Network security assessment method and system

A network security assessment and network security technology, applied in the field of Internet security assessment, can solve problems such as unpredictable attack events, unsuitable unknown attack detection, etc.

Inactive Publication Date: 2019-01-18
SOUTHWEST PETROLEUM UNIV
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main reason is: on the one hand, these defense measures are passive security protection measures, and they take corresponding actions when or after an attack event occurs; on the other hand, mos

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security assessment method and system
  • Network security assessment method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0022] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0023] According to an embodiment of the present invention, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a network security assessment method. The method includes the steps: obtaining network security risk factors, wherein the risk factors include an asset factor, a vulnerability factor, and a threat factor; establishing a network security assessment model according to the risk factors via a first preset rule; utilizing the network security assessment model to obtain evaluation values of the risk factors; obtaining credibility degrees of the risk factors according to a second preset rule; obtaining a network security evaluation value according to the evaluation values of the risk factors and the credibility degrees of the risk factors, wherein the network security assessment values are obtained by multiplying the evaluation values of the risk factors by the reliability degrees of the risk factors. The invention also provides a network security assessment system implementing the above method. The method and system solve the technical problem that the security defense technology in the related art has poor network security because the action is taken after an event and a possible network attack event cannot be predicted.

Description

technical field [0001] This application relates to the field of Internet security assessment, in particular, to a network security assessment method and system. Background technique [0002] With the rapid development of computer network technology and the extensive application of large-scale, distributed high-speed networks, the Internet has penetrated into all aspects of people's study, work and life, and has become an important means of information exchange and resource sharing among people. While the scale of the Internet is developing rapidly, network security incidents related to it occur frequently, and network security issues are becoming increasingly prominent. The current security situation facing the Internet is mainly manifested in the following aspects: hidden attacks such as websites being implanted with backdoors are on the rise, and user information on websites has become the focus of hackers stealing; phishing is becoming more and more rampant, seriously aff...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/14H04L41/145H04L63/20
Inventor 梁宗文
Owner SOUTHWEST PETROLEUM UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products