Method and system for decomposing threat dispose strategy in network

A strategy and network technology, applied in the field of network security, can solve problems such as low disposal efficiency, poor disposal effect, and inability to support differentiated and coordinated disposal of threats, and achieve the effect of enhancing management and control capabilities, improving effects, and reducing the scope of influence

Active Publication Date: 2019-03-01
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a method and system for decomposing threat handling strategies in a network, which are used to solve the defects in the prior art that the threat handling methods have poor handling effects, low handling efficiency, and inability to support differentiated linkage handling of threats, and improve handling Efficiency can also minimize the extent to which the network is affected by threats, thereby ensuring network security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for decomposing threat dispose strategy in network
  • Method and system for decomposing threat dispose strategy in network
  • Method and system for decomposing threat dispose strategy in network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0028] In order to better understand the embodiment of the present invention, the application environment of the embodiment of the present invention is described here: the embodiment of the present invention can be applied in any network, for example, a dedicated network, a space-ground integrated network, the Internet of Things or various services...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention provide a method and a system for decomposing a threat dispose strategy in a network. The method comprises the steps of: determining a threat dispose area according to a threat dispose strategy, a network topological structure, a threat feature and an asset feature; determining a candidate dispose object of the threat dispose area and a second linkage relationship setthereof according to the threat feature, a dispose object capability and a first linkage relationship set; decomposing a security guarantee target according to a security guarantee target decomposition mapping relationship, a target priority, a target achievement degree, a target achievement cost and available resources, so as to obtain a security guarantee sub-target of the threat dispose area; and decomposing a dispose command in the threat dispose strategy and / or determining a dispose object according to the candidate dispose object and the second linkage relationship set thereof, the security guarantee sub-target, the dispose object capability, the threat feature, a dispose cost and a dispose effect. Through adoption of the method of the invention, unified management and control for equipment of the whole network, threat differentiated linkage dispose and collaborative response are achieved, and a network management and control capability is improved.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of network security, and in particular, to a method and system for decomposing threat handling strategies in a network. Background technique [0002] The dynamic interconnection of large-scale and complex heterogeneous networks requires hierarchical management of network security and hierarchical deployment of heterogeneous network command in the process of threat handling. Different networks have different technical systems, different security protection capabilities between networks, and management rights belong to different departments. There are many types of security equipment in each network, and there are many manufacturers of similar security equipment. The functions and command methods of different security equipment are different. Different security equipment Disposal instructions are different and have to be generated separately. It is necessary to automatically decompose the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/107H04L63/14H04L63/20
Inventor 李凤华李勇俊耿魁房梁
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products