Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for evaluating network safe state

A network security and state assessment technology, applied in the field of information security, can solve problems such as the difficulty of accurately quantifying the threat level of network attack behavior, the inability to make an attack situation, and only considering the number of alarms, etc.

Inactive Publication Date: 2010-11-10
BEIJING VENUS INFORMATION TECH +2
View PDF0 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This scheme can predict the attack situation indicators at the next moment based on the historical attack situation indicators, but cannot make a judgment on whether the attack situation at the next moment is normal
Moreover, only the number of alarms is considered in the selection of indicators, and it is difficult to accurately quantify the threat level of network attacks
For example, suppose there are two information systems, namely, information system A and information system B, and these two information systems have detected 100 attack events in one observation period, and in information system A, the 100 attack events are respectively For 100 hosts, and in information system B, 100 attack events are for the same host, the threats faced by the two systems are obviously different, but it is difficult to reflect this difference by using the aforementioned scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for evaluating network safe state
  • System and method for evaluating network safe state
  • System and method for evaluating network safe state

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The implementation of the present invention will be described in detail below in conjunction with the accompanying drawings and examples, so as to fully understand and implement the process of how to apply technical means to solve technical problems and achieve technical effects in the present invention.

[0035] figure 1 It is a schematic flowchart of an embodiment of a network security state assessment method in the present invention. Such as figure 1 As shown, the method embodiment mainly includes the following steps:

[0036] Step S110, storing the log of the intrusion detection device, including the real-time log of the current observation period, and the historical log before the current observation period;

[0037] Step S120, according to the log of the stored intrusion detection device, extract the network security status indicator, and obtain the network security status indicator value, including the network security status indicator value of the historical l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system and a method for evaluating network safe state, which are used for evaluating the network safe state of an intrusion detection device. The method comprises the following steps of: according to a history log before the current observation cycle of the intrusion detection device, extracting indexes of the network safe state, and establishing a normal distribution model of the indexes of the network safe state; during evaluation, according to a real-time log of the current observation cycle of the intrusion detection device, acquiring index values of the network safe state of the real-time log; and according to the index values of the network safe state of the real-time log and the normal distribution model, acquiring an evaluation result of the network safe state of the intrusion detection device in the current observation cycle. The system and the method for evaluating the network safe state can automatically evaluate the current network safe state according to the logs generated by the intrusion detection device.

Description

technical field [0001] The invention relates to the field of information security, in particular to a system and method for assessing network security status. Background technique [0002] The rapid development of the Internet (Internet) has brought great convenience to the dissemination and utilization of information, but at the same time, human society is facing a huge challenge of information security. In order to alleviate the increasingly serious security problems, intrusion detection system (Intrusion Detection System, IDS) has been more and more widely used. The intrusion detection device is installed in the protected network segment, and its monitoring network card works in promiscuous mode, analyzes all data packets in the network segment, and performs real-time detection and response of network security events. At present, intrusion detection equipment generally adopts misuse detection technology. The detection method is as follows: first, encode the specific intr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/24H04L29/06
Inventor 周涛石坚吴恩平杨立纯力立
Owner BEIJING VENUS INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products