Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-dimensional and multi-granularity network space security measurement method

A network space and security measurement technology, applied to electrical components, transmission systems, etc., can solve the problems of not specifying the starting point and the end point of the attack, many attack paths, and a large amount of calculation, so as to achieve the real and objective measurement of the vulnerability dimension. The effect of improving accuracy and reducing complexity

Active Publication Date: 2018-11-06
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the attack graph can well simulate all potential attack paths in the network and measure all the attacks and vulnerabilities in the network, the attack graph ignores the failure of the attack path, that is, the failure of the attack path due to network defense during the attack process. attack cannot generate
Moreover, since all possible attack paths are generated during the attack graph generation process, and the starting point and end point of the attack are not specified, there is a problem of too many simulated attack paths
If the network scale is too large, even if distributed computing is used, the amount of calculation is still very large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-dimensional and multi-granularity network space security measurement method
  • Multi-dimensional and multi-granularity network space security measurement method
  • Multi-dimensional and multi-granularity network space security measurement method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0035] In order to obtain more accurate and comprehensive measurement and evaluation of network space security, the present invention firstly divides the network system into three levels according to the logical layering, which are respectively reliability security, environmental security, and loophole security, that is, Network={(reliability security , environment security, vulnerability security)|granularity}( figure 1 ).

[0036] These three levels are considered from the hardware environment, software resources and loopholes on which the network depends. Reliability and security start from the network connection relationship, only considering the network topology, regardless of the services and assets owned by each node. Therefore, this layer considers the connectivity and connectivity efficiency of all nodes, that is, measures the weakly connected a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-dimensional and multi-granularity network space security measurement method. The multi-dimensional and multi-granularity network space security measurement method comprises the following steps: dividing a network system into three hierarchies according to logical hierarchy, wherein the three hierarchies are reliability security, environment security and vulnerability security separately; extracting and selecting indexes in the network system according to the three hierarchies, and establishing a network space security index system by means of the system engineering principle and the analytic hierarchy process (AHP); performing dimensional division on each hierarchy based on the established network space security index system; wherein the reliability securityis measured by a weak connectivity dimension and a strong connectivity dimension, the environment security is measured by a network asset and service dimension and an asset index change dimension, and the vulnerability security is measured by a vulnerability dimension and an attack graph dimension; and adding the granularity on the basis of the hierarchy and dimension, and obtaining the measurement values of each hierarchy and each dimension within the specified range of the granularity, wherein the sum is the network space security measurement result. Using the multi-dimensional and multi-granularity network space security measurement method, the measurement results are more accurate and comprehensive.

Description

technical field [0001] The invention relates to the technical field of cyberspace security, in particular to a multi-dimensional and multi-granularity cyberspace security measurement method. Background technique [0002] The network is developing faster and faster, but the development of cyberspace security cannot keep up with the pace. Therefore, we must improve the security of our country's network as soon as possible. Without evaluation, there is no improvement. It can be seen that network measurement and evaluation are very necessary for the improvement of cyberspace security. [0003] For cyberspace security measurement and evaluation methods, there are already some common methods and models. Analytic Hierarchy Process (AHP) is currently the mainstream analysis method, but there are problems in AHP that the division of levels is not clear, and the measurement is not objective enough due to the weight of experts. In order to solve these problems, some new methods are ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1416H04L63/1433
Inventor 赵小林张漪墁单纯陈全保徐浩
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products