Network security evaluation method based on node weight

A technology of network security assessment and node rights, applied in data exchange networks, digital transmission systems, electrical components, etc., to achieve the effect of easy promotion and simple assessment methods

Inactive Publication Date: 2017-11-21
XIAN UNIV OF POSTS & TELECOMM
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Vulnerabilities of high criticality assets may also present greater risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security evaluation method based on node weight
  • Network security evaluation method based on node weight
  • Network security evaluation method based on node weight

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0034] see Figure 4 , in order to verify the correctness of the above method for the risk management and risk assessment of information systems, the following will analyze through an example, the example first builds a simple experimental network, the composition of the network is as follows Figure 4 shown. There are 5 workstations in the network, 1 Web server, and 1 mail server. These devices are connected to a switch, which is connected to a router, and the router is connected to the campus network.

[0035] 1. Asset risk analysis, the specific method is:

[0036] First, look for vulnerabilities, create a list of multiple vulnerabilities of an asset according to the vulnerability source, vulnerability code and risk level; there are 9 nodes in the network, and the asset information table of the corresponding node in this embodime...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A network security evaluation method based on node weight comprises the steps of I, analyzing property risks, to be specific, finding vulnerabilities, and making a list of multiple vulnerabilities of one property according to vulnerability source, vulnerability code and risk level; calculating property risk values, wherein a maximum risk value in a vulnerability risk set represents a risk value of the current property, and when one property faces multiple risks, maxium possible loss that the property may face can be effectively expressed; using the maxium vulnerability risk value to represent integrated vulnerabilities of properties; II, performing risk evaluation based on node weight, to be specific, performing risk evaluation on a whole network information system for different properties in conjunction with weight. The method has the advantages of good simplicity, good effect and feasibility, and easiness of popularization.

Description

technical field [0001] The invention belongs to the technical field of network security assessment, and in particular relates to a network security assessment method based on node weights. Background technique [0002] With the development of network technology, network information system has become an indispensable tool and infrastructure in the daily work of enterprises and organizations. The continuous emergence of various applications and new services has produced huge economic benefits. At the same time, the frequent occurrence of various network security incidents has become the focus of the current society. In 2015, the National Cyber ​​Emergency Response Center received a total of 126,916 cybersecurity incidents reported from home and abroad, an increase of 125.9% over 2014. Among them, 126,424 cyber security incidents were reported in China, an increase of 128.6% compared with 2014. Various security incidents are attacks by hackers using various hardware and softw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L63/1433H04L63/20H04L43/091
Inventor 刘意先范九伦惠馨雅王合
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products