Unlock instant, AI-driven research and patent intelligence for your innovation.

A Network Security Situation Assessment Method in Attack-Defense Confrontation Environment

A situation assessment and network security technology, applied in the field of network information security, can solve the problems of weak guiding significance for the formulation of protection strategies for security managers, and the inability to reflect step-by-step depth and other problems

Active Publication Date: 2011-01-12
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are flaws in this classification method. It is based on the different methods of hacker attacks and cannot reflect the characteristics of "stepping deeper and closer" in the process of hacker attacks. The situation assessment based on this classification method Information has little guiding significance for the formulation of protection strategies for security managers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0092] The solutions of the present invention will be described in detail below in conjunction with the examples.

[0093] There are three hosts in the experimental network, host 1 (IP 1 ) is a server that provides www services to the outside world, host 2 (IP 2 ) is the internal www server, host 3 (IP 3 ) for common hosts.

[0094] Divide the attack into three phases: detection (C 1 ), privilege escalation (C 2 ) and invasion (C 3 ).

[0095] Let α=10.

[0096] Vulnerabilities found on each host with the vulnerability scanning tool are:

[0097] V → IP 1 ′ = { v · 1 ′ , v · 2 ′ , . . . , v · ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network security situation assessment method in an offensive and defensive confrontation environment, belonging to the technical field of network information security. The present invention is based on the different stages in the process of hackers implementing a complete attack, combined with the topology of the protected network in the attack-defense confrontation environment, the actual attack information and potential attack information collected by the intrusion detection system (IDS) in different attack stages, and network scanning equipment Based on the collected vulnerability information, build a network security situation assessment model, and design corresponding quantitative assessment algorithms to provide security situation information with more reasonable granularity, so that security administrators can take effective preventive and countermeasures in a timely manner to ensure network security .

Description

technical field [0001] The invention relates to a network security situation assessment method in an attack-defense confrontation environment, and belongs to the technical field of network information security. Background technique [0002] The so-called network security situation refers to the state and trend of threats faced by the network. Real-time and dynamic network security situation assessment can enable security managers to accurately grasp the security status and trends of the network, fully understand the risks existing in the network, formulate and adjust security prevention strategies in a timely manner, and eliminate security risks in the bud. [0003] Network security situation assessment is a new direction in the field of network information security. The construction of network security situation assessment model and the design of assessment algorithm are its core technologies. How to realize quantitative assessment is the difficulty of research. [0004] T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/26H04L12/24
Inventor 胡昌振姚淑萍
Owner BEIJING INSTITUTE OF TECHNOLOGYGY