Supercharge Your Innovation With Domain-Expert AI Agents!

Method and device for determining attacked assets in network environment and electronic equipment

A technology that is vulnerable to attacks and network environments, applied in the field of network security, can solve problems such as key resource hazards, and achieve the effect of ensuring security

Active Publication Date: 2020-03-06
BEIJING ANTIY NETWORK SAFETY TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is impractical to eliminate all the vulnerabilities, but ignoring the remaining vulnerabilities in the network environment may cause significant damage to key resources, so it is convenient and fast to find vulnerable assets in the network environment and repair them. An important task of network security management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for determining attacked assets in network environment and electronic equipment
  • Method and device for determining attacked assets in network environment and electronic equipment
  • Method and device for determining attacked assets in network environment and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0063] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0064] In the first aspect, the embodiments of the present invention provide a method for determining vulnerable assets in a network environment, which can conveniently determine vulnerable assets in the network environment.

[0065] figure 1 It is a schematic flowchart of a method for determining vulnerable assets in a network environment according to an embodiment of the present invention, such as figure 1 As shown, the method of this embodiment may include:

[0066] Step 101. Construct an attack graph of the tar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method and device for determining attacked assets in a network environment and electronic equipment, relates to the field of network security, and can determine attacked assets in the network environment. The method for determining the attacked assets in the network environment comprises the following steps: constructing an attack graph of a target network according to the network environment of the target network; calculating the maximum reachable probability of each node in the attack graph according to the attack graph; and according to the maximum reachable probability of each node in the attack graph, determining easily attacked assets in the target network conveniently. The device and the electronic equipment comprise a module for executingthe method. The method and the device are suitable for determining the attacked assets in the network environment.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method, device and electronic equipment for determining vulnerable assets in a network environment. Background technique [0002] With the rapid development of computer technology and network communication technology, computer networks have spread all over the world, greatly affecting people's life and work, and playing an important role in national economy and national security. At the same time, the number of computer network attacks continues to increase, and the security of computer networks has attracted more and more attention. The main and fundamental reason why there are so many attacks is that there are security holes in the computer system. At the same time, there may be a certain correlation between these holes, that is, when one hole is successfully exploited, it may be another hole. use to create favorable conditions. It is impractical to eliminate all t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1433
Inventor 潘爽高峰孙晋超肖新光
Owner BEIJING ANTIY NETWORK SAFETY TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More