Network security performance evaluation method
A network security and efficiency evaluation technology, applied in the field of information security, can solve problems that cannot truly reflect network security effectiveness, and achieve the effect of ensuring comprehensiveness and accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0044] The present invention will be further described below with reference to the accompanying drawings and specific embodiments.
[0045] The flow chart of the network security effectiveness evaluation method according to the present invention is as follows: figure 1 shown, including the following steps:
[0046] Step 1: Identify the elements of the cybersecurity effectiveness assessment, and the factors that measure how each element of the assessment changes. Use network probes, perfmon performance counters, etc. to obtain the values of various factors before and after the attack, and preprocess the collected raw data to eliminate redundancy.
[0047] The network security effectiveness evaluation elements are recorded as: {network damage effect, asset damage effect, business damage effect, attack intensity, system protection capability}, of which:
[0048] The evaluation of network damage effect is to evaluate the degree of performance change of the network after being ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


