Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and device for determining safety status

A state-of-safety and safe technology, applied in the field of communication, can solve problems such as increased difficulty, achieve the effect of improving accuracy and saving computing resources

Active Publication Date: 2022-06-28
新华三人工智能科技有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, with the continuous acceleration of the informatization process, the network and information systems are becoming more and more complex, the attack methods of hackers are changing with each passing day, and the frequency of attacks is also changing. How to identify and analyze the information security vulnerabilities of assets and discover the existence of assets in time The security weaknesses of the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and device for determining safety status
  • Method, device and device for determining safety status
  • Method, device and device for determining safety status

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The terms used in the embodiments of the present application are only for the purpose of describing specific embodiments, rather than limiting the present application. As used in this application and the claims, the singular forms "a," "the," and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It will also be understood that the term "and / or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.

[0045] It should be understood that although the terms first, second, third, etc. may be used in the embodiments of the present application to describe various information, the information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other. For example, the first information may also be referred to as the second information, and similarly, the second information may also be referred to as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a method, device, and equipment for determining a security state, the method comprising: acquiring an attack graph corresponding to equipment assets, the attack graph including an attack subgraph corresponding to a target terminal; the attack subgraph including vulnerability exploit rule nodes and the precondition node of the exploit rule node, the precondition node at least includes the security vulnerability node of the target terminal; determine the conditional probability of each node in the attack graph, and generate an asset Bayesian graph , the asset Bayesian graph includes the conditional probability of each node in the attack graph; determine the target probability of the device asset being attacked based on the asset Bayesian graph; determine the device asset based on the target probability security status. Through the technical solution of the present application, the attack probability of equipment assets is directly deduced according to the Bayesian conditional probability, which greatly saves computing resources.

Description

technical field [0001] The present application relates to the field of communications, and in particular, to a method, apparatus and device for determining a security state. Background technique [0002] Due to the continuous development of hacking technology, new types of information security loopholes are constantly being excavated, and attackers can use the information security loopholes of assets to attack assets, causing various network information security incidents to occur frequently, causing heavy losses to enterprises and the country. The information security risk assessment method can be used to identify and analyze the information security vulnerabilities of the assets, timely discover the security weak links of the assets, and avoid the occurrence of information security incidents that may have a huge impact. [0003] However, with the continuous acceleration of the informatization process, the network and information systems are becoming more and more complex, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/1433
Inventor 金兆岩尚素绢
Owner 新华三人工智能科技有限公司