Network safety evaluation method and device based on configuration check

A network security assessment and security technology, applied in the field of information security, can solve problems such as poor intuition of risk assessment methods

Inactive Publication Date: 2017-10-24
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT +1
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a network security assessment method and device based on

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network safety evaluation method and device based on configuration check
  • Network safety evaluation method and device based on configuration check
  • Network safety evaluation method and device based on configuration check

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0049] The terms "first", "second", "third" and / or "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and It is not necessarily used to describe a particular order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein, for example, can be practiced in sequ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network safety evaluation method and device based on configuration check. The network safety evaluation method comprises obtaining information of M target devices of a target system, wherein the information of the target devices comprises types and internet protocols (IP) of the target devices, and M is an integer which is larger than or equal to 1; aiming at each target device, obtaining a baseline check template corresponding to the type of the target device, wherein the baseline check template includes a baseline check item and a baseline safety discrimination rule corresponding to the baseline check item; obtaining configuration information of a baseline item to be checked of the target device in dependence on the IP of the target device and the baseline check item included in the baseline check template; determining the value-at-risk of the target device in dependence on the configuration information of the baseline item to be checked and the baseline safety discrimination rule; and furthermore determining the value-at-risk of the target system. The network safety evaluation method and device based on configuration check can solve the problem that the existing ICS risk evaluation method is poor in visualization.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a network security evaluation method and device based on configuration verification. Background technique [0002] Industrial Control System (Industrial Control System, referred to as: ICS) controls the operation of modern industrial infrastructure (such as power system, oil and gas system, chemical industry system, water conservancy system, traffic control system and industrial manufacturing system, etc.). With the development of modern industrial infrastructure, ICS has transformed from a closed and isolated system to an open and interconnected system. The above-mentioned transformation process brings risks to the information security of ICS. Generally, a risk assessment of ICS is required to evaluate the security of ICS and take remedial measures in time for the risks faced by ICS. [0003] Generally, the ICS of large-scale industrial customers includes equipment...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
Inventor 黄元飞李燕伟王博杨鹏高强陈亮应志军林星辰王鹏翩张家旺吴倩杜薇陈禹张淼
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products