Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Vulnerability Analysis Method for Network Operation and Maintenance

A technology for network operation and maintenance and analysis methods, which is applied in the field of network operation and maintenance vulnerability measurement and analysis, and can solve the problems of different vulnerability measurement and analysis methods and different objects.

Active Publication Date: 2019-06-18
ARMY ENG UNIV OF PLA
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Second, the object of vulnerability analysis is different
[0006] Third, the measurement and analysis methods of vulnerability are different

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Vulnerability Analysis Method for Network Operation and Maintenance
  • A Vulnerability Analysis Method for Network Operation and Maintenance
  • A Vulnerability Analysis Method for Network Operation and Maintenance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] The present invention proposes a network operation and maintenance vulnerability analysis method, which uses network planning and design and multi-domain configuration as the basic analysis object, and uses the difference between the user's actual authority and the user's due authority as an index to construct the corresponding vulnerability Analytical methods can effectively discover the impact of improper network operation, maintenance and management on network security.

[0066] The network operation and maintenance vulnerability analysis method proposed by the present invention, its main steps are as follows figure 1 As shown, it mainly includes the steps of collecting basic network information, establishing a basic information representation model for network operation and maintenance, establishing a matrix of user permissions, establishing a set of permission change rules, establishing a matrix of actual user permissions, and calculating vulnerability indicators fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network operation and maintenance vulnerability analysis method. The method comprises the following steps: step 1, collecting network basic information; step 2, establishinga network operation and maintenance basic information representation model; step 3, establishing a user deserved permission matrix; step 4, establishing a permission change rule set; step 5, establishing a user actual permission matrix; and step 6, calculating a network operation and maintenance vulnerability index. According to the network operation and maintenance vulnerability analysis method disclosed by the invention, the vulnerability additionally introduced to a network in a network operation and maintenance activity is focused on discovering a security gap between the specific implementation of the network and a network planning design; when the network operation and maintenance vulnerability is discovered, the information in the traditional network domain is not only used, and a large amount of semantic information in a physical domain and an information domain are also used, so that a vulnerability analysis result is more specific and true; and the difference between the actual permission and the deserved permission of each user in a target network is used as the measurement of the network vulnerability, and the impact of the current network operation and maintenance activity on the network vulnerability is focused on.

Description

technical field [0001] The invention relates to network security analysis technology, in particular to a measurement and analysis method for network operation and maintenance vulnerability. Background technique [0002] In computer networks, vulnerability-related research can be divided into several problem domains, including definition of vulnerability, identification of vulnerability and analysis and assessment of vulnerability. From the perspective of the object of vulnerability analysis, the existing network vulnerability analysis methods are mainly divided into two categories, one is to evaluate a certain part of the network, such as the vulnerability assessment of network communication protocols, and the network hardware equipment or software system. Vulnerability assessment, which analyzes its possible potential damage, does not involve the overall properties of the network; the other is to conduct qualitative or quantitative assessments on the overall characteristics...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/14H04L41/145H04L63/1433H04L63/20
Inventor 白玮陈哲郭世泽潘志松夏士明陈军李雯王陈雨
Owner ARMY ENG UNIV OF PLA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products