A Quantitative Evaluation Method of Industrial Control Network Security Situation Based on Knowledge Graph

A technology of knowledge graph and industrial control network, which is applied in the field of quantitative assessment of industrial control network security situation based on knowledge graph, can solve problems such as performance degradation, and achieve the effect of convenient early warning and comprehensive risk assessment

Active Publication Date: 2021-04-16
北京威努特技术有限公司 +4
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Neo4j focuses on solving the performance degradation problem of traditional RDBMS when a large amount of data is associated with the query

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Quantitative Evaluation Method of Industrial Control Network Security Situation Based on Knowledge Graph
  • A Quantitative Evaluation Method of Industrial Control Network Security Situation Based on Knowledge Graph
  • A Quantitative Evaluation Method of Industrial Control Network Security Situation Based on Knowledge Graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0073] like Figure 4 As shown, the method for quantitative assessment of industrial control network security situation based on knowledge graph includes the following steps:

[0074] Step 1, define and construct network security knowledge graph:

[0075] 1) Define the knowledge graph as KG, KG={E, R}, where E represents the set of all nodes in the network security knowledge graph, including hosts and vulnerabilities; R represents the set of relationships between nodes in the network security knowledge graph, Including having, communicating and associating, etc.; both E and R have one or more attributes, that is, Key-Value values.

[0076] 2) Set specific specifications and definitions for E and R in the network security knowledge map:

[0077] The nodes included in E are divided into two types: host (Host) and vulnerability (Vulnerability)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to the field of industrial control network security, in particular to a method for quantitative evaluation of industrial control network security situation based on a knowledge graph. The main steps include: defining and constructing a network security knowledge graph, defining the business weight of nodes in the network security knowledge graph, Calculating the threat index, the knowledge graph-based industrial control network security situation quantitative assessment method of the present invention uses knowledge graph technology, based on the graph database, supports fast graph calculation, and calculates the indirect threats brought by attack events through breadth traversal and depth traversal, Assess risk more comprehensively to facilitate early warning of threats that have not yet occurred.

Description

technical field [0001] The invention relates to the field of industrial control network security, in particular to a quantitative evaluation method for industrial control network security situation based on a knowledge map. Background technique [0002] A very important functional point in the security situational awareness system is the quantitative assessment of the network security situation, which is also a technical difficulty of the situational awareness system. [0003] The traditional quantitative scoring method for network security situation assessment is generally based on the security assessment of a single asset, and then according to the importance of the asset, the weighted calculation of the asset score is carried out to obtain the security situation score of the network. When assessing a single asset, the vulnerability score is generally based on the vulnerability of the asset, and some threat assessments are combined with attack information. [0004] Existi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1433H04L63/20
Inventor 石凌志
Owner 北京威努特技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products