ordering relation; establishing mapping between the subject hierarchical model and the object hierarchical model according to the access control relation between the subject and the object so as to form a hierarchical quantized model which overall describes internal threat characteristics of the system from the subject aspect and the object aspect; quantizing the internal threat characteristics related to the subject and the object by using an analytic hierarchy process, and interrelating the internal threat characteristics of the subject and the internal threat characteristics of the object according to the mapping relation between the subject model and the object model to realize fusion of the internal threat characteristics of the subject and the object. The fusion realizes simultaneously monitoring of the internal threat characteristics of the subject and the object, so that a system security administrator can comprehensively observe a variation regulation of the threat inside the system from real-time evaluation and detection data of the system internal threat, and discover the internal threat in time.

Description

technical field [0001] The invention belongs to the technical field of information security and control and decision-making, and relates to technologies such as security management, access control, control and decision-making, in particular to an internal threat model based on subject-object hierarchical mapping, which is applied to the security management of networks and information systems and security controls. Background technique [0002] With the development of social networking and informatization, how to comprehensively ensure the security of information systems has become a common problem faced by people. The current security threats faced by the system can be divided into security threats from inside the system InsiderThreat (referred to as internal threats) and security threats from outside the system Out Threat (external threats) according to the source of the threats. [0003] Security threats from outside the system exploit the vulnerabilities of the system to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06
Inventor 裴庆祺张红斌马建峰王超张世民彭静沈玉龙曾勇庞辽军毛立强
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products