Internal threat model establishing method based on layered mapping
A model building and model technology, applied in the field of internal threat model based on subject-object hierarchical mapping, can solve problems such as deliberate sabotage and misuse by internal legitimate personnel
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0058] A complete insider threat establishment method is:
[0059] 1) Establishment of the subject and object internal threat hierarchy model: use the user’s access control rights to resources defined in the system’s access control relationship to establish a partial order relationship, and then establish a subject and object hierarchy model through the established partial order. The process is as follows:
[0060] 1.1) Let U={u1, u2,...} be the set of system users, R={r1, r2,...} be the set of system resources, and the system access relationship matrix A={(u,r)∈U×R : user u has access right to resource r} defines the access control relationship between users and system resources.
[0061] For user u, R ( u ) ⊆ R Represents the set of resources that u can access; for resource r∈R, U ( r ) ⊆ U Represents the set of users who...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 