A Multi-Domain Collaborative Security Policy Intelligent Generation Method

A security policy and intelligent technology, applied in the field of network security, can solve the problem of automatic generation and automatic deployment mechanism of heterogeneous network security policies, increase the time for network information system deployment and dynamic reconstruction, and cannot automatically generate security policies, etc. problems, to achieve the effect of reducing and security policy consistency convergence problems, reducing information synchronization overhead, and reducing network resource overhead

Active Publication Date: 2021-12-17
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Since the mobile environment network information system generally requires wide-area and decentralized deployment, and the communication channel has many characteristics such as high dynamics, strong confrontation, and weak connection, and based on task requirements, it is necessary to realize multi-region dynamic networking and collaborative work, but it is currently cumbersome and low-cost. An effective manual configuration security policy process not only requires a large number of security management personnel in the mobile environment, but also greatly increases the time for network information system deployment and dynamic reconfiguration, which has always been one of the bottlenecks restricting the development of mobile network security systems. one
[0003] At present, in the research direction of intelligent generation of network security policies, Fu Yu and others have proposed "a generation algorithm based on network attack and defense graph". Multi-source fusion processing with vulnerability information, and can only generate network attack and defense diagrams, but cannot automatically generate security policies; The publishing and notification mechanism of distributed heterogeneous network security policies does not involve the automatic generation and automatic deployment mechanism of heterogeneous network security policies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Multi-Domain Collaborative Security Policy Intelligent Generation Method
  • A Multi-Domain Collaborative Security Policy Intelligent Generation Method
  • A Multi-Domain Collaborative Security Policy Intelligent Generation Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the present invention, that is, the described embodiments are only some of the embodiments of the present invention, but not all of the embodiments. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-domain collaborative security policy intelligent generation method, aiming at the application mode of domain autonomy and multi-domain coordination of the information system in the mobile network environment, and constructing the network resources of each domain node under the condition of reducing the network resource overhead as much as possible. Inter-intelligent and efficient collaborative operation mechanism, including intra-domain asset trusted registration mechanism, intra-domain asset trusted perception mechanism, single-domain external asset information chain generation mechanism, single-domain external asset information chain notification mechanism, and inter-domain alliance asset information chain release mechanism , inter-domain alliance asset information chain update mechanism and distributed node security policy intelligent generation mechanism, based on this, the intelligent generation and intelligent deployment of security policies can be realized in parallel in each area of ​​the mobile network environment, fundamentally changing the current cumbersome and inefficient Manually configure the security policy process, and promote the transformation of security policies in the mobile network environment from a single-point, manual configuration management model to a collaborative, intelligent management model.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a multi-domain collaborative security policy intelligent generation method. Background technique [0002] Since the mobile environment network information system generally requires wide-area and decentralized deployment, and the communication channel has many characteristics such as high dynamics, strong confrontation, and weak connection, and based on task requirements, it is necessary to realize multi-region dynamic networking and collaborative work, but it is currently cumbersome and low-cost. An efficient manual configuration security policy process not only requires a large number of security management personnel in the mobile environment, but also greatly increases the time for the deployment and dynamic reconfiguration of the network information system, which has always been one of the bottlenecks restricting the development of the mobile network security system. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/03H04W12/06H04W12/08H04W12/041
CPCH04W12/06H04W12/08H04W12/02
Inventor 卿昱万抒伍荣王邦礼余兴华康建平杜璋
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products