System and method for evaluating security and survivability of network information system

A network information and survivability technology, applied in the field of computer network information system survivability assessment

Inactive Publication Date: 2006-04-19
郭世泽 +7
View PDF0 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] At present, there have been a lot of theoretical research on survivability technology at home and abroad, but there have been no reports of formed software and hardware products to evaluate the survivability of information systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for evaluating security and survivability of network information system
  • System and method for evaluating security and survivability of network information system
  • System and method for evaluating security and survivability of network information system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0106] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0107] The present invention provides a survivability assessment system for testing network information systems based on intrusion scenarios, such as figure 1 As shown, it includes an information collection module 100, a vulnerability detection module 200, a test verification module 300, a security and survivability evaluation module 400, and a database 500; the information collection module 100 is used to collect information on the target system, and the collected The target system information is sent to the vulnerability detection module 200;

[0108] The vulnerability detection module 200 is configured to perform vulnerability detection on the target system, discover its existing security vulnerability information, and send the vulnerability detection result to the test verification module 300;

[0109] The test verification module 300 is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The system includes information acquisition module, module for detecting leaking hole, testing verification module, module and database for evaluating security and survivability; the information acquisition module sends collected information of target system to the module for detecting leaking hole; the module for detecting leaking hole carries out detecting leaking hole for target system; the testing verification module carries out test and verification for leaking hole in safety existed in target object; module for evaluating security and survivability evaluates security and survivability for target system based on information of leaking hole. Simulating man induced attack to reflect real status of object to be measured, using active attack to carry out testing, the invention combines static analysis with dynamic test, giving out qualitative and quantitative evaluation and suggestion for survivability of system.

Description

technical field [0001] The invention relates to a system and method for evaluating the survivability of a computer network information system in the technical field of network information security, in particular to a system and method for evaluating the security and survivability of a network information system based on an intrusion scenario test. Background technique [0002] In the research field of network information system security technology, it can be roughly divided into three stages from the division of strategies to deal with intrusion: the first stage is to prevent intrusion, mainly researching trusted computing foundation, access control and physical security, and multi-level security. , password use, etc.; the second stage is how to detect and reduce losses after the intrusion occurs, mainly researching firewalls, intrusion detection systems, border controllers, virtual private networks, public key heterogeneous systems, etc.; the last stage is when the intrusion...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24
Inventor 郭世泽牛伟何韶军段榕陈哲刘志明张永陈卓
Owner 郭世泽
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products