Network fragility analyzing system based on privilege lift

A technology for privilege escalation and system analysis, which is applied in the system field of network security technology to achieve the effect of low time complexity

Inactive Publication Date: 2010-04-14
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the above-mentioned deficiencies in the prior art, the present invention provides a network vulnerability analysis system based on privilege escalation, which is used to analyze the security risks of the network system from the perspective of the whole world, that is, to identify the same host in the information system through the generated attack graph Or the security problems caused by the combination of vulnerabilities between different hosts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network fragility analyzing system based on privilege lift
  • Network fragility analyzing system based on privilege lift
  • Network fragility analyzing system based on privilege lift

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The embodiments of the present invention will be described in detail below. This embodiment is carried out on the premise of the technical solution of the present invention, and the detailed implementation and specific operation process are given, but the protection scope of the present invention is not limited to the following embodiments.

[0028] Such as figure 1 As shown, this embodiment includes: a vulnerability detection module, an attack information knowledge base, a network attack graph generation module and an attack graph visualization module, wherein: the vulnerability detection module is connected with the network attack graph generation module and transmits vulnerability information, network connectivity information and host Information, the attack information knowledge base is connected with the network attack graph generation module and transmits vulnerability exploit information, the network attack graph generation module is connected with the attack gr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A network fragility analyzing system based on privilege lift in the technical field of network safety is used to analyze the potential safety hazard of network systems from the prospective of whole integrity, and comprises a hole checking module, an attack information knowledge base, a network attack picture generating module and an attack picture visualization module, wherein the hole checking module is connected with the network attack picture generating module and is used to transfer hole information, network communication information and host machine information, the attack information knowledge base is connected with the network attack picture generating module and is used to transfer hole utilization information, and the network attack picture generating module is connected with the attack picture visualization module and is used to transfer the network attack pictures of the whole information system. The system helps managers to recognize the influence of hole combination on system safety and to realize the safety condition of the whole system.

Description

technical field [0001] The invention relates to a system in the technical field of network security, in particular to a network vulnerability analysis system based on privilege promotion. Background technique [0002] With the continuous development of computer technology, the software running on it is becoming more and more complex, and the continuous enhancement of computer network technology also makes remote access more and more frequent, all of which make a large number of system vulnerabilities appear. The root of network security problems lies in the vulnerability of the network. Only by clearly understanding the vulnerability of the network itself can we allocate resources more reasonably, formulate strategies, and realize the protection of network security. The analysis of network vulnerability has become an important topic in the field of information security research. [0003] Through the search of domestic and foreign literature, Oleg Sheyner et al. introduced a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
Inventor 陈秀真李建华王桠楠范磊蔡伟
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products