Unlock instant, AI-driven research and patent intelligence for your innovation.

Internal threat model establishing method based on layered mapping

A model building and model technology, applied in the field of internal threat model based on subject-object hierarchical mapping, can solve problems such as deliberate sabotage and misuse by internal legitimate personnel

Inactive Publication Date: 2011-02-09
XIDIAN UNIV +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] The present invention aims at security issues such as misuse and deliberate destruction of internal legal personnel in the current system security field, and aims at threats brought by internal personnel with legal authority in the system, and proposes an internal system based on subject-object layered mapping. threat model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internal threat model establishing method based on layered mapping
  • Internal threat model establishing method based on layered mapping
  • Internal threat model establishing method based on layered mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] A complete insider threat establishment method is:

[0059] 1) Establishment of the subject and object internal threat hierarchy model: use the user’s access control rights to resources defined in the system’s access control relationship to establish a partial order relationship, and then establish a subject and object hierarchy model through the established partial order. The process is as follows:

[0060] 1.1) Let U={u1, u2,...} be the set of system users, R={r1, r2,...} be the set of system resources, and the system access relationship matrix A={(u,r)∈U×R : user u has access right to resource r} defines the access control relationship between users and system resources.

[0061] For user u, R ( u ) ⊆ R Represents the set of resources that u can access; for resource r∈R, U ( r ) ⊆ U Represents the set of users who...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for establishing an internal threat model based on layered mapping. The method comprises the following steps: establishing a partial ordering relation by using resource access control authority of a user defined by an access control relation of a system on resources, and establishing hierarchical models of a subject and an object according to the partial ordering relation; establishing mapping between the subject hierarchical model and the object hierarchical model according to the access control relation between the subject and the object so as to form a hierarchical quantized model which overall describes internal threat characteristics of the system from the subject aspect and the object aspect; quantizing the internal threat characteristics related to the subject and the object by using an analytic hierarchy process, and interrelating the internal threat characteristics of the subject and the internal threat characteristics of the object according to the mapping relation between the subject model and the object model to realize fusion of the internal threat characteristics of the subject and the object. The fusion realizes simultaneously monitoring of the internal threat characteristics of the subject and the object, so that a system security administrator can comprehensively observe a variation regulation of the threat inside the system from real-time evaluation and detection data of the system internal threat, and discover the internal threat in time.

Description

technical field [0001] The invention belongs to the technical field of information security and control and decision-making, and relates to technologies such as security management, access control, control and decision-making, and is specifically an internal threat model based on subject-object layered mapping, which is applied to the security management of networks and information systems and security control. Background technique [0002] With the development of social networking and informatization, how to fully guarantee the security of information systems has become a common problem that people face. Currently, security threats faced by the system can be divided into Insider Threat (referred to as internal threat) from inside the system and Out Threat (external threat) from outside the system according to the source of the threat. [0003] Security threats from outside the system take advantage of system vulnerabilities to launch attacks to obtain high-level privileges...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L29/06
Inventor 裴庆祺张红斌马建峰王超张世民彭静沈玉龙曾勇庞辽军毛立强
Owner XIDIAN UNIV