Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A hierarchical multi-domain visual security operation and maintenance method based on graph database

A database and domain security technology, applied in the field of security operation and maintenance, to improve agility, reduce development costs and modeling time, and improve query and analysis efficiency

Active Publication Date: 2020-09-04
GUILIN UNIV OF ELECTRONIC TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention aims to solve the deficiencies of traditional security operation and maintenance methods in data modeling, query, analysis and presentation in complex network environments, and provides a layered and multi-domain visual security operation and maintenance based on graph databases method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A hierarchical multi-domain visual security operation and maintenance method based on graph database
  • A hierarchical multi-domain visual security operation and maintenance method based on graph database
  • A hierarchical multi-domain visual security operation and maintenance method based on graph database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The invention divides security operation and maintenance into basic security layer, security analysis layer and threat intelligence layer, and at the same time divides the functions of each layer into single or multiple domains, wherein the basic security layer is divided into topology domain, system service domain, and personnel information domain And the security policy domain, the security analysis layer is divided into the dependency domain, the network security domain and the user security domain, and the threat intelligence layer is composed of the corresponding threat intelligence standard domain. The method converts the structural relationship and attribute characteristics of each domain into corresponding UML diagrams, and at the same time deploys sensors with corresponding functions at designated network locations to collect the data required by each domain, and completes the UML diagram-to-graph database through the corresponding API Mapping to realize visuali...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a layered multi-domain visual security operation and maintenance method based on a graph database. Firstly, the security operation and maintenance is divided into a basic security layer, a security analysis layer and a threat intelligence layer, and at the same time, the functions of each layer are divided into single or multiple The basic security layer is divided into network topology domain, system service domain, personnel information domain and security policy domain, the security analysis layer is divided into dependency relationship domain, network security domain and user security domain, and the threat intelligence layer is composed of corresponding threat intelligence domains. Standard domain composition. Then, by transforming the structural relationship and attribute characteristics of each domain into corresponding UML diagrams, and deploying sensors with corresponding functions at designated network locations, the data required by each domain is collected. Then use the corresponding API to complete the mapping of UML graphs to graph databases, and finally realize visual security operation and maintenance by querying and analyzing graph database data. The invention combines graph database technology with security operation and maintenance, reduces the difficulty of security operation and maintenance, and improves the analysis efficiency of security operation and maintenance.

Description

technical field [0001] The invention relates to the technical field of security operation and maintenance, in particular to a hierarchical multi-domain visual security operation and maintenance method based on a graph database. Background technique [0002] With the continuous development of information technology, the application of computer and Internet technology has become the basic method for various organizations to realize resource storage, information sharing and business expansion. But at the same time, network security issues are becoming more and more prominent, network attacks are increasing year after year, attack methods are constantly changing, and attack threats are increasing year by year. The frequent occurrence of various security incidents has caused great economic losses to the organization. In this context, security The construction of operation and maintenance is very necessary. However, with the continuous expansion of the network scale, the gradual ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24G06F16/901G06F16/9038
Inventor 陶晓玲刘洋伍欣王勇刘丽燕孔凯传周理胜
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products