Network threat situation evaluation method and device

A situation assessment and network technology, applied in the computer field, can solve the problems of low efficiency and low accuracy, and achieve the effect of ensuring accuracy, improving accuracy, and avoiding the consumption of manpower and material resources

Active Publication Date: 2017-10-03
SUNINFO INFORMATION TECH
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] One purpose of this application is to provide a network threat situation assessment method and equipment to solve the problems of low efficiency and low accuracy caused by threat situation assessment of network systems in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network threat situation evaluation method and device
  • Network threat situation evaluation method and device
  • Network threat situation evaluation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The application will be described in further detail below in conjunction with the accompanying drawings.

[0065] In a typical configuration of the present application, the terminal, the device serving the network and the trusted party all include one or more processors (CPUs), input / output interfaces, network interfaces and memory.

[0066] Memory may include non-permanent storage in computer-readable media, in the form of random access memory (RAM) and / or nonvolatile memory, such as read-only memory (ROM) or flash memory (flashRAM). Memory is an example of computer readable media.

[0067] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), sta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims at providing a network threat situation evaluation method and device. According to the method and the device, to-be-evaluated network detection data in a network system is obtained; the to-be-evaluated network detection data is preprocessed, thereby obtaining target network detection data; and network threat situation evaluation is carried out on the target network detection data, thereby obtaining a threat situation evaluation result of the network system. The consumption of manpower and material resources for artificially collecting and processing the to-be-evaluated network detection data can be avoided; the evaluation efficiency of carrying out the network threat situation evaluation on the target network detection data needing to be evaluated is improved; moreover, the accuracy of the target network detection data is ensured and a current threat situation of the network can be accurately reflected by the obtained threat situation evaluation result; and the network thread situation smart evaluation is carried out on the network system, and moreover, the accuracy of carrying out the network thread situation evaluation on the network system is improved.

Description

technical field [0001] The present application relates to the field of computers, and in particular to a method and device for network threat situation assessment. Background technique [0002] With the rapid popularization of the Internet, there are more and more attacks against the network, and the attack methods and attack technologies are constantly updated. Although network security technologies such as firewalls and intrusion detection systems are becoming more and more mature, in reality, there are always some attacks that can succeed. Practice has proved that the pre-identification of computer network security risks and the assessment of network security are very important, which objectively requires us to have a complete security assessment system and strengthen the security assessment of the network. [0003] However, in the existing network information security assessment technology, since there is no unified assessment standard, in the process of network informat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/302
Inventor 葛阿雷张山林陈鹏飞
Owner SUNINFO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products