Unlock instant, AI-driven research and patent intelligence for your innovation.

Network defense system risk assessment method based on bypass attack simulation

A side-channel attack and risk assessment technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as inability to meet pre-assessment, and it is difficult to completely simulate the actual network environment, system, and asset damage.

Active Publication Date: 2022-03-01
北京灰度科技有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003]However, for the simulated environment constructed, it is difficult to completely simulate the actual network environment, and building a simulated environment will consume a lot of manpower, material resources and time, generally only for small Simulate a relatively simple environment / scenario; it is difficult for users to accept attacks on the actual network environment, and it is likely to cause damage to systems and assets in the actual network environment; and for post-event analysis, it cannot meet the needs of pre-assessment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network defense system risk assessment method based on bypass attack simulation
  • Network defense system risk assessment method based on bypass attack simulation
  • Network defense system risk assessment method based on bypass attack simulation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the purpose, technical solutions and advantages of the embodiments of the present disclosure clearer, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below in conjunction with the drawings in the embodiments of the present disclosure. Obviously, the described embodiments It is a part of the embodiments of the present disclosure, but not all of them. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present disclosure.

[0019] In addition, the term "and / or" in this article is only an association relationship describing associated objects, which means that there may be three relationships, for example, A and / or B, which may mean: A exists alone, A and B exist at the same time, There are three cases of B alone. In addition, the character " / " in this article ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a network defense system risk assessment method and device based on bypass attack simulation. The method comprises the steps that a management platform sends an attack instruction to an attack simulation initiating unit; the attack simulation initiating unit generates detection flow according to the attack instruction and sends the detection flow to the corresponding attack receiving unit; the attack receiving unit receives and identifies the detection flow generated and sent by the attack simulation initiating unit; and the management platform evaluates the network security risk condition according to the detection flow generated and sent by the attack simulation initiating unit and the detection flow received and identified by the attack receiving unit. In this way, under the condition that actual asset intrusion is not organized, the processes of extranet boundary breakthrough, intranet asset vulnerability utilization, transverse movement, host intrusion and data leakage rectification attack are covered, and the same network depth system risk assessment effect as asset intrusion assessment can be achieved.

Description

technical field [0001] The present disclosure relates to the field of network security, in particular to the technical field of network defense system risk assessment based on side channel attack simulation. Background technique [0002] In the existing network defense system risk assessment methods, the method of artificially attacking the constructed simulated environment or conducting a small-scale attack penetration test on the actual network environment is generally used to evaluate the threat resistance capability of the defense system; Perform post-event analysis on the operation result logs of similar security technical means to evaluate the network risk level, such as IPS, WAF, FW and other security protection equipment logs, threat traffic detection, APT detection, XDR and other detection and response systems. [0003] However, for the simulated environment constructed, it is difficult to completely simulate the actual network environment, and building a simulated ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/1425H04L63/08
Inventor 曹静张敬宇朱博
Owner 北京灰度科技有限公司