Grading processing method and grading processing system for security event

A technology for security incidents and hierarchical processing, applied in the field of hierarchical processing of security incidents, which can solve problems such as inability to adapt to the discovery of the most important and urgent incidents, inability to grading the degree of harm of incidents, and delay in processing security incidents.

Active Publication Date: 2009-11-18
北京辰信领创信息技术有限公司
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method only refers to the two event parameters of the event safety level and the number of occurrences, which is too simple to carry out a true and objective classification of the degree of hazard of the event, so i...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Grading processing method and grading processing system for security event
  • Grading processing method and grading processing system for security event
  • Grading processing method and grading processing system for security event

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] The invention comprehensively evaluates the parameters related to the hazard degree of the security event, such as the security level, occurrence times, address distribution and parameter changes, so as to complete the determination and processing of the hazard level of the security event more objectively and accurately.

[0071] The following takes the hierarchical processing of IDS system security events as an example, and describes the present invention in detail in conjunction with the accompanying drawings and specific implementations.

[0072] figure 1 A flow chart showing the hierarchical processing method for security incidents in this embodiment includes the following steps:

[0073] S110, obtain the security event generated by the security system in real time, and store it after parsing, where the security event includes source address and destination address information;

[0074] In this embodiment, the interface function is called to read the security event...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a grading processing method and a grading processing system for a security event. The method comprises the following steps: obtaining a security event generated by a security system in real time and storing the security event after analysis, wherein source address information and destination address information are contained in the security event; when set processing time arrives, counting an estimated value of damage degree according to a security grade, the frequency, an address distribution parameter and a configured operation parameter of each security event and confirming the damage grade of the security event according to the obtained estimated value; and processing the security event according to the damage grade of each security event and a mode which corresponds to the damage grade. The grading processing system comprises a security event obtaining device, a security event counting device, a security event estimating device, a security event processing device and a storage device which are connected in sequence. The invention can grade the damage degree of a great number of security events and process the security events in time according to a plurality of objective factors.

Description

technical field [0001] The invention relates to a processing method for security events, in particular to a hierarchical processing method for security events. Background technique [0002] Security events are generated by security systems, which refer to application systems that monitor and protect user systems, such as intrusion monitoring, vulnerability scanning, auditing, firewalls, and UTM. [0003] All kinds of network security monitoring and security systems will generate a large number of security alarm events. For example, intrusion detection system (IDS), vulnerability scanning, auditing and other systems are used as security monitoring systems, which can complete any behavior that poses any possible threat to security and alarm, that is, generate security events. However, in actual operation, there are many possible threats. Therefore, in the application of these systems, a large number of security events will be generated, some of which are loopholes, some of wh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24
Inventor 许金鹏叶润国周涛邓炜赵东宾
Owner 北京辰信领创信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products