A matrix multi-granularity network security threat situation assessment method

A situation assessment and network security technology, applied in the field of network information security, can solve the problems of incomplete assessment and insufficient assessment accuracy

Active Publication Date: 2010-10-06
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] 1. The host (Host) in the model refers to the server that can provide network services (Service), and does not include other devices in the network. Therefore, the evaluation of the status of the host is limited to the evaluation of the status of the server that provides network services. The evaluation is Incomplete; Furthermore, the model's assessment of the network system (System) situation only considers the impact of devices such as servers on the network system situation, and the assessment is not comprehensive, so the assessment accuracy is not high enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The solutions of the present invention will be described in detail below in conjunction with the examples.

[0069] There are three hosts in the experimental network, host 1 (IP 1 ) is a server that provides www services to the outside world, host 2 (IP 2 ) is the internal www server, host 3 (IP 3 ) for common hosts.

[0070] Divide the attack into three phases: detection (C 1 ), privilege escalation (C 2 ) and invasion (C 3 ).

[0071] Let α=10.

[0072] Vulnerabilities found on each host with the vulnerability scanning tool are:

[0073] V → IP 1 ′ = { v · 1 ′ , v · 2 ′ , · · · , v · ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a matrix multi-granularity network security threat situation assessment method, which belongs to the technical field of network information security. According to the multi-stage characteristics of the current network attack, based on the topology of the protected network and different types of attack information collected by the intrusion detection system, and the vulnerability information collected by the network scanning device, combined with the gradual and in-depth attack stages in the complete attack process, for the first time Corresponding various attack information and attack stages, a matrix network security threat situation model is constructed, and the corresponding quantitative evaluation algorithm is given. The evaluation method proposed by the invention can provide more granular and detailed situation information. In particular, the threat situation formed by each stage of attack on each host and the comprehensive threat situation formed by each stage of attack cannot be given by all current hierarchical evaluation models.

Description

technical field [0001] The invention relates to a matrix multi-granularity network security threat situation assessment method, which belongs to the technical field of network information security. Background technique [0002] The so-called network security threat situation refers to the state and trend of threats faced by the network. A practical and effective network security threat situation assessment can enable security managers to grasp the security status and trends of the network in real time and accurately, fully understand the risks existing in the network, take timely and effective security precautions, and eliminate security risks in the bud. [0003] The research on network security threat situation assessment mainly involves three core technologies including network security threat situation assessment model, assessment algorithm and visualization of assessment results. It is a new direction in the field of network security, and the research is difficult and t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24
Inventor 胡昌振姚淑萍
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products