Network security situation evaluation method and system

A situation assessment and network security technology, applied in the field of network security, can solve problems such as no clear target address, processing characteristics stay, classification and division dependence, etc.

Inactive Publication Date: 2011-01-19
北京系统工程研究所
View PDF3 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, since the quantitative and grading technology of static weighting follows the system level, host level, and then to the service level to merge and classify events combined with the target address of the event, this scheme has at least the following disadvantages: First, due to the classification and division of events Reliance on the target address such that the method will not apply if the target address does not exist or is not unique
For example, using ICMP messages to carry out flooding attacks without a clear target address, this method will not be applicable at this time and has obvious limitations
In addition, when multiple types of attack activities occur in the network at the same time, their processing characteristics only stay at the static weighting level, so that the fusion process of this technology cannot reflect the difference between the behavior characteristics of different attack activities, making the evaluation of the final result difficult. decreased accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security situation evaluation method and system
  • Network security situation evaluation method and system
  • Network security situation evaluation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] For reference and clarity, the synthesis rules of evidence theory are introduced as follows:

[0053] Evidence theory was proposed by A.P. Dempster, a mathematician at Harvard University in the 1960s. After the development of his student G. Shafer, he gradually formed a set of "evidence" and "combination" to deal with uncertainty reasoning. Mathematical approach to the problem. Evidence theory is widely used in expert systems, information fusion and other fields, and its synthesis rules are as follows:

[0054] ( m 1 ⊕ m 2 ⊕ . . . ⊕ m n ) ( A ) = 1 K Σ A 1 ∩ A ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security situation evaluation method and a network security situation evaluation system for improving the application range and accuracy of network security situation evaluation. The method comprises: classifying all security events in a preset time period according to attack type to form at least one event collection; accumulating the attack risk grades of the security events in each event collection respectively, and determining the accumulated values as the rise degree values of the event collections; substituting the risk degree values of the event collections as independent variables into empirical functions fi() corresponding to the event collections to obtain the values of the credibility of the fact that the event collections render a network in an unsecure state; and using the values of the credibility of the event collections as weights of evidences, combining the weights of evidences by using a synthesis rule of the theory of evidence, and obtaining the credibility of the fact that the network is in an unsecure state in the preset time period. Thus, the technical scheme realizes the quantitative evaluation of the security situation of the whole network and improves the application range and accuracy of the network security situation evaluation.

Description

technical field [0001] The invention relates to the field of network security, in particular to a network security situation assessment method and system. Background technique [0002] Network security situation assessment is an important research content in the field of information security. The so-called network security situation assessment refers to the use of assessment algorithms to comprehensively analyze each security element in cyberspace, and present the influence relationship and degree of influence between elements to the administrator in the form of a macro index, so that the administrator can perceive and perceive the network from a global perspective. The security situation of the system can then prompt administrators to make reasonable and accurate decisions. Network security situation assessment is the basis of the entire security management. [0003] At present, the quantitative and grading technology based on static weighting is widely used in network se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/26H04L12/24H04L29/06
Inventor 王东霞赵刚冯学伟马国庆李津方兰王春雷李远玲刘杰张鲁峰赵金晶李响苗青
Owner 北京系统工程研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products