Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data processing method and device

A data processing and indexing technology, applied in the field of network security, which can solve the problems of insufficient consideration of security situation statistics and inaccurate network security situation assessment results, and achieve accurate asset security situation assessment results, improve reliability, and statistics. Comprehensive effect of data

Active Publication Date: 2016-04-20
BEIJING AN XIN TIAN XING TECH CO LTD
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these existing data processing methods do not fully consider the statistical data of the security situation, resulting in inaccurate assessment results of the network security situation obtained from these existing data processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device
  • Data processing method and device
  • Data processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] figure 1It is a schematic flowchart of a data processing method in the process of assessing the security situation at the asset level provided by Embodiment 1 of the present invention. Such as figure 1 As shown, the method includes the following steps:

[0056] S11. Obtain the weight value of the asset value of the specified asset, the asset vulnerability index and the asset threat index;

[0057] The asset value is an inherent attribute of the asset, and the asset value is specified when the asset is added. Asset value is the characteristic value of asset importance. In the embodiment of the present invention, after a specified asset is determined, the asset value of the specified asset can be obtained, so as to further obtain the weight value of the asset value.

[0058] In the embodiment of the present invention, the asset value can be divided into core asset A, key asset B, important asset C, general asset D and simple asset E, and their corresponding weight val...

Embodiment 2

[0146] It should be noted that the business system is determined by the business content carried by the asset and is divided by the customer, such as OA system, mail system, etc. The assessment of the network security situation at the business system level needs to consider the security status of the assets under the business system. For an asset, the business system is also one of its attributes, which is used to indicate the business content carried by the asset. Each asset belongs to a business system, and each business system can have multiple assets. There is a one-to-many relationship between business systems and assets.

[0147] The data processing method of the network security situation assessment process at the business system level includes: calculating the business system security index, business system threat index and business system vulnerability index of a business system;

[0148] Among them, the process of calculating the business system security index of a...

Embodiment 3

[0182] It should be noted that a customer has multiple business systems, so the security status at the customer level is determined by all business systems belonging to the customer. The data processing method of the network security situation assessment process at the customer level includes: calculating customer security index, customer threat index and customer vulnerability index.

[0183] As a specific embodiment of the present invention, the method for calculating the customer safety index is as follows Figure 7 shown, including:

[0184] S71. Respectively obtain the security risk indices of all business systems owned by a customer and the weights of each business system level:

[0185] According to the data processing method described in the second embodiment, the security risk indexes of all business systems owned by a customer are obtained respectively.

[0186] It should be noted that, in the embodiment of the present invention, different service systems are set w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data processing method and a data processing device. In the method and the device, the obtained asset vulnerability index is related to an asset polling vulnerability index, a bug vulnerability index and a configuration irregularity vulnerability index, and the obtained asset threat index is related to an asset security event threat value, a security alarm threat value and a security event threat value. Moreover, the asset security event threat value, the security alarm threat value and the security event threat value are obtained by processing logs of assets. Thus, when network security situation assessment data is processed, the method and the device consider the result of an asset polling inspection service, a bug inspection service, a configuration irregularity inspection service and integrated log and traffic analysis. Therefore, the data considered and counted by the method and the device is more comprehensive, the asset security situation assessment result obtained by the method and the device is more accurate, and the credibility of the asset security situation assessment result is improved.

Description

technical field [0001] The invention relates to the field of network security, in particular to a data processing method and device. Background technique [0002] With the rapid development of computer and network technology, the scope of application of information systems continues to expand and its importance becomes increasingly prominent. Assets in the network environment always face various security risks. Statistics on these security risks and a quantitative assessment of the overall security situation of network assets will help relevant personnel in information security operations to keep abreast of system security risks and improve organizational security protection capabilities. [0003] At present, for the network security situation, there have been many data processing methods for evaluating the network security situation. However, these existing data processing methods do not fully consider the statistical data of the security situation, resulting in inaccurate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/1433
Inventor 翟建军钟金鑫张涵茗齐志彬李周刘震云
Owner BEIJING AN XIN TIAN XING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products