Method for aggregating security situation of hierarchic network

A network security and security posture technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as poor network security posture, and achieve the effect of improving rationality and accuracy

Inactive Publication Date: 2012-05-16
NAT UNIV OF DEFENSE TECH
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, the emergence of some cross-subnet coordinated attacks will make the overall network security situation worse, that is to say, it will increase the influence of these coordinated attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for aggregating security situation of hierarchic network
  • Method for aggregating security situation of hierarchic network
  • Method for aggregating security situation of hierarchic network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] How to aggregate the security situation of the lower-level sub-networks to obtain the security situation of the upper-level network is an important issue in the assessment of the hierarchical network security situation. In order to reasonably, accurately and quickly assess the security situation of a large-scale hierarchical network, the present invention makes a compromise between the above two prior technologies, and mainly solves the problems of rationality and accuracy in the subnet situation aggregation algorithm. The security situation of the upper-layer network is not just a simple aggregation of the security situation of the lower-layer subnets. The correlation of situations between subnets will have a significant impact on the security situation of the overall network. And because not all security events that occur in a subnet will have a great impact on the security situation of the entire upper-level network, some security events may only occur in a certain su...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for aggregating a security situation of a hierarchic network, which is used for calculating a total security situation value of the hierarchic network comprising a plurality of subordinate subnets and master subnets. The method comprises the following steps of: acquiring network security situation values of all the subnets and network security events influencing the network security situation values; determining the distribution degree of each network security event in the hierarchic network according to each acquired hierarchic network event, and determining the influence of all the network security events on a network coordinated attack of the hierarchic network, namely a total coordinated attack factor; and determining the weight of each subnet and the network coordinated attack to the hierarchic network, and calculating the total security situation value of the hierarchic network according to the determined weight, the acquired network security situation values of the subnets and the determined total coordinated attack factor. By the method, the rationality and the accuracy of aggregation of the network security situation can be improved effectively.

Description

technical field [0001] The invention relates to a network security situation assessment method, in particular to a hierarchical network security situation aggregation method. Background technique [0002] With the development of human society, the network has been integrated into all aspects of people's lives. While the network brings great convenience to people, it is also accompanied by security issues that cannot be ignored. The global Internet network is frequently attacked, causing large-scale paralysis of the network. Important information systems At the same time, after the level of network informatization in our country has developed to a certain stage, various network security incidents have become inevitable. The increasingly serious network security incidents, such as network economic crimes, large-scale network attacks , network theft, etc. have become the key factors restricting the development of my country's national economy, and even endangering social stabilit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26
Inventor 张建锋韩伟红贾焰杨树强周斌郑黎明徐镜湖刘东刘斐李远征王雯霞夏榕泽
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products