CN102148820A - System and method for estimating network security situation based on index logarithm analysis - Google Patents
System and method for estimating network security situation based on index logarithm analysis Download PDFInfo
- Publication number
- CN102148820A CN102148820A CN2011100086174A CN201110008617A CN102148820A CN 102148820 A CN102148820 A CN 102148820A CN 2011100086174 A CN2011100086174 A CN 2011100086174A CN 201110008617 A CN201110008617 A CN 201110008617A CN 102148820 A CN102148820 A CN 102148820A
- Authority
- CN
- China
- Prior art keywords
- network
- assets
- data
- security
- safety situation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a system and method for estimating network security situation based on index logarithm analysis. The system is characterized by comprising a data acquisition sub-system, a network security situation understanding sub-system, a network security situation estimation sub-system and a security reinforcement scheme sub-system. The method comprises the following steps: A, carrying out statistical data fusion and correlation analysis on data of a network system in the aspects of asset, threat and vulnerability so as to obtain standardized data, wherein the data is acquired by a transducer; and B, carrying out the network security situation estimation on the fused standardized data in the step A based on the index logarithm analysis. The confidentiality, the integrity and the availability of the network security situation are estimated in the aspects of the asset, the threat and the vulnerability, and the estimation result is output. The system and method provided by the invention can be applied to the situation estimation and risk estimation. According to the system and method provided by the invention, the linear increment of the security situation can be avoided with the increment of network size, thus not only highlighting influences on security incidents with high hazard and significant assets, but also considering influences on security incidents with low hazard and nonsignificant assets, thereby complying with practical situations.
Description
Technical field
The invention belongs to field of information security technology, be specifically related to based on the network safety situation evaluating system and the method that refer to logit analysis.
Background technology
(Situation Awareness is exactly under regular hour and steric requirements SA), to the perception of environmental factor, understanding and to the prediction of its future development trend in the situation perception.
The network safety situation perception is in large-scale network environment, development in future trend is obtained, understands, assesses and predicted to the lot of essential factors that influences network security, being a kind of means to the internet security quantitative analysis, is the meticulous tolerance to internet security.
The situation assessment is the core of situation perception, is the qualitative, quantitative of network security situation is described.The network safety situation assessment is the basis and the key component of whole network safety situation perception.
The risk assessment foundation is safe practice and administrative standard for information about, to information system and estimating by the security attributes such as confidentiality, integrality and availability of its processing, transmission and canned data, it is a kind of quantitative description method to security of system, provides the safe condition of system with the form of safe class." (information security risk evaluation standard (GB/T20984-2007) " in, introduced a kind of method of using the matrix method calculation risk.Risk elements is generally assets, threat, fragility.Matrix method mainly is applicable to the situation of being determined a key element value by two key element values.
Can use for reference the network safety situation assessment based on the methods of risk assessment of GB/T 20984-2007, but matrix method only is used in the situation of being determined a key element value by two key element values, computational process is not directly perceived, and can not calculate well by single assets, threat, the fragility situation to a plurality of assets, threat, fragility.
Summary of the invention
The objective of the invention is to above-mentioned irrationality at prior art, propose a kind of based on the network safety situation evaluating system and the method that refer to logit analysis, both given prominence to and endangered the big security incident and the influence of critical asset, considered to endanger the influence of little security incident and not too important assets again, make it more to tally with the actual situation, to avoid along with the linear increase of the increase security postures value of network size.
Of the present invention based on the network safety situation evaluating system and the method that refer to logit analysis, it is characterized in that: comprise that data acquisition subsystem, network security postures understand subsystem, network safety situation evaluation subsystem; Data acquisition subsystem, pass through multisensor, comprise vulnerability scanning equipment, assets investigation apparatus, network topology scanning device, intruding detection system, antivirus protection software and hardware, fire compartment wall etc., catch assets, the threat of network system, the data of fragility aspect; Network safety situation is understood subsystem, the foundation data dictionary relevant in database at first with assets, threat and fragility, the initial data that the data acquisition subsystem is collected is carried out statistical analysis then, remove repetition, error items, revise nonconformance, then data after the statistical analysis and data dictionary are carried out association analysis, assets, threat and the fragility data of the form that obtains standardizing; Mainly be used in the network safety situation evaluation subsystem based on the network security situation evaluating method that refers to logit analysis, understand the data that subsystem provides according to network safety situation, assess in the face of network safety situation from confidentiality, integrality and availability are tripartite in the face of network safety situation from assets, threat and fragility are tripartite, export assessment result; According to network confidentiality security postures value, integrality security postures value, availability security postures value network safety situation is carried out total evaluation then, the output assessment result.
The present invention is based on the network safety situation evaluating system and the method that refer to logit analysis and can not only use in the middle of the network safety situation assessment, equally also can apply in the middle of the risk assessment.It is similar that computational methods and situation are assessed.
Because the present invention has taked to get earlier index, weighting computational methods of taking the logarithm again, compare with the computational methods of prior art, can calculate the situation of determining a key element value by two and two above key element values, and the situation that can calculate a plurality of assets, threat, fragility by single assets, threat, fragility, both given prominence to and endangered the big security incident and the influence of critical asset, considered to endanger the influence of little security incident and not too important assets again, and computational process directly perceived, understand easily.
In the network safety situation evaluation subsystem, adopt based on the network security situation evaluating method that refers to logit analysis:
Because the infringement of the high one-level security incident of the integral body of two inferior grade security incidents infringement neither one is big, endanger big security incident and occur in the influence that important assets cause, occur on the unessential assets big more than the little security incident of harm, but little security incident and the assets of these influences impact the security postures of whole network system again, therefore when calculating entire effect by the individuality influence, can not adopt simple addition, need to adopt the computational methods shown in the formula (1) based on finger logit analysis, wherein, B is meant the truth of a matter of logit analysis, and k ∈ Φ represents to get the individuality that toilet has.
With k constantly, by the confidentiality situation component of single threat, the confidentiality situation component of assessing whole network is an example, the computing formula that is adopted shown in (2), t ∈ Φ wherein
TExpression is to the confidentiality security postures analysis-by-synthesis of all concentrated threats of threat data, and is similar with it to the analysis of integrality and availability situation component.
Key based on the network security situation evaluating method that refers to logit analysis is the selection of truth of a matter B, is evaluated as example with the confidentiality security postures below, and truth of a matter selection problem is described.
Assignment to the extent of injury of the assignment of assets confidentiality, the assignment that threatens probability of happening and fragility among the GBT20984 can be found, all be to be divided into five grades, and can be similar to the increase of thinking along with progression, corresponding harm and the probability that takes place all are that index increases, therefore the progression value is B=5 when concrete the application, and finds that in actual applications assessment result meets the actual conditions of network security.
Security postures is the safe condition of goal systems, and the final purpose of situation assessment is that aid decision person makes a strategic decision, therefore can not be too complicated, need a fairly simple expression intuitively.When the security postures of the whole network of assessment, need treat with a certain discrimination at the network of different application background, different application backgrounds is to the confidentiality of network, requiring of integrality and availability is different, such as for government bodies, confidentiality is most important, concerning Banking sector, integrality is vital, then is concerned about most availability such as the show business of VOD.When the security postures of the whole network of assessment, based on security postures component assessment result to confidentiality, integrality and availability, adopt weighted model to obtain the security postures component of whole network,, assess the system safety situation under the different application demand according to different weighting parameters.Concrete computational methods as shown in Equation (3), wherein, ω
C, ω
I, ω
ABe confidentiality, the weight of integrality and availability can be specified according to application background.
R(s(k))=R
C(s(k))·ω
C+R
I(s(k))·ω
I+R
A(s(k))·ω
A (3)
Description of drawings
Fig. 1 is a network safety situation evaluating system schematic diagram of the present invention.
Embodiment
Embodiment 1:
Fig. 1 has provided network security situation sensing system of the present invention, and this system comprises that data acquisition subsystem, network safety situation understand subsystem, network safety situation evaluation subsystem, security hardening scheme subsystem.
Wherein, data acquisition subsystem, by multisensor, comprise vulnerability scanning equipment, assets investigation apparatus, network topology scanning device, intruding detection system, antivirus protection software and hardware, fire compartment wall etc., catch assets, the threat of network system, the data of fragility aspect.
Network safety situation is understood subsystem, the foundation data dictionary relevant in database at first with assets, threat and fragility, the initial data that the data acquisition subsystem is collected is carried out statistical analysis then, remove repetition, error items, revise nonconformance, then data after the statistical analysis and data dictionary are carried out association analysis, assets, threat and the fragility data of the form that obtains standardizing.
Mainly be used in the network safety situation evaluation subsystem based on the network security situation evaluating method that refers to logit analysis, understand the data that subsystem provides according to network safety situation, assess in the face of network safety situation from confidentiality, integrality and availability are tripartite in the face of network safety situation from assets, threat and fragility are tripartite, export assessment result; According to network confidentiality security postures value, integrality security postures value, availability security postures value network safety situation is carried out total evaluation then, the output assessment result.
Security hardening scheme subsystem according to the security postures of network system and user's demand, provides different Scheme of Strengthening, satisfies the needs of user to network system security.This subsystem with network current safety situation value and predefined security postures threshold ratio then according to comparative result, to the part of security postures value greater than threshold value, generates corresponding Scheme of Strengthening.
The inventive method can not only be used in the middle of the network safety situation assessment, also can apply in the middle of the risk assessment.
In the methods of the invention, why select to refer to that the reason that logarithm calculates is as follows:
According to the wooden barrel principle, the big security incident of those harm occurs in the influence that important assets cause, occur on the unessential assets big more than the little security incident of harm, but little security incident and the assets of these influences impact the confidentiality security postures of whole network system again, the mode that all adopt first weighting to take the logarithm again, both given prominence to and endangered the big security incident and the influence of critical asset, considered to endanger the influence of little security incident and not too important assets again.
According to national standard " information security risk evaluation standard (GB/T 20984-2007) ", as shown in table 1, for fragility, value is 1 to 5, totally 5 values, if there are two fragility on the assets, value is respectively 2 and 3, then should be simply and value be not 5 threat equivalence, by analyzing, we find that the difference between the rank can be described with an exponential relationship and (further discover, truth of a matter selection 5 is more rational), if adopt exponential manner to calculate, be 2 and 3 two fragility then for value, result of calculation is 5
2+ 5
3=150, the value of being far smaller than is 5 of 5 a fragility
5=3125.But there is a problem in such computational methods, are exactly that the result is difficult to understand, and therefore it are taken the logarithm again, find that by test such result has suitable reasonability.Correlation computations for assets, threat also can adopt similar approach.
The probability assignment table that table 1 fragility is utilized
Illustrate below based on the network security situation evaluating method that refers to logit analysis:
Having two network A, B to prepare assessment, is 5 assets if network A has a confidentiality security postures value, and two assets are arranged in the network B, and its confidentiality situation value is respectively 3,4.If the expert of consulting secure context can not think that network A is just necessarily than network B safety.
To have proposed a kind of analytical method in order addressing this problem, can to have given affirmative answer based on the index logarithm.Such as, can calculate the validity situation value of whole network system by following method, be designated as
Wherein:
It is the validity situation value of single assets.
A
T tIt is the validity situation value that threatens t;
A
V vIt is the validity situation value of fragile v;
A
A aIt is the validity situation value of assets a;
B is the truth of a matter.
Illustrate: the single assets of mentioning here, specifically be meant and calculate a threat, assets, the security postures that fragility associates, promptly threaten and utilize the situation of fragility the hurtful complete procedure of assets, so, the validity situation value of single assets just refers to the situation value of an association.
In formula (1), calculated the validity situation value of single assets.Here, only be concerned about validity, integrality and three attributes of availability.In formula (1), only be concerned about validity.In the formula (1), the situation exponential quantity of threat, fragility and assets is multiplied each other, take the logarithm, just obtained the validity situation value of assets now then all multiplied result additions, and to summation.
In formula (2), calculated the validity situation value of all assets in the whole network.Be to obtain as can be seen by taking the logarithm after the validity situation value addition with all single assets.Now, obtained the validity situation value of whole network to be assessed.
Usually establishing the truth of a matter is 2.Confidentiality situation value and integrality situation value also can calculate by the inventive method.
The advantage of the algorithm that adopts in order to introduce among the present invention to do relatively individual with previous general method now.
Two network B and C are arranged.2 assets are arranged in the network B, and its validity situation value is respectively 5 and 3; Network C has three assets, and its validity situation value is respectively 4,3,3.
If with the method for general simple addition, the validity situation value of calculating is as follows:
From the result of calculation of (3), (4), network B is more safer than network C, but it seems that the expert might not be such.
Now, calculate validity situation value with the inventive method, as follows:
From the result of calculation of (5), (6), network B is more safer than network C, and this result more corresponds to reality.So the inventive method is better than former method.
As everyone knows, network is very complicated, and is constantly changing.See following Example.
3 assets are arranged among the network D, and its validity situation value is respectively 4,3,3.If wherein there are assets to go wrong, must leave this network, so just only be left 2 assets, the validity situation value of remaining assets is 4,3.Now, respectively the validity situation value of the network D before changing is calculated validity situation value with change network D ' afterwards with former method and new method.
Method with general simple addition can obtain:
Use index logit analysis method, can obtain:
In formula (9) and formula (12), λ
1And λ
2Variable quantity before and after expression changes.Can see λ
2Compare λ
1Little a lot, so the inventive method is more suitable for dynamic network.
This only is a simple example, but a lot of factors of instability are arranged in network world.For example, various wireless networks, its fail safe is very complicated.The seriousness that whether can predict these network environments in advance seems particularly important, whether can obtain more accurately that assessment result is very crucial, and the inventive method can done better aspect the accuracy of assessment.
Each is different to some extent for the emphasis that the user is concerned about, and most of user is to the expert of network security aspect, so they wonder the assessment result of an integral body.
The present invention provides a weight table, has wherein reflected the emphasis that the different users pays close attention to.
Based on this weight table, whole security postures value can calculate by formula (13).
In the formula:
C, I and A: the security postures value of expression confidentiality, integrity, and availability.
α
i: the weights of expression C, I and A.
Claims (5)
1. one kind based on the network safety situation evaluating system and the method that refer to logit analysis, comprises that data acquisition subsystem, network safety situation understand subsystem, network safety situation evaluation subsystem, security hardening scheme subsystem, it is characterized in that:
Data acquisition subsystem, pass through multisensor, comprise vulnerability scanning equipment, assets investigation apparatus, network topology scanning device, intruding detection system, antivirus protection software and hardware, fire compartment wall etc., catch assets, the threat of network system, the data of fragility aspect;
Network safety situation is understood subsystem, the foundation data dictionary relevant in database at first with assets, threat and fragility, the initial data that the data acquisition subsystem is collected is carried out statistical analysis then, remove repetition, error items, revise nonconformance, then data after the statistical analysis and data dictionary are carried out association analysis, assets, threat and the fragility data of the form that obtains standardizing;
The network safety situation evaluation subsystem, employing is based on the network security situation evaluating method that refers to logit analysis, understand the data that subsystem provides according to network safety situation, adopt index method to describe the value of assets, threat, fragility, employing refers to counting method is calculated the security postures value of single assets and the security postures value of whole network, assess in the face of network safety situation from confidentiality, integrality and availability are tripartite in the face of network safety situation from assets, threat and fragility are tripartite, export assessment result; According to network confidentiality security postures value, integrality security postures value, availability security postures value network safety situation is carried out total evaluation then, the output assessment result.
2. according to claim 1 based on the network safety situation evaluating system and the method that refer to logit analysis, it is characterized in that, this network safety situation evaluating system and method further comprise: security hardening scheme subsystem, security postures and Changing Pattern according to network system, different Scheme of Strengthening is provided, and the user who satisfies different demands improves security of network system.
3. realize that claim 1 is described based on the network safety situation evaluating system and the method that refer to logit analysis, may further comprise the steps:
A. to sensor acquisition to assets, threat, the data of fragility aspect of network system carry out statistical analysis and association analysis, obtain the normalized number certificate, then carry out B;
B. the normalized number after steps A being merged carries out the network safety situation assessment according to analyzing, and generates assessment result.
4. in accordance with the method for claim 3, wherein, in the steps A to sensor acquisition to the statistics of data merge and further to comprise with association analysis: the foundation data dictionary relevant in database at first with assets, threat and fragility, the initial data that the data acquisition module is collected is carried out statistical analysis then, remove repetition, error items, revise nonconformance, then data after the statistical analysis and data dictionary are carried out association analysis, assets, threat and the fragility data of the form that obtains standardizing.
5. in accordance with the method for claim 3, wherein, network safety situation assessment among the step B further comprises: adopt index method to describe the value of assets, threat, fragility, employing refers to counting method is calculated the security postures value of single assets and the security postures value of whole network, assess in the face of network safety situation from confidentiality, integrality and availability are tripartite in the face of network safety situation from assets, threat and fragility are tripartite, export assessment result; According to network confidentiality security postures value, integrality security postures value, availability security postures value network safety situation is carried out total evaluation then, the output assessment result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100086174A CN102148820A (en) | 2011-01-14 | 2011-01-14 | System and method for estimating network security situation based on index logarithm analysis |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100086174A CN102148820A (en) | 2011-01-14 | 2011-01-14 | System and method for estimating network security situation based on index logarithm analysis |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102148820A true CN102148820A (en) | 2011-08-10 |
Family
ID=44422817
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011100086174A Pending CN102148820A (en) | 2011-01-14 | 2011-01-14 | System and method for estimating network security situation based on index logarithm analysis |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102148820A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102624696A (en) * | 2011-12-27 | 2012-08-01 | 中国航天科工集团第二研究院七〇六所 | Network security situation evaluation method |
CN104852816A (en) * | 2015-04-22 | 2015-08-19 | 国网四川省电力公司电力科学研究院 | Intrusion detection system (IDS) intelligent warning method |
CN107231382A (en) * | 2017-08-02 | 2017-10-03 | 上海上讯信息技术股份有限公司 | A kind of Cyberthreat method for situation assessment and equipment |
CN107239707A (en) * | 2017-06-06 | 2017-10-10 | 国家电投集团河南电力有限公司技术信息中心 | A kind of threat data processing method for information system |
CN107995225A (en) * | 2017-12-26 | 2018-05-04 | 国网河南省电力公司信息通信公司 | A kind of security even analysis method towards complex network |
CN109088750A (en) * | 2018-07-23 | 2018-12-25 | 下代互联网重大应用技术(北京)工程研究中心有限公司 | Network Situation Awareness System design and dispositions method based on container |
CN109302408A (en) * | 2018-10-31 | 2019-02-01 | 西安交通大学 | A kind of network security situation evaluating method |
CN110213094A (en) * | 2019-05-29 | 2019-09-06 | 哈尔滨安天科技集团股份有限公司 | It is a kind of to threaten the method for building up of active topology figure, device and storage equipment |
CN110750795A (en) * | 2019-10-25 | 2020-02-04 | 华夏银行股份有限公司 | Information security risk processing method and device |
CN111740975A (en) * | 2020-06-16 | 2020-10-02 | 黑龙江省网络空间研究中心 | Network security situation awareness system and method |
CN111917785A (en) * | 2020-08-06 | 2020-11-10 | 重庆邮电大学 | Industrial internet security situation prediction method based on DE-GWO-SVR |
CN112804212A (en) * | 2020-12-31 | 2021-05-14 | 上海磐御网络科技有限公司 | Information security assessment system |
CN113449328A (en) * | 2021-08-31 | 2021-09-28 | 深圳市深航华创汽车科技有限公司 | Financial internet user data security processing method and system |
CN114844953A (en) * | 2022-05-12 | 2022-08-02 | 机械工业仪器仪表综合技术经济研究所 | Petrochemical device instrument automatic control equipment safety monitoring system based on industrial internet |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101459537A (en) * | 2008-12-20 | 2009-06-17 | 中国科学技术大学 | Network security situation sensing system and method based on multi-layer multi-angle analysis |
-
2011
- 2011-01-14 CN CN2011100086174A patent/CN102148820A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101459537A (en) * | 2008-12-20 | 2009-06-17 | 中国科学技术大学 | Network security situation sensing system and method based on multi-layer multi-angle analysis |
Non-Patent Citations (2)
Title |
---|
《Information Assurance and Security,2009.IAS '09.Fifth International Conference on》 20090820 Tan Xiaobin 等 Network Security Situation Awareness using Exponential and Logarithmic Analysis , * |
TAN XIAOBIN 等: "Network Security Situation Awareness using Exponential and Logarithmic Analysis", 《INFORMATION ASSURANCE AND SECURITY,2009.IAS ’09.FIFTH INTERNATIONAL CONFERENCE ON》, 20 August 2009 (2009-08-20) * |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102624696A (en) * | 2011-12-27 | 2012-08-01 | 中国航天科工集团第二研究院七〇六所 | Network security situation evaluation method |
CN102624696B (en) * | 2011-12-27 | 2014-11-05 | 中国航天科工集团第二研究院七〇六所 | Network security situation evaluation method |
CN104852816A (en) * | 2015-04-22 | 2015-08-19 | 国网四川省电力公司电力科学研究院 | Intrusion detection system (IDS) intelligent warning method |
CN107239707A (en) * | 2017-06-06 | 2017-10-10 | 国家电投集团河南电力有限公司技术信息中心 | A kind of threat data processing method for information system |
CN107239707B (en) * | 2017-06-06 | 2020-09-29 | 国家电投集团河南电力有限公司 | Threat data processing method for information system |
CN107231382A (en) * | 2017-08-02 | 2017-10-03 | 上海上讯信息技术股份有限公司 | A kind of Cyberthreat method for situation assessment and equipment |
CN107231382B (en) * | 2017-08-02 | 2020-08-18 | 上海上讯信息技术股份有限公司 | Network threat situation assessment method and equipment |
CN107995225A (en) * | 2017-12-26 | 2018-05-04 | 国网河南省电力公司信息通信公司 | A kind of security even analysis method towards complex network |
CN109088750A (en) * | 2018-07-23 | 2018-12-25 | 下代互联网重大应用技术(北京)工程研究中心有限公司 | Network Situation Awareness System design and dispositions method based on container |
CN109088750B (en) * | 2018-07-23 | 2021-05-25 | 下一代互联网重大应用技术(北京)工程研究中心有限公司 | Container-based network situation awareness system design and deployment method |
CN109302408B (en) * | 2018-10-31 | 2020-07-28 | 西安交通大学 | Network security situation assessment method |
CN109302408A (en) * | 2018-10-31 | 2019-02-01 | 西安交通大学 | A kind of network security situation evaluating method |
CN110213094A (en) * | 2019-05-29 | 2019-09-06 | 哈尔滨安天科技集团股份有限公司 | It is a kind of to threaten the method for building up of active topology figure, device and storage equipment |
CN110213094B (en) * | 2019-05-29 | 2021-11-16 | 安天科技集团股份有限公司 | Method and device for establishing threat activity topological graph and storage equipment |
CN110750795A (en) * | 2019-10-25 | 2020-02-04 | 华夏银行股份有限公司 | Information security risk processing method and device |
CN111740975A (en) * | 2020-06-16 | 2020-10-02 | 黑龙江省网络空间研究中心 | Network security situation awareness system and method |
CN111917785A (en) * | 2020-08-06 | 2020-11-10 | 重庆邮电大学 | Industrial internet security situation prediction method based on DE-GWO-SVR |
CN111917785B (en) * | 2020-08-06 | 2022-07-15 | 重庆邮电大学 | Industrial internet security situation prediction method based on DE-GWO-SVR |
CN112804212A (en) * | 2020-12-31 | 2021-05-14 | 上海磐御网络科技有限公司 | Information security assessment system |
CN113449328A (en) * | 2021-08-31 | 2021-09-28 | 深圳市深航华创汽车科技有限公司 | Financial internet user data security processing method and system |
CN113449328B (en) * | 2021-08-31 | 2022-02-15 | 深圳市深航华创汽车科技有限公司 | Financial internet user data security processing method and system |
CN114844953A (en) * | 2022-05-12 | 2022-08-02 | 机械工业仪器仪表综合技术经济研究所 | Petrochemical device instrument automatic control equipment safety monitoring system based on industrial internet |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102148820A (en) | System and method for estimating network security situation based on index logarithm analysis | |
Li et al. | Enhancing cloud-based IoT security through trustworthy cloud service: An integration of security and reputation approach | |
Barraclough et al. | Intelligent phishing detection and protection scheme for online transactions | |
CN107454105B (en) | Multidimensional network security assessment method based on AHP and grey correlation | |
US10630713B2 (en) | Method and tool to quantify the enterprise consequences of cyber risk | |
CN108833416B (en) | SCADA system information security risk assessment method and system | |
CN111680863A (en) | Network environment safety condition evaluation method based on analytic hierarchy process | |
CN101459537A (en) | Network security situation sensing system and method based on multi-layer multi-angle analysis | |
Yang et al. | A new cyber security risk evaluation method for oil and gas SCADA based on factor state space | |
CN101674302A (en) | Method and device for conducting security identification on information system | |
CN106230773A (en) | Risk evaluating system based on fuzzy matrix analytic hierarchy process (AHP) | |
CN110620696A (en) | Grading method and device for enterprise network security situation awareness | |
CN104320271B (en) | A kind of network equipment safety evaluation method and device | |
CN112039704B (en) | Information system risk assessment method based on risk propagation | |
WO2012018574A1 (en) | System and method to measure and track trust | |
CN105933316A (en) | Network security level determination method and device | |
CN105262719B (en) | The method for evaluating trust of user behavior under a kind of Web environment | |
Chen et al. | Detection of false data injection attacks on power systems using graph edge-conditioned convolutional networks | |
CN113792298B (en) | Method and device for detecting safety risk of vehicle | |
Yu et al. | Traffic anomaly detection algorithm for wireless sensor networks based on improved exploitation of the GM (1, 1) model | |
Lin et al. | PQsel: combining privacy with quality of service in cloud service selection | |
Kao et al. | Classification of hospital web security efficiency using data envelopment analysis and support vector machine | |
CN113919239A (en) | Intelligent internal threat detection method and system based on space-time feature fusion | |
CN114118680A (en) | Network security situation assessment method and system | |
Lu et al. | Tensor mutual information and its applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20110810 |