Layered multi-domain visible security operation and maintenance method based on graph database

A database and domain security technology, applied in data exchange network, electrical digital data processing, special data processing applications, etc., to achieve the effect of reducing development cost and modeling time, improving query analysis efficiency, and improving agility

Active Publication Date: 2018-01-12
GUILIN UNIV OF ELECTRONIC TECH
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention aims to solve the deficiencies of traditional security operation and maintenance methods in data modeling, query, analysis and presentation in complex network environments, and provides a layered and multi-domain visual security operation and maintenance based on graph databases method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Layered multi-domain visible security operation and maintenance method based on graph database
  • Layered multi-domain visible security operation and maintenance method based on graph database
  • Layered multi-domain visible security operation and maintenance method based on graph database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The invention divides security operation and maintenance into basic security layer, security analysis layer and threat intelligence layer, and at the same time divides the functions of each layer into single or multiple domains, wherein the basic security layer is divided into topology domain, system service domain, and personnel information domain And the security policy domain, the security analysis layer is divided into the dependency domain, the network security domain and the user security domain, and the threat intelligence layer is composed of the corresponding threat intelligence standard domain. The method converts the structural relationship and attribute characteristics of each domain into corresponding UML diagrams, and at the same time deploys sensors with corresponding functions at designated network locations to collect the data required by each domain, and completes the UML diagram-to-graph database through the corresponding API Mapping to realize visuali...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a layered multi-domain visible security operation and maintenance method based on a graph database. The method comprises the steps of firstly dividing security operation and maintenance into a basic security layer, a security analysis layer and a threat information layer; meanwhile, dividing the function of each layer into a single or multiple domains, wherein the basic security layer is divided into a network topology domain, a system service domain, a personal information domain and a security strategy domain, the security analysis layer is divided into a dependence domain, a network security domain and a user security domain, and the threat information layer is composed of a corresponding threat information standard domain; then converting structural relation andattribute features of each domain to a corresponding UML graph, and meanwhile deploying sensors with corresponding functions at specified network positions for collecting data needed by each domain;then mapping the UML graph to the graph database via a corresponding API; and at last, achieving visible security operation and maintenance through querying and analyzing data of the graph database. According to the method provided by the invention, a graph database technology is combined with security operation and maintenance, so that difficulty of security operation and maintenance is reduced,and analysis efficiency of security operation and maintenance is improved.

Description

technical field [0001] The invention relates to the technical field of security operation and maintenance, in particular to a hierarchical multi-domain visual security operation and maintenance method based on a graph database. Background technique [0002] With the continuous development of information technology, the application of computer and Internet technology has become the basic method for various organizations to realize resource storage, information sharing and business expansion. But at the same time, network security issues are becoming more and more prominent, network attacks are increasing year after year, attack methods are constantly changing, and attack threats are increasing year by year. The frequent occurrence of various security incidents has caused great economic losses to the organization. In this context, security The construction of operation and maintenance is very necessary. However, with the continuous expansion of the network scale, the gradual ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24G06F17/30
Inventor 陶晓玲刘洋伍欣王勇刘丽燕孔凯传周理胜
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products