Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A method for displaying it asset risk situational awareness

A situational awareness and asset technology, applied in digital transmission systems, data exchange networks, electrical components, etc., can solve the problem of not being able to display network attack behaviors

Active Publication Date: 2021-09-28
广州锦行网络科技有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, in the IT asset management system of this patent document, the maintenance personnel only need to configure the IP address set of the asset group, and the system can automatically calculate and display the association between the asset groups in a graphical form, which simplifies the creation of asset groups. process, without the need to manually maintain the organizational structure; that is, the above-mentioned patent documents only show assets, but cannot show hidden network attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for displaying it asset risk situational awareness
  • A method for displaying it asset risk situational awareness
  • A method for displaying it asset risk situational awareness

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The specific implementation manner of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0029] Such as Figure 1-3 As shown, this example is a method for displaying IT asset risk situation awareness, and its processing flow is as follows figure 1 As shown, the specific implementation steps are as follows:

[0030] S1: According to the basic information established by the input asset model, build the asset model; specifically, first draw the model through 3D drawing software such as 3dMax or c4d according to the basic information, and the LOD needs to be able to distinguish the approximate outline of the server equipment. Element nodes can be reduced to a sphere for illustration.

[0031] Among them, the basic information provided by the present invention includes all computing resources such as IT assets, servers, and personal PCs owned by the enterprise. For each IT asset, it is necessary to record basic informa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an IT asset risk situational awareness display method, comprising the following steps: S1: building an asset model; S2: exporting an obj format file to generate a drc file; S3: publishing the drc file generated in step S2 as a static file, Set the rendering conditions, select the loader, and transfer the address published by the static file to the loader for preliminary rendering; S4: Input IT asset protection information and bind asset information; S5: The backend starts monitoring and recording attack data; S6: Backend The recorded attack data is transmitted to the front-end page in real time. After receiving the attack data, the front-end page queries the monomer model where the target node is located according to the bound information, and then draws the attacked unit node, and then draws the attack route. Real-time update rendering, real-time and vivid display of hidden attack behaviors, can fully vividly visualize abstract virtual network attacks, and intuitively display the status quo of asset risks.

Description

technical field [0001] The invention relates to the field of network attack and defense asset risk analysis visualization, in particular to an IT asset risk situation awareness display method. Background technique [0002] Security awareness is the core of the security defense system. In the face of hidden attacks and penetration tests by hackers, whether it can be identified and discovered in the first place is the fundamental measure of the quality of the security system. Therefore, visualization technology has been used in a certain range in the security field. But at present, the visual display of network attacks is concentrated on the display of attacks at the national, provincial and municipal levels, and the use of internal IT asset risk display is seldom used. After a network attack occurs, only rely on security operation and maintenance personnel to use technical instructions to check layer by layer, and gradually locate the attacked assets. Such a method is not o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/24
CPCH04L41/22H04L63/14H04L63/20H04L67/02H04L69/162
Inventor 吴建亮胡鹏魏欣怡
Owner 广州锦行网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products