Complex network oriented security risk analysis method

A technology for complex networks and security risks, applied in the field of data network security hidden danger analysis, can solve problems such as gaps, and achieve the effect of improving the operation level, improving the ability to withstand pressure, and operating efficiently.

Inactive Publication Date: 2018-05-04
STATE GRID HENAN INFORMATION & TELECOMM CO +1
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is still a big gap in the operation and maintenance of th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] The security hidden danger analysis method oriented to complex networks in the present invention firstly networkizes the data network, then analyzes the security risk of the target network, and combines the design characteristics of the data network business, and uses the related modeling method of the complex network to network the data network Abstract, and then combine statistics and the characteristics of different information systems to study the topological characteristics of the data network, on this basis analyze the causes of different characteristics, and then find out the possible security risks; at the same time, through the cascading of different network elements Research on crash phenomena to reduce network security risks. Combining the classic cascading collapse dynamic models of complex networks, such as the sandpile model, OPA model, and CASCADE model, to study the cascading collapse dynamic models of data networks; Road layer, network layer, management...

Embodiment 2

[0026]The security hidden danger analysis method for complex networks in this embodiment is different from Embodiment 1 in that: the depth of the data network presents the complexity of the bearer relationship, and the characteristics of the network presents wide-area characteristics in the breadth of the network. Establish a risk assessment system for data networks: 1) Classify data network assets, vulnerabilities, and threats according to the characteristics of data networks, combined with existing risk assessments; 2) According to the vulnerability of data networks, for each vulnerability Conduct detection, including: access control vulnerability detection and identity authentication; covert channel vulnerability; object reuse vulnerability detection and audit vulnerability; establishment of trusted path vulnerability detection technology and system executable program protection function vulnerability detection technology ;3) Determine the threat corresponding to each vulner...

Embodiment 3

[0028] The security risk analysis method for complex networks in this embodiment differs from Embodiment 1 or Embodiment 2 in that it analyzes and simulates the security defects of the data network topology: on the basis of not affecting the normal business of the system, find If a security defect is found in one of the subsystems, it is necessary to define what other security risks the threat will bring to other subsystems in the data network, abstract the target system, and establish It is generally applicable to a variety of data network models, drawing on network simulation technology, based on Matlab and NS-2 software to expand functions, and adding a fault tree security defect description method to complete the analysis and simulation of defects.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a complex network oriented security risk analysis method, including the following steps: combining the design characteristics of a data network service, abstracting a data network by using a related modeling method of a complex network, and then studying the topological characteristics of the data network in combination with statistics and the own characteristics of different information systems, analyzing the causes of different characteristics on this basis, and further finding out possible security risks; and meanwhile, studying cascading breakdown phenomena of different network elements to reduce the network security risks; through consistent inspection and test evaluation methods, aiming at a data network physical layer, a link layer, a network layer, a management layer and other hierarchical structures, performing quantitative evaluation on the data network configuration inspection and security, identifying the levels of the security risks, developing a suitable network security policy, and taking appropriate control objectives and control modes to control the network security risks to ensure that the risks are avoided, transferred or dropped to an acceptable level.

Description

technical field [0001] The invention relates to a method for analyzing hidden dangers of data network security. Background technique [0002] With the improvement of the intelligence of the power system, the production and operation of power enterprises rely more and more on the power information communication network, and the security problem of the information communication network is also unprecedentedly severe. With the continuous improvement of the intensive management level of the power group and the increasingly perfect information infrastructure, the concentration of information resources, and the vertical and horizontal interconnection and integration of the system have increased sharply, and the original local information communication network security issues will bring overall impact . All of these pose new challenges for the development of power system information security and smart grid. At the same time, network and information warfare is one of the important...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/1433H04L63/20
Inventor 李文萃舒新建罗滨安致嫄罗臻陆继钊董凯丽刘岩
Owner STATE GRID HENAN INFORMATION & TELECOMM CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products