Network vulnerability evaluation method

A vulnerability and network technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve the problem of difficulty in ensuring the accuracy of vulnerability assessment, and achieve the effect of improving accuracy and avoiding serious consequences.

Inactive Publication Date: 2011-02-02
BEIJING UNIV OF POSTS & TELECOMM +1
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The common point of these standards is that a value is generally used to represent the level of vulnerability, which makes it more difficult to ensure the accuracy of vulnerability assessment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network vulnerability evaluation method
  • Network vulnerability evaluation method
  • Network vulnerability evaluation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Generally speaking, the network vulnerability assessment method provided by the present invention includes: determining the vulnerability cost factors according to the vulnerability cost information, obtaining the vulnerability cost assessment results according to the vulnerability cost factors; determining the vulnerability consequence factors according to the vulnerability consequence information , get the vulnerability consequence assessment result according to the vulnerability consequence factor; determine the network vulnerability according to the vulnerability cost assessment result and the vulnerability consequence assessment result.

[0041] Regarding the factors to be considered when conducting network assessments, we can focus on considering the material cost and time cost of exploiting vulnerabilities, which do not seem to be directly related to the vulnerability, but actually affect the exploitability of the vulnerability. In addition, although no one has cl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network vulnerability evaluation method. The method comprises the following steps of: determining vulnerability cost factors according to vulnerability cost information; obtaining a vulnerability evaluation result according to the evaluation cost factors; determining vulnerability consequence factors according to vulnerability consequence information; obtaining a vulnerability consequence evaluation result according to the vulnerability consequence factors; and determining network vulnerability according to the vulnerability cost evaluation result and the vulnerability consequence evaluation result. Therefore, the method of the invention takes the vulnerability cost factors and the vulnerability consequence factors into consideration comprehensively when evaluates the network vulnerability, and enriches and perfects the basis for network vulnerability evaluation in a targeted way, so that the accurate performance of the network vulnerability evaluation is improved obviously. Moreover, the obtained improved network vulnerability evaluation accuracy can provide important reference for network safety management, ensures that corresponding safety measures can be implemented more targeted in a planned manner based on the reference, and avoids a serious result caused by utilizing the network vulnerability.

Description

technical field [0001] The invention relates to network security analysis technology, in particular to a network vulnerability assessment method. Background technique [0002] In computer network, research on vulnerability can be divided into several problem areas, including: definition of vulnerability, discovery of vulnerability, identification of vulnerability, analysis and assessment of vulnerability. Vulnerability assessment is a qualitative and quantitative analysis of the vulnerability of the target system to be assessed. The system mentioned here can be a service, a computer on a network, or the entire computer network. In the field of network security, vulnerability assessment and intrusion detection system, firewall, and virus detection constitute the four elements of network security. The three technologies other than vulnerability assessment are passive detection during or after the attack, while vulnerability assessment is It is an active detection before the a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26
Inventor 杨放春苏森许明双锴王玉龙于晓燕
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products