A matrix multi-granularity network security threat situation assessment method
A situation assessment and network security technology, applied in the field of network information security, can solve the problems of incomplete assessment and insufficient assessment accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0068] The solutions of the present invention will be described in detail below in conjunction with the examples.
[0069] There are three hosts in the experimental network, host 1 (IP 1 ) is a server that provides www services to the outside world, host 2 (IP 2 ) is the internal www server, host 3 (IP 3 ) for common hosts.
[0070] Divide the attack into three phases: detection (C 1 ), privilege escalation (C 2 ) and invasion (C 3 ).
[0071] Let α=10.
[0072] Vulnerabilities found on each host with the vulnerability scanning tool are:
[0073] V → IP 1 ′ = { v · 1 ′ , v · 2 ′ , · · · , v · ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com