A 5G network security risk assessment method

A network security and risk assessment technology, applied in the field of 5G network security risk assessment, can solve problems such as not being able to reflect the status quo of 5G network security

Active Publication Date: 2019-07-16
UNIV OF SCI & TECH BEIJING
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The technical problem to be solved by the present invention is to provide a 5G network security risk assessment method to solve the problem that the traditional mobile network security risk assessment technology in the prior art can no longer reflect the security status of the 5G network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A 5G network security risk assessment method
  • A 5G network security risk assessment method
  • A 5G network security risk assessment method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] In order to make the technical problems, technical solutions and advantages to be solved by the present invention clearer, the following will describe in detail with reference to the drawings and specific embodiments.

[0060] The present invention provides a 5G network security risk assessment method for the problem that the existing traditional mobile network security risk assessment technology can no longer reflect the security status of the 5G network.

[0061] see figure 1 As shown, the 5G network security risk assessment method provided by the embodiment of the present invention includes:

[0062] S101, identifying the assets in the network, evaluating the attribute values ​​of the assets in terms of confidentiality, integrity, availability, multi-party trustworthiness and auditability, the network is a 5G network;

[0063] S102, identify vulnerable points in the network, and evaluate the impact value of the vulnerable points on confidentiality, integrity, availa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a 5G (5th-generation) network security risk assessment method, which can objectively reflect the 5G network security situation. The method comprises the steps of identifying assets in a network; assessing the attribute values of the assets in the aspects of confidentiality, integrity, availability, multiaspect trustworthiness and auditability, wherein the network is a 5G network; identifying the vulnerabilities in the network; assessing the influence values of the vulnerabilities on the aspects of confidentiality, integrity, availability, multiaspect trustworthiness and auditability; calculating the loss value of the network after the attack by an attacker according to the attribute values and the influence values obtained through assessment; calculating the attacked probability of the vulnerabilities in the network; calculating the security risk value of the network according to the loss value of the network after the attack by the attacker and the vulnerability attacked probability obtained through calculation. The 5G network security risk assessment method is applicable to the technical field of 5G network security.

Description

technical field [0001] The invention relates to the technical field of 5G network security, in particular to a 5G network security risk assessment method. Background technique [0002] The 5G network shoulders the heavy responsibility of meeting the new needs of future communications. It will be an important cornerstone for comprehensive connectivity and mobile informatization, and will change our lives through many new application methods. Obviously, under the new communication requirements and application environment, 5G networks will naturally have significantly different requirements in terms of security. [0003] In the traditional mobile communication network, the main communication purpose of people is to communicate with other terminals by voice, short message or video. People enjoy fast Internet services and use mobile APPs through smart phones. For the 5G era, mobile communication networks will not only serve individual consumers, but more importantly, will serve ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/12
CPCH04L63/1416H04L63/20H04W12/12
Inventor 林福宏周贤伟孙玉霞姚琳安建伟许海涛林久智
Owner UNIV OF SCI & TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products