Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network-security-risk analysis method based on network node vulnerability and attack information

A network node and network security technology, applied in the field of network security, can solve problems such as inaccurate security risk analysis results and incomplete static information acquisition, so as to improve analysis capabilities, improve network risk analysis results, and ensure security.

Active Publication Date: 2016-08-17
STATE GRID CORP OF CHINA +5
View PDF3 Cites 55 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to overcome the deficiencies in the prior art, provide a network security risk analysis method based on network node vulnerability and attack information, and solve the problem of inaccurate security risk analysis results caused by incomplete static information acquisition in the prior art technical issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network-security-risk analysis method based on network node vulnerability and attack information
  • Network-security-risk analysis method based on network node vulnerability and attack information
  • Network-security-risk analysis method based on network node vulnerability and attack information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0045] The theoretical basis of related concepts in the present invention is as follows:

[0046] Information system: It is composed of computers and related and supporting equipment and facilities (including networks). It is a man-machine system that collects, processes, stores, transmits, and retrieves information according to certain application objectives and rules;

[0047] Threat: A potential cause of an undesired incident that could result in harm to a system or organization;

[0048] Vulnerability: An asset or a weakness of several assets that may be exploited by a threat;

[0049] Associations include physical associations and logical associations. Physical associations include physic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network-security-risk analysis method based on network-node vulnerability and attack information. The network-security-risk analysis method includes the following steps that 1, the index required by computing the threat degree of a network system is determined; 2, the network topology structure, the network asset property and network asset vulnerability information are obtained; 3, a vulnerability correlation relationship module based on a Petri network is built; 4, attack information detected by an IDS safety device is obtained, and the correlation relationship module is perfected through the attack information; 5, the threat degrees of all nodes in the network system are computed; 6, the network security risk is analyzed according to the threat degree value of all the nodes. According to the network-security-risk analysis method, the vulnerability correlation relationship module of the Petri network built in static analysis is updated in real time through the detected attack information in real time, the threat degrees of all the nodes are accurately computed, the network-risk analysis result is perfected, the analytical ability of the network risk is improved, and the safety of the network is effectively guaranteed.

Description

technical field [0001] The invention relates to a method for constructing a model based on network node vulnerability and attack information and using the model for network security risk analysis, belonging to the technical field of network security. Background technique [0002] In recent years, with the development of technology, computers have been continuously popularized, and the Internet industry has entered a stage of rapid development. The Internet has become an indispensable and important part of people's lives. However, the rapid development of Internet technology has also brought about increasingly prominent network security issues. Traditional passive security defenses have gradually failed to meet the needs. Researchers have devoted themselves to proposing security analysis methods. The key technology to operate and provide a scientific basis for information security is to use scientific methods and means to systematically analyze the risks faced by the network ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/14H04L63/1416H04L63/1433
Inventor 王红凯张旭东杨维永于晓文黄益彬郭子昕秦学嘉丁晓玉栾国强黄宇腾
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products