Network security situation assessment method

A situation assessment and network security technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve the problems of complex effects, single influencing factors, and single data sources of link threat assessment methods, and achieve a good link situation , the method is simple and effective, and the effect of comprehensive situation assessment

Active Publication Date: 2019-02-01
XI AN JIAOTONG UNIV
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, there is a lack of comprehensive consideration of network security factors, and the data source used for evaluation is single
SILK and "The Spinning Cube of Potential Doom" system have relatively single influencing factors, which cannot accurately assess the network security situation
The method proposed by Srihari R, the method proposed by Chen Xiuzhen et al. and the method proposed by Wei Yong et al. do not include the link threat, which makes the overall assessment incomplete. The method proposed by Chen Hong et al. and the method proposed by Liu Shiwen et al. Threat assessment method, but its link threat assessment method is too complicated and the effect is not very good

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security situation assessment method
  • Network security situation assessment method
  • Network security situation assessment method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0040] The present invention uses various indexes in the network as a basis, utilizes the index information collected by nodes and the index information collected by links, and according to the degree of attack threat received in the node, the occurrence rate of attack threat and the value of node loss, as well as the delay on the link, Congestion degree, packet loss rate, respectively calculate the node situation and link situation in the network, and then integrate the two to obtain the final security situation of the whole network. The present invention can effectively measure the state of the network according to the real-time information of the network, and the method is simple efficient.

[0041] see figure 1 , the present invention specifically comprises the following steps:

[0042] 1) First, monitor each host node and each network link in the network, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security situation assessment method. Each index in a network is used as a basis; a node situation and a link situation in the network are separately computed according to the threat degree of an attack suffered by the node, the occurrence rate of the attack risk, the loss value of the node, and the delay, congestion degree and packet loss probability of the linkby using the index information collected by the node and the index information collected by the link; then the two situations are integrated to form the final security situation of the whole network.The method provided by the invention can effectively measure the state of the network according to the instant information of the network, and is simple and effective.

Description

technical field [0001] The invention belongs to the field of network security anomaly detection and relates to a network security situation assessment method. Background technique [0002] The research on network security situation assessment technology started earlier. In 1999, Tim Bass first proposed the concept of Cyberspace Situation Awareness (CSA). Situational Awareness Functional Model. With the increasing number of Internet security incidents, network security situational awareness has become a major research direction in the field of information security. Foreign scholars have been known to carry out long-term research on network security situational awareness and have achieved many results. Stephen Lau's "The Spinning Cube of Potential Doom" system at the Lawrence Berkeley National Laboratory in the United States has greatly improved network situational awareness. SILK developed by the NetSA group of SEI (Software Engineering Institute) of Carnegie Mellon Univer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/14H04L63/1416H04L63/1425H04L63/205
Inventor 赵亮陶业荣李卫王晨旭岁赛秦涛李鹏飞胡凯平
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products