Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for monitoring degree of attack on system

A technology of degree and attack effect, applied in the field of information security, can solve the problems of inability to accurately and efficiently determine the degree of system attack, complex calculation of system attack degree, low accuracy rate, etc., and the realization process is simple and convenient, supported by reliable data , the effect of low complexity

Inactive Publication Date: 2015-11-11
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
View PDF1 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For data destruction attacks, most of the usual methods for determining the degree of system attack have the defects of complex calculation and low accuracy, so it cannot accurately and efficiently determine the degree of attack of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for monitoring degree of attack on system
  • Method and apparatus for monitoring degree of attack on system
  • Method and apparatus for monitoring degree of attack on system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0024] figure 1 A flow chart of a method for monitoring the degree of system attack according to an embodiment of the present invention is shown, and the method may be implemented by a computer. like figure 1 As shown, the method may include: step S1, collecting data information of at least one data destruction attack effect evaluation index. For example, the data destruction attack effect evaluation index may be: the number of user account information that has been tampered with, the number of user account information that has been deleted, the number of user account information that has been added, the number of registry keys that have been tampered with, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method and apparatus for monitoring degree of attack on a system. The method comprises: collecting data information of at least one data-corruption attack effect evaluation indicator, wherein data-corruption attack effect evaluation indicators are the number of pieces of falsified user account information, the number of deleted user account information, the number of added user account information, the number of falsified registry keys, the number of deleted registry keys, the number of added registry keys, the number of falsified files, the number of deleted files, the number of added files, the number of terminated processes, and the number of created processes; determining an attack effect value of each data-corruption attack effect evaluation indicator according to the date information of each data-corruption attack effect evaluation indicator; and determining degree of attack on a target system according to the attack effect value of each data-corruption attack effect evaluation indicator and a weight of each data-corruption attack effect evaluation indicator. Therefore, degree of attack on a system can be accurately monitored.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method and device for monitoring the degree of system attack. Background technique [0002] The cyberspace with computer network as the main body is replacing traditional communication methods and becoming an important communication infrastructure in human society, and it is also profoundly affecting and changing human communication methods, production and lifestyles. However, with the continuous development of network information technology, various network attack methods emerge in an endless stream, which threatens the data security of information systems more and more seriously, and also threatens national security. Therefore, it is very important to monitor the security of information system data. [0003] One part of monitoring the security of information system data is to determine the extent of the system being attacked. At present, common network attacks ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55H04L29/06
CPCG06F21/554H04L63/1408
Inventor 姚珊李兴省邹潇湘陈娟娟高昕唐积强王锟董琳李肖坚
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT