An attack detection method oriented to network system security metrics

A security measurement and network system technology, which is applied in the field of attack detection oriented to network system security measurement, can solve the problems of attack detection capability relying on known attack characteristics and inability to detect network traffic attacks, and achieve the effect of improving accuracy

Active Publication Date: 2019-01-08
BEIJING INST OF COMP TECH & APPL
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this approach has two defects and deficiencies: on the one hand, it is impossible to perform effective attack detection on encrypted network traffic; on the other hand, this attack detection capability relies heavily on known attack characteristics

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with examples.

[0032] An attack detection method oriented to network system security measurement provided by the present invention comprises the following steps:

[0033] S1. Determine security measurement tasks

[0034] Divide the security measurement function, build a network system security quantitative evaluation test environment, describe the security measurement operation process in graphics and common language, establish the security measurement operation process by drawing the process, and extract and package the components according to the established security measurement operation process standardized, reusable measurement content;

[0035] This step realizes the separation of operation process and task implementation details, ensures the flexibility and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an attack detection method oriented to network system security metrics, which relates to the network security field. From the network system itself, and starting from networksystem security metrics, by establishing a baseline of network information system security utility, by measuring and evaluating the identification characteristic, traffic characteristic and utility influence of network system, comparing the actual utility with the expected utility, we can find the abnormity of network system, detect and discover the network attack in time, make up the deficiency of detection based on attack characteristic, and improve the veracity of attack detection. By effectively using metrics in a network system environment, a suitable set of metric is selected and data iscollected in a real project according to that set of metrics, According to the collected data to determine whether a network attack has occurred, through the use of network system measurement resultsto provide decision-making support for the detection of network attacks, for the evaluation object to actively find security issues, detection and judgment of network attacks to provide a basis.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an attack detection method oriented to network system security measurement. Background technique [0002] Network system security measurement refers to first establishing the security baseline of the network information system (the network information system has baselines of different security levels), and by measuring and evaluating the identification characteristics, traffic characteristics, and utility impact of the network system, the actual evaluation utility and expected Compare the security baselines to discover the abnormalities of the network system, detect and discover network attacks in a timely manner, and provide accurate guidance for network security decisions. [0003] In network system security, risk, attack and defense are interrelated, restricted and co-evolved. At present, the mainstream method of network attack detection is: by monitoring the origina...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/1441
Inventor 曾颖明谢小权吴明杰王斌海然常承伟
Owner BEIJING INST OF COMP TECH & APPL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products