Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security analysis method and device, computer equipment and storage medium

A network security analysis and computer program technology, applied in the field of network security, can solve problems such as the inability to guarantee the security level of the overall network system, and achieve the effect of strengthening emergency response capabilities, reducing complexity, and improving overall security.

Inactive Publication Date: 2021-12-21
北京墨云科技有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Security analysts manually confirm the scan results and verify the vulnerabilities. However, this network security analysis method cannot guarantee the security level of the overall network system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security analysis method and device, computer equipment and storage medium
  • Network security analysis method and device, computer equipment and storage medium
  • Network security analysis method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0040] A network security analysis method provided in the embodiment of the present application is based on the network security analysis method NEG-NSAM combined with the panoramic kill chain model of the network security threat model (Kill Chain-kill chain model) proposed by Lockheed Martin. This model is a network analysis method based on practical training attacks.

[0041] Please refer to figure 1 , which shows a flowchart of a network security analysis method provided by an embodiment of the present application, figure 2 The specific implementation schematic diagram of the embodiment of the present application is given, and the method may include the following steps:

[0042] Step 101, scan various network subjects in th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security analysis method and device, computer equipment and a storage medium. The method comprises the following steps: scanning various network main bodies in a target network system to obtain parameters, and performing format processing to obtain a standard format file; according to the standard format file, through network topology self-discovery, generating a network topology structure diagram, and then generating a system structure diagram; generating a penetration graph model according to the standard format files of the various network main bodies, the system structure diagrams and a preset vulnerability knowledge base; traversing all the penetration paths in the penetration graph model and executing the killing chain process, and finally determining the penetration path of the target network main body, so the application can not only perform vulnerability verification on the hosts on the whole line from the attacker to the core asset server, but also perform vulnerability verification on the hosts on the whole line from the attacker to the core asset server; hosts on all potential attack paths from the attacker to the core assets are even mined, one-by-one penetration verification is carried out, and based on this, global restoration is carried out, so that the security of the network system is greatly improved.

Description

technical field [0001] The invention relates to the field of network security, in particular to a network security analysis method, device, computer equipment and storage medium. Background technique [0002] In real scenarios, often in a large-scale network system, there may be multiple hosts carrying vulnerabilities, and the vulnerability level may be high or low. If the system is faced with an urgent and high-risk 0day vulnerability, it is difficult to repair in a short time, and the core assets are facing huge risks. Threats, it is not necessarily the best solution to repair high-risk vulnerabilities in a head-to-head manner. It is possible that the vulnerability repair time will be too long and cause corporate losses. In order to reduce the risk of asset loss as much as possible, an effective overall defense Strategy is also essential. [0003] The current mainstream vulnerability scanning tools are based on isolated hosts for vulnerability scanning. The scanning actio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/1433H04L63/20H04L41/142
Inventor 董昊辰李梓豪范中磊欧泽飞徐磊刘兵谢鑫
Owner 北京墨云科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products