A Network Security Situation Assessment Method in Attack-Defense Confrontation Environment
A situation assessment and network security technology, applied in the field of network information security, can solve the problems of weak guiding significance for the formulation of protection strategies for security managers, and the inability to reflect step-by-step depth and other problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0092] The solutions of the present invention will be described in detail below in conjunction with the examples.
[0093] There are three hosts in the experimental network, host 1 (IP 1 ) is a server that provides www services to the outside world, host 2 (IP 2 ) is the internal www server, host 3 (IP 3 ) for common hosts.
[0094] Divide the attack into three phases: detection (C 1 ), privilege escalation (C 2 ) and invasion (C 3 ).
[0095] Let α=10.
[0096] Vulnerabilities found on each host with the vulnerability scanning tool are:
[0097] V → IP 1 ′ = { v · 1 ′ , v · 2 ′ , . . . , v · ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More