Network equipment risk assessment method

A technology for network equipment and risk assessment, applied in the field of network security, to achieve the effect of eliminating ambiguity, eliminating ambiguity transmission, and having strong applicability

Inactive Publication Date: 2017-05-17
THE PLA INFORMATION ENG UNIV
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the deficiencies in the prior art, the present invention provides a network equipment risk assessment method to solve the defects of the two-dimensional risk matrix in risk assessment, including increasing the risk attribute dimension from the perspective of risk control to make the assessment more reasonable; The

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network equipment risk assessment method
  • Network equipment risk assessment method
  • Network equipment risk assessment method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] Embodiment one, see figure 2 As shown, a network equipment risk assessment method includes the following steps:

[0066] Step 1. With reference to the historical data and characteristics of similar equipment, evaluate the risk event probability P, and classify according to the evaluation results;

[0067] Step 2. Evaluate the induced loss L according to the known risk set and the degree of deviation from the target value, and classify according to the evaluation results;

[0068] Step 3. Evaluate the controllability M by using the triangular intuitionistic fuzzy number according to the controllability evaluation experience, and determine the M level;

[0069] Step 4. Construct a fuzzy three-dimensional risk matrix based on the evaluation results and classification levels of risk event occurrence probability P, induced loss L, and controllability M, and formulate fuzzy rules based on experience and historical data. Among them, fuzzy three-dimensional risk The input va...

Embodiment 2

[0075] Embodiment two, see Figure 2-8 As shown, a network equipment risk assessment method includes the following contents:

[0076] Step 1. With reference to the historical data and characteristics of similar equipment, evaluate the risk event probability P, and classify according to the evaluation results;

[0077] Step 2. Assume that the occurrence of risk causes the target value to change from C 0 Deviate to C, then its degree of deviation Δ is:

[0078] Δ=|C-C 0 |

[0079] The induction loss L is expressed as:

[0080]

[0081] , where R is the known risk set, y is any risk in R, and L∈(0,1] is obtained to determine the division level of L;

[0082] Step 3. Evaluate the controllability M based on the controllability evaluation experience and use the triangular intuitionistic fuzzy number, and determine the M level, including the following contents:

[0083] Step 3.1. Collect empirical data for controllability judgment, display it in the form of triangular intuit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network equipment risk assessment method, and the method comprises the steps: enabling risk controllability to serve as a third dimension attribute of assessment on the basis of a two-dimensional risk matrix, wherein the risk controllability is used for describing the risk control difficulty; enabling the risk importance to be used for completely describing the risk size, wherein the function relation between the risk importance and the probability, loss and controllability is expressed by a risk function; expressing the risk importance degrees of three attributes through indexes in a risk function expression; and extending the input of the risk matrix to an infinite series from a finite series. The method irons out the defects of a two-dimensional risk matrix during risk assessment, increases the attribute dimensions of risks from a risk control angle, and enables the assessment to be more reasonable. The series of an input variable approaches to infinite, thereby enabling an input value to be precise. The method determines a specific risk assessment function, and obtains a unique risk ordering result according to the risk importance, effectively guides the risk control practice, and is higher in universality.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to a network equipment risk assessment method. Background technique [0002] The normal operation of network equipment is an important cornerstone of network security. Risk assessment of network equipment is crucial to prevent network security issues from happening. Classical risk assessment theory believes that risk is the combination of the probability of adverse events and the consequences of adverse events. As a relatively simple risk assessment method, the two-dimensional risk matrix is ​​widely used in the risk assessment of network equipment, but the singleness of the description angle and the ambiguity of the description method also make the assessment results of the two-dimensional risk matrix unable to effectively guide the risk. control practice. [0003] Two-dimensional risk matrix, such as figure 1 As shown, it is widely used in risk assessment in engineeri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/20
Inventor 韩继红章丹林袁霖谷文范钰丹张畅宋佳良
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products