Website risk value evaluation method and device based on cloud protection and cloud monitoring system

A monitoring system and value-at-risk technology, applied in the field of network security, can solve problems such as inability to comprehensively monitor website security, and no solutions are proposed, so as to achieve the effect of information sharing

Active Publication Date: 2017-11-17
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF1 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing website security monitoring and risk value assessment only rely on statistical analysis of risk vulnerability events, and cannot comprehensively monitor website security
[0004] At present, no effective solution has been proposed for the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Website risk value evaluation method and device based on cloud protection and cloud monitoring system
  • Website risk value evaluation method and device based on cloud protection and cloud monitoring system
  • Website risk value evaluation method and device based on cloud protection and cloud monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] The embodiment of the present invention provides a method for evaluating the risk value of a website based on a cloud protection and cloud monitoring system, see figure 1 As shown, the method includes the following steps:

[0055] S101: Obtain monitoring data of the target website. The monitoring data includes monitoring data belonging to different impact factors. The impact factors include: attacked events, WEB vulnerability events, and historical intrusion events.

[0056] The cloud protection platform can effectively analyze, calculate and intercept network attacks and intrusions. Specifically, it can clean the access traffic of hosted websites, intercept attack behaviors, release normal access to ensure the safe operation of rear websites, and pass Real-time stream processing records access and attack records.

[0057] The cloud monitoring system can perform basic resource information detection, security event detection, website vulnerability detection, and website finger...

Embodiment 2

[0106] The embodiment of the present invention provides a website risk value evaluation device based on cloud protection and cloud monitoring system, see Figure 5 As shown, the device includes: an impact factor data acquisition module 51, a risk value calculation module 52 for each impact factor, and a website risk value synthesis module 53.

[0107] Among them, the impact factor data acquisition module 51 is used to acquire the monitoring data of the target website. The monitoring data includes monitoring data belonging to different impact factors. The impact factors include: attacked events, WEB vulnerability events, historical intrusion events; each impact factor risk The value calculation module 52 is used to calculate the risk value of the target website under the influence of different influence factors to obtain multiple risk values; the website risk value synthesis module 53 calculates the weighted sum of multiple risk values ​​to obtain the comprehensive risk value of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a website risk value evaluation method and a device based on a cloud protection and cloud monitoring system, and relates to the technical field of network security. The method comprises the following steps of acquiring the monitoring data of a target website, wherein the monitoring data comprise the monitoring data of different influence factors, and the influence factors comprise attacked events, web vulnerability events and historical intrusion events; respectively calculating the risk values of the target website under the influences of different influence factors to obtain a plurality of risk values; calculating the weighted sum of the plurality of risk values to obtain a risk value comprehensive score of the target website, wherein the risk value comprehensive score is used for determining the probability that the target website is attacked. According to the method, multiple aspects, including historical invasion events, web vulnerability events and attacked events and the like, are comprehensively analyzed, so that the risk value of the website can be comprehensively and accurately evaluated. The risk value of the website can be provided to other safety manufacturers as threat information data, and the information sharing is realized.

Description

Technical field [0001] The invention relates to the technical field of network security, and in particular to a method and device for evaluating the risk value of a website based on a cloud protection and cloud monitoring system. Background technique [0002] In the context of the Internet era, websites carry various information publishing and data transmission tasks, and play a decisive role in all walks of life. Among them, the portal website has become particularly important as an important image and propaganda medium of the government or enterprises and institutions. [0003] In recent years, a large number of attacks and intrusions have occurred in cyberspace at any time, and the number of occurrences has increased exponentially. Therefore, monitoring of network security has become more and more important. Existing website security monitoring and risk value assessment only rely on statistical analysis of risk and vulnerability events, and cannot comprehensively monitor websit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/14H04L63/1416H04L63/1433
Inventor 蒋海峰范渊黄进
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products