Method for generating big data security posture map based on trusted computing

A technology of trusted computing and security posture, applied in the field of network security, can solve problems that are difficult to identify effectively, and achieve the effect of ensuring comprehensiveness

Active Publication Date: 2016-12-07
重庆市大夔文化传播有限公司
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to the description of Chinese information security experts in the book "Software Behavior", behavioral security should include: behavioral confidentiality, behavioral integrity, and behavioral authenticity. In terms of situation maps, people are now doing more research How to ensure the confidentiality and integrity of the information, but it is difficult to effectively identify the authenticity of the behavior, such as some background time or harmless emergency security incidents, which brings inconvenience to operators. little trouble

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating big data security posture map based on trusted computing
  • Method for generating big data security posture map based on trusted computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention is further described in conjunction with the following examples.

[0044] like figure 1 The shown method for generating a big data security situation map based on trusted computing includes the following steps:

[0045] (1) Utilize MAPX software, use the geographic map where the network is located as a background layer, divide the network into multiple nodes and links connecting two nodes, and map the nodes and links to the background layer;

[0046] (2) collect network information data by a variety of data collectors, authenticate hardware nodes in the network for information collection, judge the credibility of network hardware nodes, and establish trust relationships for collected information. The data collector uses Syslog The collection method is mainly based on Snmp as a supplementary collection method, and the collection of network information data is completed by configuring different network security devices; the network information data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for generating a big data security posture map based on trusted computing. The method for generating a trusted security posture map based on a geographical map, security data acquisition and the like, the credibility of information data acquisition of a trusted network is guaranteed, and alarm information is filtered and aggregated based on an algorithm for degree of nearness; events which cannot affect the security are removed from the normal alarm, so that the security hole is avoided while the disturbance to a monitor is reduced; the authenticity of trusted security behaviors of the posture map is higher; an overall map generation trusted environment from trusted data acquisition to merging and filtering to alarm generation and posture map generation is constructed, so that the trusted security, the integrity and the authenticity of the security posture map are guaranteed, the credibility of the posture map is guaranteed, and a trusted access and display mechanism is constructed on the basis of characteristics with a protection function, authentication and integrity measurement and the like.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method for generating a big data security situation map based on trusted computing. Background technique [0002] With the expansion of network scale, the data volume of alarm information is increasing. How to effectively distinguish valid information and remove redundancy is also a difficulty in network security protection. In related technologies, there are too many human and subjective factors in the information security risk management system, and a scientific management method is lacking. There is an urgent need for a method that can understand the status and future trends of the entire network, be able to respond to threats and attacks on the network, re-adjust the configuration of network security resources and make security response strategies. [0003] Regarding the concept of trusted computing, the following definition is given in the ISO / IEC 15408 standard:...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1433H04L63/20
Inventor 陈祖斌谢铭胡继军翁小云袁勇邓戈锋莫英红谢菁张鹏唐玲丽黄连月郑俊明苏宇琦王海宋骏豪
Owner 重庆市大夔文化传播有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products