Unlock instant, AI-driven research and patent intelligence for your innovation.

Automatic configuration management system and method for network security

A technology of automatic configuration management and network security, which is applied in the field of automatic configuration management system of network security, can solve problems such as low security requirements, low level of security protection, and inability to meet the needs of enterprise network information security, so as to improve configuration management efficiency effect

Inactive Publication Date: 2019-12-20
贵阳忆联网络有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Nowadays, the solution to information security problems of most domestic enterprises is still to install anti-virus software. However, with the highly developed Internet and mobile Internet, such security measures are far from meeting the needs of enterprise network information security.
The network management personnel of most units, especially those of small and medium-sized enterprises, have very weak security awareness, and the level of security protection is low, and they have no independent ability to complete the most basic network security configuration, resulting in great security risks for the unit
[0004] At present, the relevant technologies for network security configuration mainly focus on the security configuration of equipment, systems and software, but in these security configurations, basically the same security configuration strategy is adopted, that is, the same type of equipment, system or software When there are potential threats, the same security configuration files are basically used in the configuration process, and the security configuration files are not classified according to the security level, which will cause: 1. The security requirements of some devices, systems and software are not very high , the security level of the security configuration file that needs to be configured does not need to be so high, which will cause a waste of security configuration file resources and reduce configuration efficiency; 2. Once all devices, systems or software are found to be in danger, the configuration will be synchronized Security configuration files, without setting priorities for these devices, systems, and software, and configuring them according to priorities, will greatly reduce configuration efficiency, and even cause system crashes, affecting the normal use of the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic configuration management system and method for network security
  • Automatic configuration management system and method for network security
  • Automatic configuration management system and method for network security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] Embodiment one, as figure 1 As shown, an automatic configuration management system for network security includes an initialization module, a security monitoring module, a security assessment module, a security decision module, a configuration module and a configuration library:

[0069] The initialization module is used to assign the initial trust degree of each monitoring object in the monitoring area; wherein, the monitoring object includes equipment, system and software;

[0070] The safety monitoring module is configured to obtain a one-to-one corresponding safety state value and safety demand value of each monitoring object in the monitoring area;

[0071] The safety evaluation module is used to evaluate and analyze the safety coefficients of all monitoring objects according to all initial trust degrees, all safety state values ​​and all safety demand values ​​of all monitoring objects, and obtain a one-to-one corresponding safety coefficient value of each monitori...

Embodiment 2

[0119] Embodiment two, such as Figure 4 As shown, a network security automatic configuration management method is applied to a network security automatic configuration management system in the present invention, including the following steps:

[0120] S1: Assign the initial trust value of each monitoring object in the monitoring area; where the monitoring objects include equipment, systems and software;

[0121] S2: Obtain a one-to-one corresponding security state value and security requirement value of each monitoring object in the monitoring area;

[0122] S3: Evaluate and analyze the safety factor of all monitored objects according to all initial trust degrees, all security state values ​​and all security demand values ​​of all monitored objects, and obtain the one-to-one corresponding safety factor value of each monitored object;

[0123] S4: Formulate a configuration strategy table according to all safety factor values ​​of all monitored objects;

[0124] S5: According t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an automatic configuration management system and method for network security. The system comprises an initialization module, a safety monitoring module, a safety evaluation module, a safety decision module, a configuration module and a configuration library, and the method comprises steps of assigning an initial trust degree of each monitoring object in the monitoring area; obtaining a safety state value and a safety demand value corresponding to each monitoring object one by one; evaluating and analyzing the safety coefficients of all the monitoring objects accordingto all the initial trust degrees, all the safety state values and all the safety demand values of all the monitoring objects and obtaining a security coefficient value corresponding to each monitoringobject in a one-to-one mode, formulating a configuration strategy table according to all the security coefficient values of all the monitoring objects, and extracting a configuration file required byeach monitoring object from a configuration library to configure each monitoring object according to the configuration strategy table. On the premise of ensuring the security of the monitoring object, security configuration is performed according to the configuration strategy table, so that the configuration efficiency and the management efficiency of the configuration system are greatly improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an automatic configuration management system and method for network security. Background technique [0002] With the development of network and information technology, the network is gradually changing the way of human life and work, and has had a huge and far-reaching impact on all walks of life. The networked society not only brings many conveniences to people's daily life, but also endangers the information security of individuals or enterprises, and even has a profound impact on national security and international relations. [0003] Nowadays, the solution to information security problems of most domestic enterprises is still to install anti-virus software. However, with the highly developed Internet and mobile Internet, such security measures are far from meeting the needs of enterprise network information security. The network management personnel of most units, e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24H04L12/26
CPCH04L41/12H04L41/142H04L43/0811H04L63/20
Inventor 陈军兰海翔李卫群周发辉雷棋
Owner 贵阳忆联网络有限公司