Unlock instant, AI-driven research and patent intelligence for your innovation.

Intranet security expert analysis method and system

An analysis method and analysis system technology, applied in the field of intranet security expert analysis methods and systems, can solve the problems of unclear division of intranet security levels

Inactive Publication Date: 2018-11-06
郑州信大天瑞信息技术有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide an intranet security expert analysis method and system to solve the existing technical problem of unclear division of intranet security levels

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] The analysis method for intranet security experts in this embodiment includes: data collection, collecting data transmitted on the target network segment. Data detection, real-time tracking and detection of behaviors from internal and external networks; the detected data is divided into normal data and abnormal data, and abnormal data is data related to intrusion behavior. Data analysis and calculation, analyze the abnormal data to establish multiple analysis items related to intrusion behavior, classify the analysis items, and set the security weight value A of the analysis items i . Hierarchical classification is distinguished according to the degree of damage caused by the intrusion. In other embodiments, the hierarchical classification may also be distinguished by other methods.

[0025] Analyze each analysis item and set the security level value B of the analysis item i . Calculate the total security level C for each analysis item i , C i =A i ×B i . Calcu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an intranet security expert analysis method and system. The intranet security expert analysis method comprises the steps of: data acquisition: collecting data transmitted on atarget network segment; data detection: carrying out real-time tracking detection on behaviors from the intranet and the internet, wherein the detected data is divided into normal data and abnormal data and the abnormal data is data related to an intrusion behavior; and data analysis and calculation: carrying out analysis on the abnormal data to establish a plurality of analysis items related tothe intrusion behavior, carrying out layer grading on the analysis items, setting an occupied security weight value Ai of each analysis item, carrying out analysis on each analysis item, setting a security level value Bi of each analysis item, calculating a total security level value Ci of each analysis item and calculating a total analysis value C, wherein Ci=Ai*Bi, and C=C1+C2+...+Ci. The intrusion behavior of the intranet can be analyzed, a related model is established, grading is carried out and security levels are set, so that the intranet security expert analysis method and system are convenient to carry out analysis on the intrusion behavior of the intranet and determine a protection direction, thereby carrying out purposive defense on the intrusion behavior of the intranet.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to an analysis method and system for intranet security experts. Background technique [0002] With the rapid development of network technology, we pay more and more attention to network security. However, computer and network attacks are increasing in sophistication, making them increasingly difficult to detect and block using traditional firewalls and intrusion detection systems. With the proliferation of viruses, worms, Trojan horses, backdoors, and blended threats, security threats at the content and network layers are becoming commonplace. Sophisticated worms and e-mail viruses such as Slammer, Blaster, Sasser, Sober, MyDoom, etc. will spread quickly, usually sweeping the world within a few hours. In order to combat security threats, security technologies are also constantly evolving, including new technologies such as deep packet inspection firewall, appl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/145H04L63/1425H04L63/1441
Inventor 雷亚郭梦非杜高杨郭彬
Owner 郑州信大天瑞信息技术有限公司