Unlock instant, AI-driven research and patent intelligence for your innovation.

A network security situation assessment method

A network security and situation assessment technology, applied in the assessment field, can solve the problems of complex vulnerability assessment model and low accuracy of assessment results, and achieve the effect of high accuracy, overcoming differences, and simple overall assessment model.

Inactive Publication Date: 2017-12-26
HENAN POLYTECHNIC UNIV
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The global security situation assessment method first establishes a vulnerability assessment model based on the attack graph or Bayesian network, and then evaluates the overall security status of the system according to the status of all vulnerabilities in the system, and based on experience or vulnerability assessment system (CVSS, Common Vulnerability Scoring System) to obtain the probability of each vulnerability being successfully exploited; however, the vulnerability assessment model of the existing global security situation assessment method is relatively complex, and the accuracy of the assessment results is low
[0004] It can be seen that in the prior art, the network security situation assessment method has problems such as low accuracy of assessment results.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network security situation assessment method
  • A network security situation assessment method
  • A network security situation assessment method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0028] figure 1 It is an overall flow chart of the network security situation assessment method of the present invention. Such as figure 1 As shown, the network security situation assessment method of the present invention includes the following steps:

[0029] Step 1. After uniformly numbering the corresponding vulnerability information, network attack information, and attack evidence collected by the vulnerability scanning tool or the intrusion detection system, generate a vulnerability list, an atomic attack list, and an attack evidence list respectively.

[0030] Step 2. Taking the corresponding atomic attack and attack evidence as nodes, and taking the causal relationship between the corresponding atomic attack and attack evidence ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network security situation assessment method, including: generating a vulnerability list, an atomic attack list, and an attack evidence list according to the collected vulnerability information, network attack information, and attack evidence; establishing a Bayesian network; obtaining atomic attack posterior Probability; detect whether the causal relationship between atomic attack and attack evidence in Bayesian network is true; establish network attack system architecture, generate Bayesian attack graph; obtain atomic attack node attack probability; obtain vulnerability threat degree, and It is divided into three levels: Root authority level, User authority level, and None authority level; according to the three levels of vulnerability threat levels and the corresponding early warning values ​​of the three levels, it displays the overall assessment results of the network security situation. When the vulnerability threat level Alarm when exceeding the warning value corresponding to the three levels. The invention has the characteristics of simple model, accurate evaluation result, wide application range and the like, and can be widely used in the field of network security.

Description

technical field [0001] The invention relates to assessment technology, in particular to a network security situation assessment method. Background technique [0002] With the development of science and technology, network security issues have already become the focus of attention. In recent years, the number of network attack incidents has continued to increase. Various scientific research units study various security technical measures, evaluate network security situation, and prevent or even solve network attack problems. In the network security situation assessment technology, vulnerability exploit threat assessment technology has always been a key technology in the field of security situation assessment. [0003] Vulnerability utilization threat assessment methods include vulnerability severity assessment method and global security situation assessment method. The vulnerability severity assessment method mainly evaluates the severity of each vulnerability based on the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/06
Inventor 王辉芦碧波申自浩雒芬王云峰张长森
Owner HENAN POLYTECHNIC UNIV