Supercharge Your Innovation With Domain-Expert AI Agents!

Network security assessment method and device, network security equipment and storage medium

A network security assessment and network security technology, which is applied in the field of network security equipment and storage media, and network security assessment, can solve the problems of consuming manpower and material resources, being unable to accurately determine the source and type of external threats, and deviations in security event analysis results.

Active Publication Date: 2022-04-08
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, on the one hand, it consumes manpower and material resources; on the other hand, due to the existence of human subjective factors, the analysis results of security incidents are biased and inaccurate, so that it is impossible to accurately determine the source and type of external threats, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security assessment method and device, network security equipment and storage medium
  • Network security assessment method and device, network security equipment and storage medium
  • Network security assessment method and device, network security equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application.

[0027] Any number of elements in the drawings is for illustration rather than limitation, and any designation is for distinction only and has no limiting meaning.

[0028] In practice, the threats inside the network where each network asset is located mainly include bots, worms, scanning and detection, and login with weak passwords. In related technologies, when faced with security events caused by the above-mentioned threats, operation and maintenance personnel usually respond and handle them according to their own understanding, such as analyzing log events. However, on the one hand, it consumes manpower and material resources. On the other hand, due to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a network security assessment method and device, network security equipment and a storage medium. The method comprises the following steps: acquiring a network security event set; each network security event is obtained in the data transmission process of each network asset, and each network asset is an entity device with an independent IP; aiming at each network security event, determining attack parameters comprising network assets, attack relationships and attack coefficients; determining attack relations and attack times among the asset groups; determining an attack relationship pair value between every two asset groups with an attack relationship according to the attack relationship and the attack times between the asset groups; and based on each attack relationship pair value and a preset asset group number threshold value, determining a target attack relationship and a target attack frequency between the target asset group set and each two asset groups with the attack relationship. Therefore, the security performance of the network environment is evaluated, the asset group corresponding to the network threat is positioned, and the network threat is further analyzed.

Description

technical field [0001] The present application relates to the technical field of network security, and in particular to a network security assessment method, device, network security equipment and storage medium. Background technique [0002] Network assets are important management objects in the security management platform. They are physical devices with independent IP addresses (Internet Protocol Address, Internet Protocol Address), such as computers, smart terminals, and servers. The threats inside the network where each network asset is located mainly include zombies, worms, scanning and detection, and login with weak passwords. [0003] In related technologies, in the face of security events caused by the above threats, operation and maintenance personnel usually respond and handle them according to their own understanding, such as analyzing log events. However, on the one hand, it consumes manpower and material resources. On the other hand, due to the existence of hu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
Inventor 程晓妮杨逸斐高辉力潘登黄俊
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More