Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for monitoring the degree of system attack

A technology of degree and attack effect, applied in the field of information security, it can solve the problems of low accuracy, complex calculation of the degree of attack of the system, inability to accurately and efficiently determine the degree of attack of the system, etc., to achieve reliable data support, and the process is simple and convenient. , low-complexity effects

Inactive Publication Date: 2018-09-04
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For data destruction attacks, most of the usual methods for determining the degree of system attack have the defects of complex calculation and low accuracy, so it cannot accurately and efficiently determine the degree of attack of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for monitoring the degree of system attack
  • Method and device for monitoring the degree of system attack
  • Method and device for monitoring the degree of system attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not used to limit the present invention.

[0024] figure 1 It shows a flowchart of a method for monitoring the degree of attack of a system according to an embodiment of the present invention, and the method can be implemented by a computer. Such as figure 1 As shown, the method may include: step S1, collecting data information of at least one data destruction attack effect evaluation index. For example, the data destruction attack effect evaluation index may be: the number of tampered user account information, the number of deleted user account information, the number of added user account information, the number of tampered registry keys, the number of deleted registry keys , The number of registry keys ad...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method and apparatus for monitoring degree of attack on a system. The method comprises: collecting data information of at least one data-corruption attack effect evaluation indicator, wherein data-corruption attack effect evaluation indicators are the number of pieces of falsified user account information, the number of deleted user account information, the number of added user account information, the number of falsified registry keys, the number of deleted registry keys, the number of added registry keys, the number of falsified files, the number of deleted files, the number of added files, the number of terminated processes, and the number of created processes; determining an attack effect value of each data-corruption attack effect evaluation indicator according to the date information of each data-corruption attack effect evaluation indicator; and determining degree of attack on a target system according to the attack effect value of each data-corruption attack effect evaluation indicator and a weight of each data-corruption attack effect evaluation indicator. Therefore, degree of attack on a system can be accurately monitored.

Description

Technical field [0001] The invention relates to the field of information security, and in particular to a method and device for monitoring the degree of system attack. Background technique [0002] Cyberspace with computer networks as the main body is replacing traditional communication methods, becoming an important communication infrastructure for human society, and profoundly affecting and changing human communication methods and production and lifestyles. However, with the continuous development of network information technology, various network attack methods are emerging in an endless stream, threatening the data security of information systems to become more and more serious, and at the same time threatening national security. Therefore, it is very important to monitor the security of information system data. [0003] One aspect of monitoring the security of information system data is to determine the degree of system attack. At present, common network attacks can be divid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55H04L29/06
CPCG06F21/554H04L63/1408
Inventor 姚珊李兴省邹潇湘陈娟娟高昕唐积强王锟董琳李肖坚
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT