Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability situation data fusion method

A data fusion and vulnerability technology, applied in the field of network security, can solve the problems of false negatives and false positives, and different detection capabilities of security equipment, and achieve the effect of eliminating inconsistencies

Active Publication Date: 2018-03-23
GUILIN UNIV OF ELECTRONIC TECH
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, on the one hand, these vulnerability data present the characteristics of multi-source and heterogeneous. On the other hand, different security devices have different detection capabilities, and there are corresponding problems of missed and false positives.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability situation data fusion method
  • Vulnerability situation data fusion method
  • Vulnerability situation data fusion method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific examples and with reference to the accompanying drawings.

[0056] The experimental data used in this embodiment of a vulnerability situation data fusion method is mainly obtained by scanning network devices, operating systems, databases and application services in the attack environment built by the laboratory through the detection tools OpenVAS and Nessus. This example selects an open source operating system dedicated to testing system vulnerabilities, so there will be more vulnerabilities. The data scanned by the detection tool includes Scan Information (scanning information), HostInformation (host information), Result Summary (total number of results), and Result Details (detailed information of scanning results).

[0057] In order to verify the effectiveness of this method, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a vulnerability situation data fusion method. The concept of the vulnerability and the relation between the concepts can be clearly defined by constructing the vulnerability data body, and the inconsistency between the heterogeneous data collected by different collection tools can be effectively eliminated; the difference of different scanning tools on the vulnerability evidence aspect is considered, the difference is existent between the credibility degrees of the provided evidences, and the vulnerability situation data scanned by different tools are fused by adoptinga weighted D-S evidence theory method, the relative weight represents the credibility degree of each detection tool in the fusion process, thereby enabling the fusion result to more reflect the truth;and the better result can be obtained when multiple evidences are in conflict.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a vulnerability situation data fusion method. Background technique [0002] With the rapid development of Internet technology, the network has gradually become an indispensable part of people's life, and the network hazards are becoming more and more serious. Various security devices are used to detect attacks in the network, but most of these devices work independently, and network security managers cannot timely and accurately perceive the status of the entire network. In this case, network security situational awareness technology emerges as the times require. [0003] Network security situation awareness refers to the integration and processing of massive, multi-source, and heterogeneous security data to form specific situation information, and to judge the corresponding situation and predict future development trends through integrated analysis. Among them, vulner...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/145H04L63/1416H04L63/1425H04L63/1433
Inventor 陶晓玲刘丽燕亢蕊楠王勇刘洋周理胜
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products