Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security risk assessment system

A risk assessment system and risk assessment technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve the problems of lack of self-learning, lack of self-learning of risk assessment models, and ignoring influence, so as to maintain accuracy and achieve The effect of adaptability and self-learning

Active Publication Date: 2021-08-06
四川阁侯科技有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1) Traditional network security risk assessment systems rely on prior knowledge such as known vulnerabilities, virus signatures, and attack traffic characteristics to assess the security risks of the target system. In the absence of prior knowledge, it is difficult to assess the potential security risks of the system. 2) The traditional risk assessment process only focuses on the current vulnerability of the target system to be assessed, asset weight, log alarm analysis, virus scanning results and other indicators are scored according to predetermined scoring standards and the final score is fused. Value, ignoring the impact of the security risks of adjacent network nodes on the target system, and the impact of vulnerabilities, alarms, detected viruses, Trojan horses and other threats on the current system state during the historical assessment process of the target system, resulting in one-sided assessment results; 3) The traditional risk assessment model lacks self-learning and self-adaptive capabilities. A unified and fixed detection model is used to conduct risk assessment on all target systems, and it is difficult to dynamically adjust according to the system's own network environment and asset changes. adaptability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security risk assessment system
  • Network security risk assessment system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0056] Such as figure 1 As shown, a network security risk assessment system includes a server and a client using a C / S architecture, and an agent installed on the assessment target system.

[0057] In this embodiment, the server side includes a vulnerability assessment engine service module, a vulnerability database, historical assessment records, an identity verification module, and a fusion assessment module.

[0058] 1. The server side includes the evaluation engine service module, which listens to accept the client’s request. According to the parameters contained in the request: the detected target system address, network configuration, and client permissions, etc., the agent sends a start scanning command to execute the scanning task, and according to Based on the results returned by the agent, start the assessment module to assess the risk of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security risk assessment system, and the system comprises a server side and a client side adopting a C / S architecture, and an agent side installed on an assessment target system. The server side comprises an assessment engine service module, a vulnerability library, a historical assessment record, a fusion assessment module and an identity verification module; the client comprises a login module, a scanning configuration module, a feedback processing module and an evaluation result library, and the agent end of the evaluation target system comprises an information collection module, a machine learning module, a machine learning updating module, an anomaly detection module and an asset scanning module. According to the invention, the evaluation of the network security risk is more comprehensive and objective.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network security risk assessment system. Background technique [0002] At present, various known and unknown network attacks have seriously threatened the security of network information systems. In the tough cybersecurity landscape, not being aware of the risk is the biggest risk. You need to assess the network threats you have encountered and what kind of security situation your own network is in. Through network security assessment, it is an important issue in the field of network security to analyze the current security threat situation that the system is facing, so as to provide a basis for further formulating targeted defense. [0003] How to conduct a comprehensive and accurate assessment of the current network security risk. Traditional network security risk assessment technology research mainly uses techniques such as system vulnerability analysis, log analy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24G06F21/57G06F21/55G06F21/56
CPCH04L63/1408H04L63/1433H04L63/08H04L63/083H04L63/20H04L41/142G06F21/577G06F21/552G06F21/56G06F18/23G06F18/2411
Inventor 陈文王宇飞黄登
Owner 四川阁侯科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products