Network risk sensing method and network risk defense method

A risk perception and network technology, applied in the field of network security, can solve problems such as the difficulty in effectively utilizing security intelligence information of various devices, and the inability of self-defense recommendations based on perception results to ensure accuracy.

Active Publication Date: 2021-11-26
BEIJING UNIV OF POSTS & TELECOMM +2
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Network threat awareness is a method for identifying threat event intentions through single-dimensional or multi-dimensional security information correlation and fusion; current network threat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network risk sensing method and network risk defense method
  • Network risk sensing method and network risk defense method
  • Network risk sensing method and network risk defense method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the purpose, technical solutions and advantages of the present disclosure clearer, the present disclosure will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0035] It should be noted that, unless otherwise defined, the technical terms or scientific terms used in one or more embodiments of the present specification shall have ordinary meanings understood by those skilled in the art to which the present disclosure belongs. "First", "second" and similar words used in one or more embodiments of the present specification do not indicate any order, quantity or importance, but are only used to distinguish different components. "Comprising" or "comprising" and similar words mean that the elements or items appearing before the word include the elements or items listed after the word and their equivalents, without excluding other elements or items.

[0036] As mentioned in the back...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a network risk sensing method and a network risk defense method. The network risk sensing method comprises the following steps: aggregating alarm data collected by an IDS to obtain a simplified alarm set; performing association analysis on the simplified alarm set to obtain a completed attack chain; matching the completed attack chain with a complete attack chain in a matching attack mode knowledge base, and calculating the threat degree of the completed attack chain; performing vulnerability scanning on a host, and querying a CVSS vulnerability score of the host; and performing open port scanning on the host, and calculating an open port attack utilization rate. The network risk defense method comprises: defending the host according to a CVSS vulnerability score in combination with the threat degree of the completed attack chain and the open port attack utilization rate. According to the method provided by the invention, multi-dimensional data is fused to carry out threat sensing, and state evaluation is carried out in combination with a scoring result, so that the accuracy of defense implementation is ensured, defense can be automatically completed, and manual decision is not needed.

Description

technical field [0001] One or more embodiments of this specification relate to the technical field of network security, and in particular to a network risk awareness method and defense method. Background technique [0002] In recent years, Internet security has faced severe challenges, and cyber threats have intensified. A network threat refers to a target or event that can destroy the security of the network system environment, and a threat is a potential attack. Cyber ​​threats cover a wide range, including but not limited to malware, web attacks, web application attacks, phishing, denial of service, spam, botnets, data breaches, insider threats, information leaks, identity theft, cyber espionage, etc. [0003] The traditional network defense technology is a static and passive defense technology, which usually restores and traces the source after suffering damage, and has a certain degree of passivity and hysteresis. In order to change the passivity of the defender, cybe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/1416H04L63/1433H04L41/0631H04L63/20
Inventor 李丹丹黄小红魏晓宇李建华丛群
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products