Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security situation evaluation method

A situation assessment and network security technology, applied in the field of network security, can solve the problems of unreasonable design of network security situation assessment algorithm, difficult network security management command, decision-making, single data source, etc., and achieve comprehensive network security situation assessment results. The evaluation results are intuitive and practical, and the evaluation results are accurate.

Active Publication Date: 2012-08-01
706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
View PDF5 Cites 62 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. Single data source: There are few basic data sources for network security situation assessment, resulting in one-sided network security situation assessment results, which cannot fully reflect the overall situation of network security;
[0006] 2. The assessment results are not accurate enough: the network security situation assessment algorithm design is unreasonable, resulting in inaccurate assessment results that cannot truly reflect the overall situation of network security;
[0007] 3. The evaluation results are difficult to understand: the evaluation results are only the value or level of one aspect of network security, and it is difficult to directly use them to guide network security management command and decision-making

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security situation evaluation method
  • Network security situation evaluation method
  • Network security situation evaluation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The preferred embodiments will be described in detail below in conjunction with the flow charts. It should be emphasized that the following descriptions are only illustrative, not intended to limit the scope of the present invention and its application.

[0054] Step 1: Preprocess the raw data, eliminate duplicate information and error information, and generate formatted security event information, network topology information, basic asset information, and asset status information.

[0055] Data sources used for network security situation assessment include firewalls, intrusion detection systems, antivirus software, vulnerability scanning systems, topology discovery tools, performance collection tools, etc. After removing redundancy and eliminating error information, it is formatted to form security event information, network topology information, basic asset information, and asset status information.

[0056] Security event information is mainly divided into firewall l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network security situation evaluation method, which comprises the steps as follows: raw data are preprocessed, and the weight of each asset in a subnet and the weight of each subnet in the whole network are calculated; each asset is subject to external threat situation evaluation; each asset is subject to internal threat situation evaluation; by adopting a weight analysis method, each subnet is subject to external threat situation evaluation and internal threat situation evaluation; the network is subject to external threat situation evaluation and internal threat situation evaluation; firewall log information, intrusion information and vulnerability information are correlated in a crossed manner, so as to eliminate ineffective alarms; the security situation of each asset is comprehensively evaluated; the security situation of each subnet is comprehensively evaluated; and by adopting the weight analysis method, the security situation of the network is comprehensively evaluated. By adopting the network security situation evaluation method, the problem of single data source in the prior art is solved, a network security situation evaluation result is enabled to be more comprehensive and more accurate; the overall condition of the network security is truly reflected; and the evaluation result is intuitive and practical and can be directly used for guiding the command and the decision of network security management.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to a network security situation assessment method. technical background [0002] The Internet is a product of the information age and currently covers almost all important areas in the world. With the continuous expansion of network scale, network attacks and destructive behaviors are becoming more frequent, and the network security situation is becoming increasingly severe. In order to form a network security proactive protection capability, it is first necessary to understand the internal and external threats of the network and the overall security status. [0003] The network security situation assessment technology conducts in-depth comprehensive processing and analysis of factors affecting security in the network, evaluates the overall security status of the network in real time, and provides guidance for network security management command and decision-making. [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 石波王晓程王斌胡晴陈志浩
Owner 706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products