IT asset risk situation awareness display method

A situational awareness and asset technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as inability to display network attack behaviors

Active Publication Date: 2021-02-19
广州锦行网络科技有限公司
View PDF11 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, in the IT asset management system of this patent document, the maintenance personnel only need to configure the IP address set of the asset group, and the system can automatically calculate and display the association between the asset groups in a graphical form, which simplifies the creation of asset groups. process, without the need to manually maintain the organizational structure; that is, the above-mentioned patent documents only show assets, but cannot show hidden network attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IT asset risk situation awareness display method
  • IT asset risk situation awareness display method
  • IT asset risk situation awareness display method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The specific implementation manner of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0029] Such as Figure 1-3 As shown, this example is a method for displaying IT asset risk situation awareness, and its processing flow is as follows figure 1 As shown, the specific implementation steps are as follows:

[0030] S1: According to the basic information established by the input asset model, build the asset model; specifically, first draw the model through 3D drawing software such as 3dMax or c4d according to the basic information, and the LOD needs to be able to distinguish the approximate outline of the server equipment. Element nodes can be reduced to a sphere for illustration.

[0031] Among them, the basic information provided by the present invention includes all computing resources such as IT assets, servers, and personal PCs owned by the enterprise. For each IT asset, it is necessary to record basic informa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an IT asset risk situation awareness display method. The IT asset risk situation awareness display method comprises the following steps of S1, building an asset model; S2, exporting an obj format file, and generating a drc file; S3, releasing the drc file generated in the step S2 as a static file, setting rendering conditions, selecting a loader, and transmitting an addressreleased by the static file into the loader for preliminary rendering; S4, inputting IT asset protection information, and binding asset information; S5, enabling a rear end to start monitoring and recording attack data; S6, enabling the rear end to transmit the recorded attack data to the front end page in real time, after the front end page receives the attack data, enabling the front end page toinquire the single model where the target node is located according to the bound information, then draw an attacked unit node, draw an attack route, carry out real-time updating and rendering, and vividly display hidden attack behaviors in real time. Abstraction virtual network attacks can be fully vivid, and asset risk situations can be visually displayed.

Description

technical field [0001] The invention relates to the field of network attack and defense asset risk analysis visualization, in particular to an IT asset risk situation awareness display method. Background technique [0002] Security awareness is the core of the security defense system. In the face of hidden attacks and penetration tests by hackers, whether it can be identified and discovered in the first place is the fundamental measure of the quality of the security system. Therefore, visualization technology has been used in a certain range in the security field. But at present, the visual display of network attacks is concentrated on the display of attacks at the national, provincial and municipal levels, and the use of internal IT asset risk display is seldom used. After a network attack occurs, only rely on security operation and maintenance personnel to use technical instructions to check layer by layer, and gradually locate the attacked assets. Such a method is not o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/24
CPCH04L41/22H04L63/14H04L63/20H04L67/02H04L69/162
Inventor 吴建亮胡鹏魏欣怡
Owner 广州锦行网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products