Network security posture assessment method

A network security and situation assessment technology, applied in the assessment field, can solve the problems of complex vulnerability assessment models and low accuracy of assessment results, achieving high accuracy, overcoming differences, and simple overall assessment models

Inactive Publication Date: 2015-03-04
HENAN POLYTECHNIC UNIV
View PDF1 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The global security situation assessment method first establishes a vulnerability assessment model based on the attack graph or Bayesian network, and then evaluates the overall security status of the system according to the status of all vulnerabilities in the system, and based on experience or vulnerability assessment system (CVSS, Common Vulnerability Scoring System) to obtain the probability of each vulnerability being successfully exploited; however, the vulnerability assessment model of the existing global security situation assessment method is relatively complex, and the accuracy of the assessment results is low
[0004] It can be seen that in the prior art, the network security situation assessment method has problems such as low accuracy of assessment results.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security posture assessment method
  • Network security posture assessment method
  • Network security posture assessment method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0025] figure 1 It is an overall flow chart of the network security situation assessment method of the present invention. like figure 1 As shown, the network security situation assessment method of the present invention includes the following steps:

[0026] Step 1. After uniformly numbering the corresponding vulnerability information, network attack information, and attack evidence collected by the vulnerability scanning tool or the intrusion detection system, generate a vulnerability list, an atomic attack list, and an attack evidence list respectively.

[0027] Step 2. Taking the corresponding atomic attack and attack evidence as nodes, and taking the causal relationship between the corresponding atomic attack and attack evidence as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network security posture assessment method. The method comprises the following steps: producing a vulnerability list, an atomic attack list and an attack evidence list according to the acquired vulnerability information, network attack information and attack evidence; creating a bayesian network; acquiring atomic attack posterior probability; detecting the authenticity of the causal relationship between the atomic attack and the attack evidence in the bayesian network; building a network attack system framework and producing a bayesian attack graph; acquiring node attack probability of atomic attack; acquiring vulnerability threat degree and dividing into three levels, namely, Root authority level, User authority level and None authority level; displaying the overall assessment result of the network security posture according to the three levels of the vulnerability thread degree and early warning values corresponding to the three levels; performing early warning when the vulnerability thread degree exceeds the early warning levels corresponding to the three levels. The network security posture assessment method has the characteristics of being simple in model, accurate in assessment result and wide in applicable scope, and can be widely applied to the field of network security.

Description

technical field [0001] The invention relates to assessment technology, in particular to a network security situation assessment method. Background technique [0002] With the development of science and technology, network security issues have already become the focus of attention. In recent years, the number of network attack incidents has continued to increase. Various scientific research units study various security technical measures, evaluate network security situation, and prevent or even solve network attack problems. In the network security situation assessment technology, vulnerability exploit threat assessment technology has always been a key technology in the field of security situation assessment. [0003] Vulnerability utilization threat assessment methods include vulnerability severity assessment method and global security situation assessment method. The vulnerability severity assessment method mainly evaluates the severity of each vulnerability based on the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
Inventor 王辉芦碧波申自浩雒芬王云峰张长森
Owner HENAN POLYTECHNIC UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products