Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Network security situation evaluation method

A situation assessment and network security technology, applied in the field of network security, can solve problems such as insufficient evaluation elements, difficult determination of host weights, and influence on the accuracy of security situation

Active Publication Date: 2017-05-31
SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN
View PDF16 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are two problems in the current method: one is that when the network system is divided into individual hosts, the weight of the hosts is not easy to determine; the other is the factors that affect the security situation, that is, the evaluation elements are not comprehensive enough
These issues affected the accuracy of the final assessment of the security posture

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security situation evaluation method
  • Network security situation evaluation method
  • Network security situation evaluation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to clearly illustrate the technical features of this solution, the present invention will be described in detail below through specific implementation modes and in conjunction with the accompanying drawings. The following disclosure provides many different embodiments or examples for implementing different structures of the present invention. To simplify the disclosure of the present invention, components and arrangements of specific examples are described below. Furthermore, the present invention may repeat reference numerals and / or letters in different instances. This repetition is for the purpose of simplicity and clarity and does not in itself indicate a relationship between the various embodiments and / or arrangements discussed. It should be noted that components illustrated in the figures are not necessarily drawn to scale. Descriptions of well-known components and processing techniques and processes are omitted herein to avoid unnecessarily limiting the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security situation evaluation method. The method comprises the following steps: 1) determining the importance weights of network devices and hosts; 2) separately evaluating the network devices and hosts; and 3) integrating the evaluation results of the network devices and hosts into an evaluation result of the whole network system. According to the network security situation evaluation method disclosed by the invention, with the device assets as the center, the evaluation process is divided into three stages: the first stage is to determine the importance weights of network devices and hosts; the second stage is to separately evaluate the network devices and hosts; and the third stage is to integrate the evaluation results of the network devices and hosts into the security situation of the whole network. For the evaluation of a single device asset, the evaluation factors are divided into 8 categories, which are attacker capability, attack consequences, vulnerability damages, vulnerability transmission, security measures, security configuration correctness, security strategy and security strategy implementation, and the security situation is quantified from the perspective of threat and defense.

Description

technical field [0001] The invention relates to a network security situation assessment method, which belongs to the technical field of network security. Background technique [0002] With the popularization of Internet applications, the scale of the network is getting larger and more complex. Correspondingly, network attacks are also developing in the direction of distribution, scale, and complexity. For network administrators, there is an urgent need for security products that can display the overall situation of network security. [0003] The so-called network security situation refers to the network security status composed of various factors such as network attack behavior and network defense measures, which can be expressed, and displayed in the form of numerical quantification. Network security situation assessment can help network managers understand the current state of network security and take targeted security measures to prevent potential risks. [0004] At p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1433H04L63/20
Inventor 王继志杨光陈丽娟杨英
Owner SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products