Network security quantitative estimation method based on network topology characteristic

A network security and network topology technology, applied in the field of network security, can solve problems such as ignoring network topology characteristics, and achieve the effect of eliminating information overlap

Active Publication Date: 2010-07-21
HARBIN INST OF TECH
View PDF1 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the problem of ignoring network topology features in the existing network security quantitative assessment process, the present invention provides a network security quantitative assessment method based on network topology features

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security quantitative estimation method based on network topology characteristic
  • Network security quantitative estimation method based on network topology characteristic
  • Network security quantitative estimation method based on network topology characteristic

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0013] Specific implementation mode one: according to the instructions attached figure 1 Specifically explain this embodiment, a network security quantitative evaluation method based on network topology characteristics described in this embodiment, its evaluation process is:

[0014] Step 1: Select network performance indicators for assessing the damage degree of network security incidents, the network performance indicators include router node indicators, link indicators and host indicators, and the router node indicators include node throughput, node delay and node packet loss rate, the link index includes link throughput and bandwidth occupancy rate, and the host index includes damaged host ratio and damaged host increase rate;

[0015] Step 2: Define the network entropy value H i =-log2V i , where V i Represent the normalization parameter of the i-th network sample, i=1, 2,..., n, n is the number of network samples;

[0016] Step 3: Calculate the index weight of each n...

specific Embodiment approach 2

[0020] Embodiment 2: This embodiment is a further description of Embodiment 1. In Embodiment 1, in step 3, the method for calculating the index weight of each network performance index is:

[0021] Step 31: Establish a judgment matrix R about m network performance indicators and n network samples m×n =(xij), where xij represents the i-th network sample of the j-th index;

[0022] Step 32: Preprocessing each network sample to obtain the normalized sample value bij of the network sample xij;

[0023] Step 33: According to the network entropy value H i Obtain the entropy value of network performance indicators for m network performance indicators and n network samples H i n = - 1 ln m ( Σ j = 1 m f ij ...

specific Embodiment approach 3

[0026] Embodiment 3: This embodiment is a further description of Embodiment 1 or 2. In Embodiment 1 or 2, in step 4, multiple network performance indicators are removed by Gramm-Schmidt orthogonalization method The method of obtaining multiple decorrelation network performance indicators is as follows:

[0027] Step 41: Define m network performance indicators as I * 1 , I * j ......, I * m , and satisfy the following formula:

[0028] Formula 1: I 1 = I * 1 ,

[0029] Formula 2: I j = I * j -h j,j-1 I * j-1 -...-h j,1 I* 1 ,

[0030] Among them, h j,j-1 ,...,h j,1 are undetermined constants;

[0031] Step 42: Solve Formula 3 to obtain the specific values ​​of each undetermined constant, and bring the specific values ​​of each undetermined constant into Formula 2 to obtain the de-correlation network performance index I j ,

[0032] Formula 3: Cov(I j , I j-1 ) = Cov(I j , I j-2 )=...=Cov(I j , I 1 )=0.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security quantitative estimation method based on network topology characteristic, relating to the technical field of network security, and solving the problem of ignoring network topology characteristics in the existing network security quantitative estimation process. The invention comprises the following steps: 1, selecting a network performance index used for estimating the network security event damage degree; 2, defining network entropy according to the formula: Hi=-log2Vi; 3, calculating the index weight of each network performance index; 4, utilizing the Gram-Schmidt process to remove the relevance of a plurality of network performance indexes to obtain a plurality of relevant network performance indexes; 5, obtaining the security event damage degree delta H and the security event damage level; and 6, utilizing a factorial design method, combining with the security event damage degree delta H, and realizing the influence degree on the network performance by estimation of network security event by the quantitative network topology characteristics. The invention provides reference information for guiding network security macroscopic early warning and response.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network security quantitative evaluation method based on network topology features. Background technique [0002] With the continuous and rapid development of the Internet business, the issue of information security has become increasingly prominent. How to perceive the network security situation has become one of the hot research contents of network emergency response, and has become an important issue of common concern to governments, enterprises and scientific research institutions in various countries. . The existing network security quantitative evaluation process often ignores network topology (such as star structure, bus structure, ring structure, tree structure, mesh structure and comprehensive structure), different routing protocols (such as RIP, OSPF) and different The impact of the overlapping network generated by the logical topology (such as P2P) formed b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06
Inventor 何慧张宏莉王星杨贤青马红梅陈益坚
Owner HARBIN INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products