Multi-dimensional security situation real-time display method and system suitable for network security

A network security and multi-dimensional technology, applied in the real-time display method and system field of multi-dimensional security situation, can solve the problems of ignoring alarm information, untimely update of security incident handling process, impact of security handling effect, etc., and achieve the effect of avoiding cheating

Active Publication Date: 2022-05-27
STATE GRID ZHEJIANG ELECTRIC POWER CO LTD HANGZHOU POWER SUPPLY CO
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the network security risk control room has centralized management of the above systems and equipment, during the analysis and disposal process, each equipment generates a large amount of alarm information every day (according to a survey of large organizations, the average weekly alarm events exceed 170,000). Problems such as low processing efficiency lead to a large number of alarm messages being ignored, burying potential safety hazards
In addition, the update of the security incident handling process is not timely, or even rarely updated, which affects the effect of security handling
For example, when encountering system or application security vulnerabilities, it is necessary to manually monitor the platform in real time, download relevant vulnerability information after discovery and make a supervision and rectification list, issue / feedback notification through the intranet OA system, and then manually retest the closed loop , leading to difficulties in the inspection and rectification process and low work efficiency. The reason is that there is currently a lack of a rapid emergency response system for network security incidents based on AI (artificial intelligence) technology + SOAR (Security Orchestration, Automation and Response) technology to help solve vulnerability disposal, Supervision and rectification as well as various security monitoring, analysis, and disposal scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-dimensional security situation real-time display method and system suitable for network security
  • Multi-dimensional security situation real-time display method and system suitable for network security
  • Multi-dimensional security situation real-time display method and system suitable for network security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0061] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above-mentioned drawings are used to distinguish similar objects and are not necessarily used to Describe a particular order or sequence. It is to be understood that the data so used m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a multi-dimensional security situation real-time display method and system suitable for network security, and the method comprises the steps: selecting a security test case of at least one dimension based on a test instruction to generate a target test set, and generating a corresponding target log set according to the target test set; running each security test case in the target test set to generate a monitoring log set; determining a difference log set according to the target log set and the monitoring log set; acquiring a first processing path set corresponding to the target log set, and determining a second processing path set according to the target log set and the monitoring log set; comparing each monitoring node in the monitoring processing path with each processing node in the second sub-processing path to obtain a test processing time period, and enhancing training node and test processing efficiency; and outputting and displaying the difference log event, the test processing time period, the enhanced training node and the test processing efficiency corresponding to the difference log set in real time.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a method and system for real-time presentation of multi-dimensional security conditions suitable for network security. Background technique [0002] In recent years, with the increasing number of cyber attacks, how to ensure the timely response of the key information infrastructure of the group company in the event of cyber security incidents, improve cyber security situational awareness, event analysis, traceability, and rapid recovery capabilities after attacks, effectively Responding to high-intelligence attacks and providing key guarantees and support for group companies are the top priorities in the protection of critical information infrastructure. Especially in major security activities such as network security drills, the speed and quality of emergency response determine whether a major security incident can be successfully dealt with and losses can be recovered. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40G06F11/30G06F11/34
CPCH04L63/1425G06F11/3065G06F11/3438H04L63/1433H04L43/50H04L43/045
Inventor 徐晓华杜猛俊钱锦李昂韩荣杰屠永伟张稼睿徐汉麟徐李冰陈元中向新宇倪夏冰周昕悦李强强
Owner STATE GRID ZHEJIANG ELECTRIC POWER CO LTD HANGZHOU POWER SUPPLY CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products