Data processing method and device

A data processing and indexing technology, applied in the field of network security, which can solve the problems of insufficient consideration of security situation statistics and inaccurate network security situation assessment results, and achieve accurate asset security situation assessment results, improve reliability, and statistics. Comprehensive effect of data

Active Publication Date: 2016-04-20
BEIJING AN XIN TIAN XING TECH CO LTD
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these existing data processing methods do not fully consider the statistical data of the security situation, r

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device
  • Data processing method and device
  • Data processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0054] Example one

[0055] figure 1 It is a schematic flow diagram of a data processing method in the security situation assessment process at the asset level provided in the first embodiment of the present invention. Such as figure 1 As shown, the method includes the following steps:

[0056] S11. Obtain the weight value, asset vulnerability index and asset threat index of the asset value of the specified asset;

[0057] The asset value is the inherent property of the asset, and the asset value is specified when the asset is added. Asset value is the characteristic value of asset importance. In the embodiment of the present invention, after a certain designated asset is determined, the asset value of the designated asset can be obtained, thereby further obtaining the weight value of the asset value.

[0058] In the embodiment of the present invention, the asset value can be divided into core asset A, key asset B, important asset C, general asset D and simple asset E, and the corre...

Example Embodiment

[0145] Example two

[0146] It should be noted that the business system is determined by the business content carried by the asset and divided by customers, such as OA system, mail system, etc. The network security situation assessment at the business system level needs to consider the security status of the assets under the business system. For an asset, the business system is also one of its attributes, used to indicate the business content carried by the asset. Each asset belongs to a business system, and each business system can have multiple assets. There is a one-to-many relationship between business systems and assets.

[0147] The data processing method of the network security situation assessment process at the business system level includes: calculating a business system's business system security index, business system threat index, and business system vulnerability index;

[0148] Among them, the process of calculating the business system security index of a business s...

Example Embodiment

[0181] Example three

[0182] It should be noted that a customer has multiple business systems, so the security status at the customer level is determined by all business systems belonging to the customer. The data processing method of the network security situation assessment process at the customer level includes: calculating the customer safety index, the customer threat index and the customer vulnerability index.

[0183] As a specific embodiment of the present invention, the method for calculating the customer safety index is as follows Figure 7 Shown, including:

[0184] S71. Obtain the security risk indexes of all business systems owned by a customer and the weights of each business system level:

[0185] According to the data processing method described in the second embodiment, the security risk indexes of all business systems owned by a customer are obtained.

[0186] It should be noted that, in the embodiment of the present invention, different business systems are provided...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data processing method and a data processing device. In the method and the device, the obtained asset vulnerability index is related to an asset polling vulnerability index, a bug vulnerability index and a configuration irregularity vulnerability index, and the obtained asset threat index is related to an asset security event threat value, a security alarm threat value and a security event threat value. Moreover, the asset security event threat value, the security alarm threat value and the security event threat value are obtained by processing logs of assets. Thus, when network security situation assessment data is processed, the method and the device consider the result of an asset polling inspection service, a bug inspection service, a configuration irregularity inspection service and integrated log and traffic analysis. Therefore, the data considered and counted by the method and the device is more comprehensive, the asset security situation assessment result obtained by the method and the device is more accurate, and the credibility of the asset security situation assessment result is improved.

Description

technical field [0001] The invention relates to the field of network security, in particular to a data processing method and device. Background technique [0002] With the rapid development of computer and network technology, the scope of application of information systems continues to expand and its importance becomes increasingly prominent. Assets in the network environment always face various security risks. Statistics on these security risks and a quantitative assessment of the overall security situation of network assets will help relevant personnel in information security operations to keep abreast of system security risks and improve organizational security protection capabilities. [0003] At present, for the network security situation, there have been many data processing methods for evaluating the network security situation. However, these existing data processing methods do not fully consider the statistical data of the security situation, resulting in inaccurate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/1433
Inventor 翟建军钟金鑫张涵茗齐志彬李周刘震云
Owner BEIJING AN XIN TIAN XING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products