Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security emergency processing method and system based on analytic hierarchy process

An analytic hierarchy process and emergency response technology, applied in the field of information security, can solve problems such as the inability to clearly provide emergency response plans, complex calculation of risk assessment algorithms, and unclear risk ratings, etc., to shorten the emergency response cycle, curb the spread of security risks, The effect of simple system architecture

Active Publication Date: 2017-07-18
ZHEJIANG PONSHINE INFORMATION TECH CO LTD
View PDF4 Cites 70 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the risk assessment algorithm can eliminate the impact caused by the unreasonable selection of assessment factors and the inability to objectively reflect the system status through risk correlation analysis, the risk assessment algorithm has complex calculations, a large amount of data, and unclear risk ratings. Sexual emergency response plan

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security emergency processing method and system based on analytic hierarchy process
  • Security emergency processing method and system based on analytic hierarchy process
  • Security emergency processing method and system based on analytic hierarchy process

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] Such as figure 2 As shown, the safety emergency response method based on the analytic hierarchy process in this embodiment 1 specifically includes the following steps:

[0080] Step A1: Determine the risk assessment object;

[0081] Step A2: Determine whether the risk assessment object is in a special scene, if so, go directly to step A11 for risk level assessment, otherwise go to step A3;

[0082] Among them, referring to Table 1, the judgment indicators for special scenarios include network security domain and asset security attributes. The network security domain includes three secondary indicators of the public network, DCN, and intranet, and its risk portfolio includes three combinations of {public network, DCN}, {public network, intranet}, and {public network, DCN, intranet}. The combination mainly considers the impact on intranet assets after being attacked in the direction of the public network; asset security attributes include five secondary indicators of v...

Embodiment 2

[0181] Such as Figure 7 As shown, the present invention is based on the AHP-based security emergency response method, and also designs a security emergency response system based on the AHP, including a judgment module, an index construction module, an index assignment module, a calculation module, an evaluation module and a disposal module. The judgment module is used to judge whether the risk assessment object is in a special scene; the index construction module is used to construct the index system of assets, vulnerabilities and threats for the risk assessment object; the index assignment module is used to evaluate the asset index, vulnerability index and threat The calculation module is used to calculate the scores of asset losses and security incidents and obtain the corresponding risk value; the evaluation module is used to divide the risk level according to the size of the risk value; the disposal module is used to propose corresponding measures for different risk levels...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the information security technology field and more particularly, to a security emergency processing method and system based on analytic hierarchy process. The method comprises the following steps: S1) determining a risk evaluation object; S2) determining whether the risk evaluation object is located in a special scene or not; if the risk evaluation object is, then, switching to the step 5; otherwise, constructing an index system featuring the asset, the vulnerability and the threat; S3) assigning a score to the asset index; using the analytic hierarchy process to assign scores to the vulnerability index and the threat index; calculating the scores of asset loss and the security event and obtaining the corresponding risk values; S4) according to the risk values, dividing the security levels; and S5) proposing different processing policies according to the different risk levels. According to the invention, the method and the system integrate the security risks of the asset importance, the vulnerability degree and the threat and then, further, quantify and divide them into different levels, which effectively shortens the emergency processing cycle of a security event, contains the spreading of the security risk and raises the overall security emergency efficiency.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a security emergency response method and system based on analytic hierarchy process. Background technique [0002] With the rapid development of the mobile Internet, cloud computing is further implemented, and NFV (Network Function Virtualization) technology is becoming more and more mature and commercialized. Under a huge IT architecture, security risks will further expand, such as intrusion attacks, web page tampering, DDoS and other security risks. The probability of occurrence of incidents and the scope of protection will increase accordingly, and new security risks will also emerge. Therefore, new requirements are put forward for safety protection technology, safety risk management, and emergency response methods. [0003] After a security incident occurs, it not only affects normal business operations, but also causes very bad social impact. The l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q10/06
CPCG06Q10/0635
Inventor 陈晓莉章亮徐菁马峰林建洪黄勇
Owner ZHEJIANG PONSHINE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products