Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A network security evaluation method, device, equipment and storage medium

A network security and evaluation method technology, which is applied in the network security evaluation method, equipment and storage media, and device fields, and can solve problems such as inability to adapt to network security requirements, network security assessment methods that cannot achieve accurate network security assessment, etc.

Active Publication Date: 2022-08-05
EVERSEC BEIJING TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing network security assessment methods usually set fixed preset weights for various security events, calculate the health index of various security events, and then obtain the network security index of the enterprise or region through re-weighting; The influence of enterprises in different industries is quite different. In this case, the existing network security assessment methods cannot achieve accurate assessment of network security, and with the development of time, new security incidents continue to emerge, and the existing network security assessment methods cannot Adapt to changing cybersecurity needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network security evaluation method, device, equipment and storage medium
  • A network security evaluation method, device, equipment and storage medium
  • A network security evaluation method, device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] figure 1 This is a flowchart of a network security evaluation method provided in the first embodiment of the present invention. This embodiment can be applied to obtain the security score of the corresponding Internet Protocol address to realize the network security evaluation. This method can be implemented by the fifth embodiment of the present invention. The provided network security evaluation device is implemented, the device can be implemented by software and / or hardware, and integrated on the electronic device, and the method specifically includes the following steps:

[0032] S110. Acquire security event data of at least one Internet Protocol address within a first preset time; wherein, the security event data includes the number of occurrences of security events.

[0033] The first preset time is a set time period for obtaining the corresponding security event data for the Internet Protocol addresses that need to be evaluated for security, for example, one day,...

Embodiment 2

[0048] figure 2 It is a flowchart of another network security evaluation method provided by the second embodiment of the present invention. This embodiment is embodied on the basis of the above-mentioned embodiment. In this embodiment, according to the Internet protocol address under each security event The industry influence coefficient and the hazard degree coefficient are used to determine the security weight value of the Internet Protocol address. The method specifically includes:

[0049] S210. Acquire security event data of at least one Internet Protocol address within a first preset time; wherein, the security event data includes the number of occurrences of security events.

[0050] S220. Determine, according to the historical security event data of the at least one internet protocol address, the maximum number of occurrences of each security event of the at least one internet protocol address within the first preset time.

[0051] S230. Determine the at least one Inte...

Embodiment 3

[0061] image 3 It is a flowchart of another network security evaluation method provided in Embodiment 3 of the present invention. This embodiment is embodied on the basis of Embodiment 1. In this embodiment, according to the Internet Protocol address under each security event The industry influence coefficient and the IP type influence coefficient of the IP address are used to determine the security weight value of the IP address, and the method specifically includes:

[0062] S310. Acquire security event data of at least one Internet Protocol address within a first preset time; wherein, the security event data includes the number of occurrences of security events.

[0063] S320. Determine, according to the historical security event data of the at least one internet protocol address, the maximum number of occurrences of each security event of the at least one internet protocol address within the first preset time.

[0064] S330. Determine the at least one Internet Protocol a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a network security evaluation method, device, equipment and storage medium. The method includes: acquiring security event data of at least one internet protocol address within a first preset time; Event data, and the maximum number of occurrences of each security event of at least one Internet Protocol address within the first preset time, determine the security quantitative data of at least one Internet Protocol address under each security event; Event data and industry information, determine the security weight value of at least one Internet Protocol address under each security event; determine the security of at least one Internet Protocol address according to the security quantification data and security weight value of at least one Internet Protocol address under each security event Score, realize the accurate evaluation of network security, and determine the corresponding security weight value according to security events, which can adapt to the changing network security requirements.

Description

technical field [0001] Embodiments of the present invention relate to the field of network technologies, and in particular, to a network security evaluation method, apparatus, device, and storage medium. Background technique [0002] With the rapid development of information technology, the network has become an important support platform for the production, operation and management of enterprises; however, various security incidents (for example, zombies, malicious programs, etc.) Therefore, it is of great significance to quantitatively assess enterprise network security and realize timely early warning of security incidents. [0003] The existing network security assessment methods usually set fixed preset weights for various security events, calculate the health index of various security events, and then obtain the network security index of the enterprise or region by re-weighting; The influence of enterprises in different industries is quite different. In this case, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/20
Inventor 邓拓龚济才马少林吕慧梁彧田野傅强王杰杨满智蔡琳金红陈晓光
Owner EVERSEC BEIJING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products