Complex network oriented security risk analysis method
A technology for complex networks and security risks, applied in the field of data network security hidden danger analysis, can solve problems such as gaps, and achieve the effect of improving the operation level, improving the ability to withstand pressure, and operating efficiently.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0024] The security hidden danger analysis method oriented to complex networks in the present invention firstly networkizes the data network, then analyzes the security risk of the target network, and combines the design characteristics of the data network business, and uses the related modeling method of the complex network to network the data network Abstract, and then combine statistics and the characteristics of different information systems to study the topological characteristics of the data network, on this basis analyze the causes of different characteristics, and then find out the possible security risks; at the same time, through the cascading of different network elements Research on crash phenomena to reduce network security risks. Combining the classic cascading collapse dynamic models of complex networks, such as the sandpile model, OPA model, and CASCADE model, to study the cascading collapse dynamic models of data networks; Road layer, network layer, management...
Embodiment 2
[0026]The security hidden danger analysis method for complex networks in this embodiment is different from Embodiment 1 in that: the depth of the data network presents the complexity of the bearer relationship, and the characteristics of the network presents wide-area characteristics in the breadth of the network. Establish a risk assessment system for data networks: 1) Classify data network assets, vulnerabilities, and threats according to the characteristics of data networks, combined with existing risk assessments; 2) According to the vulnerability of data networks, for each vulnerability Conduct detection, including: access control vulnerability detection and identity authentication; covert channel vulnerability; object reuse vulnerability detection and audit vulnerability; establishment of trusted path vulnerability detection technology and system executable program protection function vulnerability detection technology ;3) Determine the threat corresponding to each vulner...
Embodiment 3
[0028] The security risk analysis method for complex networks in this embodiment differs from Embodiment 1 or Embodiment 2 in that it analyzes and simulates the security defects of the data network topology: on the basis of not affecting the normal business of the system, find If a security defect is found in one of the subsystems, it is necessary to define what other security risks the threat will bring to other subsystems in the data network, abstract the target system, and establish It is generally applicable to a variety of data network models, drawing on network simulation technology, based on Matlab and NS-2 software to expand functions, and adding a fault tree security defect description method to complete the analysis and simulation of defects.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com