Defense effectiveness evaluation method applied to network target range

A technology for performance evaluation and shooting range, applied in electrical components, transmission systems, etc., to solve problems such as lack of defense quantification

Active Publication Date: 2020-10-23
信联科技(南京)有限公司
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This invention can evaluate the defense capability of a single device node, but the defense quantification of the entire network system is still lacking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Defense effectiveness evaluation method applied to network target range
  • Defense effectiveness evaluation method applied to network target range
  • Defense effectiveness evaluation method applied to network target range

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0046] The network shooting range is composed of several mirroring devices connected to each other, and each mirroring device provides functional services to other mirroring devices through the network, such as figure 1 As shown, the mirrored equipment in the network shooting range is the carrier of a series of data collections, and the user accesses the functional services of the equipment in the system through the network.

[0047] For each mirrored device in the network range, use the set Represents all data contained on a mirrored device.

[0048] The mirroring device provides an interface for interacting with the outside through the functional services provided by the Service. A mirroring device may contain several functional services. Each of its services is denoted by S, and the collection of data used and affe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a defense effectiveness evaluation method applied to a network target range. Starting from the severity of the potential attack risk and the two dimensions of two actions of the response of the equipment with the defense function during attack defense, evaluation is realized for design defects of a defense system and problems existing in actual operation of equipment, thedefense effects are quantified, and objective evaluation of defense effectiveness is realized. In application, defense scheme effectiveness evaluation under different application scenes and security risk definition standards can be satisfied, independent modeling analysis does not need to be carried out on each specific scene, the efficiency of the defense strategy of the system can be evaluated in a quantitative form, and compared with a method for simulating a network attack behavior by performing a penetration test by security personnel, the method is more comprehensive and controllable, and is beneficial to clarification of a relationship between the network security equipment and protected assets, a relationship between security threats and defense, and a relationship between the security equipment and an overall defense system.

Description

technical field [0001] The invention relates to a defense effectiveness evaluation method applied to a network shooting range, and belongs to the technical field of network shooting range effectiveness evaluation. Background technique [0002] The continuous development of the Internet, while bringing convenience to people, makes people face more and more security threats. The popularization and openness of the Internet give cyber hackers an opportunity. They use various illegal means to expose the network to security threats such as Trojan horses and viruses, making the network unable to operate. With the continuous improvement of the technical level, the types of various network attacks are increasing, and the attacks are becoming more and more complex. In particular, advanced persistent threats are integrating multiple attack technologies at an extremely fast speed. The concealment of various loopholes in the network brings great hidden dangers to network security. Netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1433H04L63/1441
Inventor 王森淼涂腾飞李超
Owner 信联科技(南京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products