Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security efficiency evaluation method based on attack and defense association matrix

A network security and correlation matrix technology, applied in the field of information security, can solve the problems of inaccurate calculation results, focus on measuring the effect of attacks, ignore defense and other problems, and achieve the effect of scientific and objective results

Inactive Publication Date: 2019-03-29
BEIJING INST OF COMP TECH & APPL
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current research still has the following deficiencies: First, it focuses on measuring the effect of attack, ignoring the role of defense, and the effectiveness calculation results are limited and one-sided; inaccuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security efficiency evaluation method based on attack and defense association matrix

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0035] The present invention firstly determines the elements of network security efficiency calculation, and the factors to measure the change of each calculation element; Obtain the values ​​of each calculation element factor before and after the attack, and preprocess the collected raw data to eliminate redundancy; finally, calculate the value of network security effectiveness evaluation by calculating the value of each calculation element separately.

[0036] In the present invention, the network security efficiency calculation elements are divided into: {network damage effect, asset damage effect, business damage effect, attack intensity, system protection capability, big data security situation}.

[0037] The calc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network security efficiency evaluation method based on an attack and defense association matrix, belonging to the technical field of information security. The method comprehensively considers system defense capability and impact on system performance, core assets performance and protection capability, services provided by the system and so on after the network is attacked, calculates the attack and defense association matrix and evaluates network security efficiency by adding up weights of multiple discrete points and by using change values of a target network beforeand after attack.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a network security efficiency evaluation method based on an attack-defense correlation matrix. Background technique [0002] The complexity, uncertainty, dynamics of the network information system and the great asymmetry of information between the attacker and the defense are the difficulties in the measurement of security risks, and it is also a difficult problem that network security often faces without foundation and clarity. As the data characteristics of the network information system are diverse and complex, such as: a variety of network system protocols, complex network topology, rich application systems, various network and security equipment systems, and the network system environment is also constantly changing. , such as adding new network nodes, proposing new network protocols, adding new patches, and adding new functions. In general, the hig...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/0631H04L41/50H04L63/08H04L63/0876H04L63/10H04L63/30
Inventor 曾颖明谢小权吴明杰王斌陈志浩马书磊郭敏
Owner BEIJING INST OF COMP TECH & APPL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products