CN107203720A - risk value calculating method and device - Google Patents

risk value calculating method and device Download PDF

Info

Publication number
CN107203720A
CN107203720A CN201611262416.6A CN201611262416A CN107203720A CN 107203720 A CN107203720 A CN 107203720A CN 201611262416 A CN201611262416 A CN 201611262416A CN 107203720 A CN107203720 A CN 107203720A
Authority
CN
China
Prior art keywords
value
target device
target
attack
risk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611262416.6A
Other languages
Chinese (zh)
Other versions
CN107203720B (en
Inventor
王秀娟
高峰
张建军
苏砫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ultrapower Information Safety Technology Co Ltd
Original Assignee
Beijing Ultrapower Information Safety Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ultrapower Information Safety Technology Co Ltd filed Critical Beijing Ultrapower Information Safety Technology Co Ltd
Priority to CN201611262416.6A priority Critical patent/CN107203720B/en
Publication of CN107203720A publication Critical patent/CN107203720A/en
Application granted granted Critical
Publication of CN107203720B publication Critical patent/CN107203720B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiments of the invention provide a kind of risk value calculating method and device.Obtain the apparatus value of target device;Obtain target device itself exist leak, the leak can by attack utilization target of attack equipment;The probable value that the leak analysis target device existed according to target device itself is attacked by attack;The target attack behavior for the leak target of attack equipment that statistics can exist using target device itself;Obtain the first influence degree value of each target attack behavior each respectively to target device;The the first influence degree value of the probable value attacked according to the apparatus value, target device by attack and each target attack behavior each respectively to target device, calculates first value-at-risk of all target attack behaviors to target device.The degree of accuracy of the obtained all target attack behaviors to the value-at-risk of target device is calculated by the embodiment of the present invention higher.

Description

Risk value calculating method and device
Technical field
The present embodiments relate to field of computer technology, more particularly to a kind of method and device of value-at-risk.
Background technology
Currently, enterprise includes many equipment, illegal when the equipment itself has leak for any one equipment Molecule by attack using the leak may malicious attack equipment so that cause equipment can not normal work, and then give Enterprise brings loss, and in order to protect the equipment in enterprise, it is necessary to calculate the value-at-risk of the equipment in enterprise, the value-at-risk of equipment is The probable value of loss is brought after equipment is under attack.
Wherein, prior art provides a kind of risk value calculating method, including:
Technical staff can manually set each attack each respectively after attack equipment to the of equipment in advance One influence degree value, and manually set equipment itself each leak that may be present each to influence journey to the second of equipment respectively Angle value.
In the value-at-risk of computing device, the leak that equipment can exist with detection device itself, and obtain what is pre-set The the second influence degree value of each leak detected each respectively to equipment.
It is then determined that the attack of equipment can be attacked using the leak, then obtain each pre-set and determine Attack each respectively after attack equipment to the first influence degree value of equipment, the first influence degree then obtained Highest the first influence degree value is searched in value.Afterwards by highest the first influence degree value sum and the second all influence journeys Angle value is multiplied, and obtains the probable value that equipment is attacked.
The second all influence degree value sums is multiplied with the apparatus value of equipment again all attacks determined Influence degree value of the behavior to equipment;All attacks determined are attacked with equipment the influence degree value of equipment Value-at-risk of all attacks that probable value multiplication is determined to equipment.
However, inventor has found during the embodiment of the present invention is realized, this scheme of the prior art is at least deposited In following shortcoming:The value-at-risk to equipment calculated is accurate.
The content of the invention
To overcome problem present in correlation technique, the embodiment of the present invention provides a kind of risk value calculating method and device.
First aspect according to embodiments of the present invention includes there is provided a kind of risk value calculating method, methods described:
Obtain the apparatus value of target device;
The leak of the target device itself presence is obtained, the leak can be utilized by attack and attack the mesh Marking device;The probable value that the target device according to the leak analysis is attacked by attack;
Statistics can enough attack the target attack behavior of the target device using the leak, obtain each target and attack Hit the first influence degree value of behavior each respectively to the target device;
According to the apparatus value, the probable value and each target attack behavior each respectively to the target device The first influence degree value, calculate the first value-at-risk of all target attack behaviors to the target device.
Wherein, it is described according to the apparatus value, the probable value and each target attack behavior each respectively to institute The first influence degree value of target device is stated, first value-at-risk of all target attack behaviors to the target device, bag is calculated Include:
For each target attack behavior, according to the apparatus value, the probable value and the target attack behavior To the first influence degree value of the target device, second risk of the target attack behavior to the target device is calculated Value;
According to the second value-at-risk of each target attack behavior each respectively to the target device, all targets are calculated First value-at-risk of the attack to the target device.
Wherein, the apparatus value for obtaining target device, including:
Obtain confidentiality, integrality, availability and the business correlation of the target device;
According to the confidentiality, the integrality, the availability and the business correlation, calculated according to equation below Obtain the apparatus value of the target device:
Wherein, W is the apparatus value, and C is the confidentiality, and I is the integrality, and A is the availability, and B is institute Business correlation is stated, N is the first predetermined threshold value, and M is the second predetermined threshold value.
Wherein, the probable value that the target device according to the leak analysis is attacked by attack, including:
Obtain the second influence degree value of each described leak each respectively to the target device;
According to the second influence degree value of each described leak each respectively to the target device, according to equation below Calculate the probable value that the target device is attacked by attack:
T=Vmax+logx(V’);
Wherein, T is the probable value, VmaxFor highest the second influence degree value in all second influence degree values; V ' is other all second influence degrees in addition to highest the second influence degree value in all second influence degree values The summation of value, X is the 3rd predetermined threshold value.
Wherein, it is described to obtain the first influence degree of each target attack behavior each respectively to the target device Value, including:
For each target attack behavior, the target attack behavior is obtained to the of the confidentiality of the target device Three influence degree values, to the 3rd influence degree value of the integrality of the target device, to the 3rd of the availability of the equipment the 3rd influence degree value of influence degree value and business correlation to the target device;
According to threeth influence degree value of the target attack behavior to the confidentiality of the target device, to the target 3rd influence degree value of the integrality of equipment, the 3rd influence degree value to the availability of the equipment and to the target 3rd influence degree value of the business correlation of equipment, calculates the target attack behavior according to equation below and the target is set The first standby influence degree value:
Wherein, S is first influence degree value of the target attack behavior to the target device, and c is that the target is attacked Threeth influence degree value of the behavior to the confidentiality of the target device is hit, i is that the target attack behavior is set to the target 3rd influence degree value of standby integrality, a is threeth shadow of the target attack behavior to the availability of the target device Degree value is rung, and b is threeth influence degree value of the target attack behavior to the business correlation of equipment;X is the 4th pre- If threshold value, Y is the 5th predetermined threshold value.
Wherein, it is described according to the apparatus value, the probable value and the target attack behavior to the of target device One influence degree value, calculates second value-at-risk of the target attack behavior to the target device, including:
For each target attack behavior, according to the apparatus value, the probable value and the target attack behavior To the first influence degree value of the target device, the target attack behavior is calculated to the target device according to equation below The second value-at-risk;
R=W*T*S;
Wherein, R is second value-at-risk of the target attack behavior to the target device, and S is the target attack row For the first influence degree value to the target device.
Wherein, second value-at-risk according to each target attack behavior each respectively to the target device, meter First value-at-risk of all target attack behaviors to the target device is calculated, including:
According to the second value-at-risk of each target attack behavior each respectively to the target device, all targets are calculated First value-at-risk of the attack to the target device:
Q=Rmax+logk(R’);
Wherein, Q is all target attack behaviors to the first value-at-risk of the target device, RmaxFor in each target Attack is each respectively to the value-at-risk of highest second in the second value-at-risk of the target device;R ' is in each mesh Attack is marked each respectively to other in addition to the value-at-risk of highest second in the second value-at-risk of the target device The summation of all second value-at-risks, K is the 6th predetermined threshold value.
Second aspect according to embodiments of the present invention includes there is provided a kind of risk value calculation apparatus, described device:
First acquisition module, the apparatus value for obtaining target device;
Second acquisition module, the leak for obtaining the target device itself presence, the leak can be gone by attack The target device is attacked for utilization;Analysis module, for according to the leak analysis target device by attack The probable value of attack;
Statistical module, for counting the target attack behavior of the target device that can enough be attacked using the leak, the Three acquisition modules, for obtaining the first influence degree value of each target attack behavior each respectively to the target device;
First computing module, for according to the apparatus value, the probable value and each target attack behavior each Respectively to the first influence degree value of the target device, first wind of all target attack behaviors to the target device is calculated Danger value.
Wherein, the first computing module includes:
First computing unit, for for each target attack behavior, according to the apparatus value, the probable value and The target attack behavior calculates the target attack behavior to the target to the first influence degree value of the target device Second value-at-risk of equipment;
Second computing unit, for the second wind according to each target attack behavior each respectively to the target device Danger value, calculates first value-at-risk of all target attack behaviors to the target device.
Wherein, first acquisition module includes:
First acquisition unit, confidentiality, integrality, availability and business correlation for obtaining the target device;
3rd computing unit, for related to the business according to the confidentiality, the integrality, the availability Property, the apparatus value for obtaining the target device is calculated according to equation below:
Wherein, W is the apparatus value, and C is the confidentiality, and I is the integrality, and A is the availability, and B is institute Business correlation is stated, N is the first predetermined threshold value, and M is the second predetermined threshold value.
Wherein, the analysis module includes:
Second acquisition unit, each journey is influenceed for obtaining each described leak on the second of the target device respectively Angle value;
4th computing unit, for each influenceing journey to the second of the target device respectively according to each described leak Angle value, the probable value that the target device is attacked by attack is calculated according to equation below:
T=Vmax+logx(V’);
Wherein, T is the probable value, VmaxFor highest the second influence degree value in all second influence degree values; V ' is other all second influence degrees in addition to highest the second influence degree value in all second influence degree values The summation of value, X is the 3rd predetermined threshold value.
Wherein, the 3rd acquisition module includes:
3rd acquiring unit, for for each target attack behavior, obtaining the target attack behavior to the mesh 3rd influence degree value of the confidentiality of marking device, to the 3rd influence degree value of the integrality of the target device, to described 3rd influence degree value of the 3rd influence degree value of the availability of equipment and the business correlation to the target device;
5th computing unit, for the 3rd influence according to the target attack behavior on the confidentiality of the target device Degree value, to the 3rd influence degree value of the integrality of the target device, on the 3rd influence journey of the availability of the equipment 3rd influence degree value of angle value and business correlation to the target device, calculates the target according to equation below and attacks Hit first influence degree value of the behavior to the target device:
Wherein, S is first influence degree value of the target attack behavior to the target device, and c is that the target is attacked Threeth influence degree value of the behavior to the confidentiality of the target device is hit, i is that the target attack behavior is set to the target 3rd influence degree value of standby integrality, a is threeth shadow of the target attack behavior to the availability of the target device Degree value is rung, and b is threeth influence degree value of the target attack behavior to the business correlation of equipment;X is the 4th pre- If threshold value, Y is the 5th predetermined threshold value.
Wherein, first computing unit specifically for:
For each target attack behavior, according to the apparatus value, the probable value and the target attack behavior To the first influence degree value of the target device, the target attack behavior is calculated to the target device according to equation below The second value-at-risk;
R=W*T*S;
Wherein, R is second value-at-risk of the target attack behavior to the target device, and S is the target attack row For the first influence degree value to the target device.
Second computing unit specifically for:
According to the second value-at-risk of each target attack behavior each respectively to the target device, all targets are calculated First value-at-risk of the attack to the target device:
Q=Rmax+logk(R’);
Wherein, Q is all target attack behaviors to the first value-at-risk of the target device, RmaxFor in each target Attack is each respectively to the value-at-risk of highest second in the second value-at-risk of the target device;R ' is in each mesh Attack is marked each respectively to other in addition to the value-at-risk of highest second in the second value-at-risk of the target device The summation of all second value-at-risks, K is the 6th predetermined threshold value.
The third aspect according to embodiments of the present invention is applied to business there is provided a kind of risk value calculating method, methods described System, the operation system includes multiple target devices, and methods described includes:
Obtain the first value-at-risk of each target device in the operation system, the first value-at-risk of each target device According to:Probable value that the apparatus value of the target device, the target device gone out according to leak analysis are attacked by attack and According to first influence degree value of the corresponding each target attack row of the target device to the target device, gained is calculated;
According to the value-at-risk of each target device, the value-at-risk of the operation system is calculated according to equation below:
U=Qmax+logk(Q’);
Wherein, U is the value-at-risk of the operation system, QmaxFor each target device in the operation system The value-at-risk of highest first in first value-at-risk;Q ' is the first risk of each target device in the operation system The summation of all first value-at-risks of other in addition to the value-at-risk of highest first in value;K is the 6th predetermined threshold value.
Fourth aspect according to embodiments of the present invention is applied to business there is provided a kind of risk value calculation apparatus, described device System, the operation system includes multiple target devices, it is characterised in that described device includes:
4th acquisition module, the first value-at-risk for obtaining each target device in the operation system, each mesh First value-at-risk of marking device according to:The apparatus value of the target device, the target device gone out according to leak analysis are attacked Behavior attack probable value and according to first influence degree of the corresponding each target attack row of the target device to the target device Value, calculates gained;
Second computing module, for the value-at-risk according to each target device, the business is calculated according to equation below The value-at-risk of system:
U=Qmax+logk(Q’);
Wherein, U is the value-at-risk of the operation system, QmaxFor each target device in the operation system The value-at-risk of highest first in first value-at-risk;Q ' is the first risk of each target device in the operation system The summation of all first value-at-risks of other in addition to the value-at-risk of highest first in value;K is the 6th predetermined threshold value.
Technical scheme provided in an embodiment of the present invention can include the following benefits:
Wherein, the first value-at-risk of target device should be attacked depending on apparatus value, the target device of target device The the first influence degree value of the probable value and each target attack behavior of behavior attack each respectively to target device.
The probable value that target device is attacked by attack should depend on the leak that target device itself is present, and with attacking The first influence degree value that behavior is hit to target device is unrelated.
Target attack behavior to the first influence degree value of target device should depend on target device apparatus value and Target attack behavior the 3rd influence degree value respectively to the integrality of target device, the 3rd shadow to the confidentiality of target device Ring the 3rd influence of degree value, the 3rd influence degree value on the availability of target device and the business correlation on target device Degree value, it is unrelated with the leak that target device itself is present.
But, in the prior art, the probable value that equipment is attacked be according to equipment itself exist each leak each The the first influence degree value of the second influence degree value and each attack each respectively to equipment respectively to equipment is calculated Obtain, include this dependent variable that should not be included:The first influence degree of each attack each respectively to equipment Value.
And, in the prior art, attack be to the first influence degree value of equipment according to equipment attacked it is general The apparatus value of rate value and equipment calculates what is obtained, that is, attack is according to equipment itself to the first value-at-risk of equipment What the apparatus value calculating of the second influence degree value and equipment of each leak existed each respectively to equipment was obtained, including This dependent variable that should not do not included:The second influence degree of each leak that equipment itself is present each respectively to equipment Value.
Therefore, all target attack behaviors calculated according to risk value calculating method of the prior art are to target device Value-at-risk it is inaccurate, and in embodiments of the present invention, obtain the apparatus value of target device;Target device itself is obtained to exist Leak, the leak can by attack utilization target of attack equipment;The leak analysis existed according to target device itself The probable value that target device is attacked by attack;The leak target of attack equipment that statistics can exist using target device itself Target attack behavior;Obtain the first influence degree value of each target attack behavior each respectively to target device;According to The probable value and each target attack behavior that the apparatus value, target device are attacked by attack are each set to target respectively The first standby influence degree value, calculates first value-at-risk of all target attack behaviors to target device.
It can be seen that, target device in the embodiment of the present invention is according to target device itself by the probable value that attack is attacked What the leak of presence was obtained, all target attack behaviors are to equipment valency that the first value-at-risk of target device is according to target device Probable value that value, target device are attacked by attack and each target attack behavior each respectively to target device first What influence degree was worth to, compared to prior art, obtained all target attack behaviors pair are calculated by the embodiment of the present invention The degree of accuracy of first value-at-risk of target device is higher.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not The embodiment of the present invention can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the implementation for meeting the present invention Example, and be used to together with specification to explain the principle of the embodiment of the present invention.
Fig. 1 is a kind of flow chart of risk value calculating method according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of risk value calculating method according to an exemplary embodiment;
Fig. 3 is a kind of block diagram of risk value calculation apparatus according to an exemplary embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the embodiment of the present invention.On the contrary, they be only with As be described in detail in the appended claims, embodiment of the present invention some in terms of consistent apparatus and method example.
Fig. 1 is a kind of flow chart of risk value calculating method according to an exemplary embodiment, as shown in figure 1, should Method is used in equipment, and this method comprises the following steps.
In step S101, the apparatus value of target device is obtained;
In embodiments of the present invention, target device can be computer, server, router or the interchanger in enterprise Deng.
In embodiments of the present invention, the apparatus value of target device is at least embodied by following four:The secret of target device Property, integrality, availability and business correlation.
Wherein, the confidentiality of target device includes:The degree of secrecy of the business data stored in target device.If storage Business data degree of secrecy it is higher, then after target device is attacked, the secret of enterprise can be caused to be stolen, so to enterprise The interests of industry bring very big loss.If the degree of secrecy of the business data of storage is relatively low, after target device is attacked, i.e., Make to cause the data of storage to be stolen, and then the interests of enterprise are brought compared with small loss.
The integrality of target device includes:The significance level of the data of the enterprise stored in target device.If target is set The business data of standby middle storage is more complete, then illustrates that the significance level of business data stored in target device is higher, then in mesh After marking device is attacked, the corrupted data or target device of enterprise can be caused to delay machine, and then bring very big to the interests of enterprise Loss.If the business data stored in target device is more incomplete, the business data for illustrating to store in target device it is important Degree is relatively low, then after target device is attacked, the machine even if corrupted data or target device of enterprise are delayed, and then to enterprise Interests are brought compared with small loss.
The availability of target device includes:The duration that the business data stored in target device is used daily.If deposited The duration that the business data of storage is used daily is longer, then after target device is attacked, can cause enterprise corrupted data or Person's target device is delayed machine, so cause the duration that the business data stored in target device is used with should this duration for using Between gap it is larger, and then very big loss is brought to the interests of enterprise.If the duration that the business data of storage is used daily It is shorter, then after target device is attacked, the corrupted data or target device of enterprise can be caused to delay machine, and then target is set Duration that the business data of standby middle storage is used and should between this duration for using gap it is smaller, and then to the interests of enterprise Very little is brought to lose.
The business correlation of target device includes:The quantity of the business stored in target device is used the need in enterprise. If using the quantity of the business stored in target device more the need in enterprise, after target device is attacked, if The business data of storage is damaged, then the more business in enterprise can be caused not run normally, so to the loss of enterprise compared with Greatly.If using the negligible amounts of the business stored in target device the need in enterprise, after target device is attacked, such as The business data of fruit storage is damaged, then the less business only resulted in enterprise can not normally be run, the major part in enterprise Business can continue normal operation, and then smaller to the loss of enterprise.
In embodiments of the present invention, technical staff can assess confidentiality, integrality, availability and the industry of target device in advance Business correlation, and the confidentiality of target device, integrality, availability and business correlation are stored in locally, therefore, in this step , can be directly from local confidentiality, integrality, availability and the business correlation for obtaining target device, then according to mesh in rapid Marking device confidentiality, integrality, availability and business correlation, the equipment valency for obtaining target device is calculated according to equation below Value:
Wherein, W is the apparatus value of target device, and C is the confidentiality of target device, and I is the integrality of target device, A For the availability of target device, and the business correlation that B is target device, N is the first predetermined threshold value, and M is the second default threshold Value.
Wherein, N and M can be with identical, can also be different, and the embodiment of the present invention is not limited to this.The embodiment of the present invention Middle N and M can be 2.
In step s 102, the leak that target device itself is present is obtained, the leak can be utilized and attacked by attack Hit target device;
In embodiments of the present invention, it is possible to use verify instrument in the leak locally pre-set, target device is carried out Scanning comprehensively, the leak that target device itself is present is separated out by scanning result total score.
Attack includes:Cut off the power supply of target device, wooden horse or virus are implanted into target device, and damage mesh Hardware element in marking device etc..
In step s 103, according to target device itself exist leak analysis target device by attack attack it is general Rate value;
In this step, the second influence degree value of each leak each respectively to target device can be first obtained, so The second influence degree value further according to each leak each respectively to target device, target device is calculated according to equation below afterwards The probable value attacked by attack:
T=Vmax+logx(V’);
Wherein, T is the probable value that target device is attacked by attack, VmaxFor in each leak each respectively to mesh Highest the second influence degree value in the influence degree value of marking device;V ' is each respectively to target device in each leak The second influence degree value in other all second influence degree values in addition to highest the second influence degree value summation; X is the 3rd predetermined threshold value, and X can be 10 etc., and the embodiment of the present invention is not limited to this.
In embodiments of the present invention, different leaks is different to the influence degree value of target device.For any one leakage Hole, technical staff can assess second influence degree value of the leak to target device in advance, and the leak of the leak is identified One record is constituted to the second influence degree value of target device with the leak, and is stored in the leak mark being locally stored and leakage Hole is in the corresponding relation between the influence degree value of target device, for other each leaks, equally performing aforesaid operations.
Therefore, in embodiments of the present invention, the influence degree value of each leak each respectively to target device is being obtained When, any one leak existed for target device itself can be according to the leak mark and leak being locally stored to target Corresponding relation between the influence degree value of equipment, it is determined that the influence degree value corresponding with the leak mark of the leak, and make For the second influence degree value of the influence degree value of this pair of target device.Other each leakages existed for target device itself Hole, equally performs aforesaid operations, can so obtain the second influence degree value of each leak each respectively to target device.
In step S104, the target attack for the leak target of attack equipment that statistics can exist using target device itself Behavior;
In embodiments of the present invention, for the leak that may be present of any one in target device, technical staff in advance can Count:When there is the leak in target device, it is possible to use all attacks of the leak target of attack equipment, and will The leak mark of the leak is recorded and stored with that can constitute one using all attacks of the leak target of attack equipment In corresponding relation between the leak mark being locally stored and attack.For other in target device, each may be deposited Leak, same execution aforesaid operations.
Therefore, in this step, any one leakage existed for the target device itself determined in step s 102 Hole, can be according to the corresponding relation between the leak mark being locally stored and attack, it is determined that being identified with the leak of the leak Corresponding all attacks, other each leaks existed for the target device itself determined in step S102, It is same to perform aforesaid operations, all attacks determined then are defined as target attack behavior.
In step S105, the first influence degree of each target attack behavior each respectively to target device is obtained Value;
In embodiments of the present invention, the apparatus value of target device be at least by the confidentiality of target device, integrality, can Embodied with property and business correlation.It is right after leak target of attack equipment of the attack using target device itself presence First influence degree value of target device is also mainly reflected in the confidentiality to target device, integrality, availability and business In the influence degree of at least one of correlation.
For any one may target of attack equipment attack, technical staff can assess the attack in advance After target of attack equipment, to the 3rd influence degree value of the confidentiality of target device, and by the attack and the attack Behavior is stored in the attack being locally stored and the influence of confidentiality to the 3rd influence degree value of the confidentiality of target device In corresponding relation between degree value.And after assessing the attack target of attack equipment, to the integrality of target device The 3rd influence degree value, and by the 3rd influence degree value of the attack and the attack to the integrality of target device It is stored in the corresponding relation between the attack being locally stored and the influence degree value of integrality.And assess the attack row After target of attack equipment, to the 3rd influence degree value of the availability of target device, and by the attack and the attack Behavior is stored in the attack being locally stored and the influence of availability to the 3rd influence degree value of the availability of target device In corresponding relation between degree value.And after assessing the attack target of attack equipment, to the business phase of target device 3rd influence degree value of closing property, and by the attack and threeth shadow of the attack to the business correlation of target device Degree value is rung to be stored in the corresponding relation between the influence degree value for the attack and business correlation being locally stored.For Other each may target of attack equipment attack, equally perform aforesaid operations.
Therefore, in this step, for any one target attack behavior, can according to the attack that is locally stored with Corresponding relation between the influence degree value of confidentiality, it is determined that the influence degree of the confidentiality corresponding with the target attack behavior Value, and it is used as threeth influence degree value of the target attack behavior to the confidentiality of target device.Then basis is locally stored Corresponding relation between attack and the influence degree value of confidentiality, it is determined that the confidentiality corresponding with the target attack behavior Influence degree value, and be used as threeth influence degree value of the target attack behavior to the confidentiality of target device.Further according to this Corresponding relation between the attack of ground storage and the influence degree value of availability, it is determined that corresponding with the target attack behavior Availability influence degree value, and be used as threeth influence degree value of the target attack behavior to the availability of target device. Afterwards according to the corresponding relation between the attack that is locally stored and the influence degree value of business correlation, it is determined that with the target The influence degree value of the corresponding business correlation of attack, and it is used as business phase of the target attack behavior to target device 3rd influence degree value of closing property.For other each target attack behaviors, aforesaid operations are equally performed.
For any one target attack behavior, the target attack behavior is being obtained to the 3rd of the confidentiality of target device Influence degree value, the 3rd influence degree value to the integrality of target device, the 3rd influence degree value of the availability to equipment And to the 3rd influence degree value of the business correlation of target device after, target can be set according to the target attack behavior 3rd influence degree value of standby confidentiality, the 3rd influence degree value, the availability to equipment to the integrality of target device The 3rd influence degree value and business correlation to target device the 3rd influence degree value, being calculated according to equation below should First influence degree value of the target attack behavior to target device:
Wherein, S is first influence degree value of the target attack behavior to target device, and c is the target attack behavior pair 3rd influence degree value of the confidentiality of target device, i is threeth shadow of the target attack behavior to the integrality of target device Degree value is rung, a is threeth influence degree value of the target attack behavior to the availability of target device, and b is that the target is attacked Hit threeth influence degree value of the behavior to the business correlation of equipment;Z is the 4th predetermined threshold value, and Y is the 5th predetermined threshold value.Its In, Z and Y can be with identical, can also be different, and the embodiment of the present invention is not limited to this.Z and Y can be with the embodiment of the present invention It is 2.
For other each target attack behaviors, aforesaid operations are equally performed.
In step s 106, the probable value attacked according to the apparatus value, target device by attack and each mesh The the first influence degree value of attack each respectively to target device is marked, all target attack behaviors are calculated to target device First value-at-risk.
Wherein, the first value-at-risk of target device should be attacked depending on apparatus value, the target device of target device The the first influence degree value of the probable value and each target attack behavior of behavior attack each respectively to target device.
The probable value that target device is attacked by attack should depend on the leak that target device itself is present, and with attacking The first influence degree value that behavior is hit to target device is unrelated.
Target attack behavior to the first influence degree value of target device should depend on target device apparatus value and Target attack behavior the 3rd influence degree value respectively to the integrality of target device, the 3rd shadow to the confidentiality of target device Ring the 3rd influence of degree value, the 3rd influence degree value on the availability of target device and the business correlation on target device Degree value, it is unrelated with the leak that target device itself is present.
But, in the prior art, the probable value that equipment is attacked be according to equipment itself exist each leak each The the first influence degree value of the second influence degree value and each attack each respectively to equipment respectively to equipment is calculated Obtain, include this dependent variable that should not be included:The first influence degree of each attack each respectively to equipment Value.
And, in the prior art, attack be to the first influence degree value of equipment according to equipment attacked it is general The apparatus value of rate value and equipment calculates what is obtained, that is, attack is according to equipment itself to the first value-at-risk of equipment What the apparatus value calculating of the second influence degree value and equipment of each leak existed each respectively to equipment was obtained, including This dependent variable that should not do not included:The second influence degree of each leak that equipment itself is present each respectively to equipment Value.
Therefore, all target attack behaviors calculated according to risk value calculating method of the prior art are to target device Value-at-risk it is inaccurate, and in embodiments of the present invention, obtain the apparatus value of target device;Target device itself is obtained to exist Leak, the leak can by attack utilization target of attack equipment;The leak analysis existed according to target device itself The probable value that target device is attacked by attack;The leak target of attack equipment that statistics can exist using target device itself Target attack behavior;Obtain the first influence degree value of each target attack behavior each respectively to target device;According to The probable value and each target attack behavior that the apparatus value, target device are attacked by attack are each set to target respectively The first standby influence degree value, calculates first value-at-risk of all target attack behaviors to target device.
It can be seen that, target device in the embodiment of the present invention is according to target device itself by the probable value that attack is attacked What the leak of presence was obtained, all target attack behaviors are to equipment valency that the first value-at-risk of target device is according to target device Probable value that value, target device are attacked by attack and each target attack behavior each respectively to target device first What influence degree was worth to, compared to prior art, obtained all target attack behaviors pair are calculated by the embodiment of the present invention The degree of accuracy of first value-at-risk of target device is higher.
In an alternative embodiment of the invention, referring to Fig. 2, step S106 includes:
In step s 201, for each target attack behavior, according to the apparatus value, target device by attack The probable value of attack and the target attack behavior calculate the target attack behavior to mesh to the first influence degree value of target device Second value-at-risk of marking device;
For any one target attack behavior, the probability attacked according to the apparatus value, target device by attack Value and the target attack behavior calculate the target attack behavior pair to the first influence degree value of target device according to equation below Second value-at-risk of target device:
R=W*T*S;
Wherein, R is second value-at-risk of the target attack behavior to target device, and S is the target attack behavior to target First influence degree value of equipment.
In step S202, according to the second value-at-risk of each target attack behavior each respectively to target device, meter Calculate first value-at-risk of all target attack behaviors to target device.
According to the second value-at-risk of each target attack behavior each respectively to target device, calculated according to equation below First value-at-risk of all target attack behaviors to target device:
Q=Rmax+logk(R’);
Wherein, Q is all target attack behaviors to the first value-at-risk of target device, RmaxFor in each target attack Behavior is each respectively to the value-at-risk of highest second in the second value-at-risk of target device;R ' is in each target attack row For each respectively to all second risks of other in addition to the value-at-risk of highest second in the second value-at-risk of target device The summation of value;K is the 6th predetermined threshold value, and K can be 10 etc., and the embodiment of the present invention is not limited to this.
Wherein, in the prior art, it is by the second wind in each target attack behavior each respectively to target device The value-at-risk of highest second in the value of danger calculates precision as the first value-at-risk of all target attack behaviors to target device It is relatively low.
And in embodiments of the present invention, all target attack behaviors are not only to depend on to the first value-at-risk of target device The value-at-risk of highest second in the second value-at-risk of each target attack behavior each respectively to target device, but together When the second value-at-risk depending on each target attack behavior each respectively to target device, therefore, compared to prior art, The embodiment of the present invention can improve the degree of accuracy of all target attack behaviors of calculating to the first value-at-risk of target device.
Further, in embodiments of the present invention, when obtaining first risk of all target attack behaviors to target device After value, in order to reduce the first value-at-risk of target device, the embodiment of the present invention can apply defensive measure to target device.
Wherein, in advance a variety of defensive measures can be locally located in technical staff, and different defensive measures are attacked for different Behavior and leak are hit, therefore, it can the leak existed according to target device itself, and can exist using target device itself Leak target of attack equipment attack, from the multiple defensive measures pre-set determine a defensive measure, utilize The defensive measure determined is repaired to target terminal, and then reduces the first value-at-risk of target device.
However, technical staff is different in the validity of local each defensive measure of equipment in advance, there are some defence to arrange Zero can be reduced to by the first value-at-risk of target device by applying, and have some defensive measures only to reduce a part for target device First value-at-risk.
Therefore, after being repaired using the defensive measure determined to target terminal, in addition it is also necessary to according to equation below, Determine the residual risk value of target device:
Q '=Q* (1-P);
Q ' is the residual risk value of target device, and P is the validity for the defensive measure determined, in the embodiment of the present invention In, the validity bit of defensive measure is between 0~1.
Further, in an alternative embodiment of the invention, multiple target devices constitute an operation system, for business system Each target device in system, obtains the first value-at-risk that Q is referred to as target device by being calculated in step S202, is calculating , can be according to the first value-at-risk of each target device, according to following public affairs after first value-at-risk of each target device Formula calculates the value-at-risk of operation system:
U=Qmax+logk(Q’);
Wherein, U is the value-at-risk of operation system, QmaxFor the highest in the first value-at-risk of each target device First value-at-risk;Q ' is other institutes in addition to the value-at-risk of highest first in the first value-at-risk of each target device There is the summation of the first value-at-risk;K is the 6th predetermined threshold value, and K can be 10 etc., and the embodiment of the present invention is not limited to this.
Wherein, in the prior art, it is by the risk of highest first in the first value-at-risk of each target device Value calculates precision relatively low as operation system value-at-risk.
And in embodiments of the present invention, the value-at-risk of all operation systems is not dependent only on each target device The value-at-risk of highest first in first value-at-risk, but the first value-at-risk of each target device is depended on simultaneously, therefore, Compared to prior art, the embodiment of the present invention can improve the degree of accuracy of the value-at-risk of all operation systems of calculating.
Further, in embodiments of the present invention, after the value-at-risk of operation system is obtained, in order to reduce operation system Value-at-risk, the embodiment of the present invention can to operation system apply defensive measure.
Wherein, in advance a variety of defensive measures can be locally located in technical staff, and different defensive measures are attacked for different Behavior and leak are hit, therefore, it can the leak that the target device itself in operation system is present, and business can be utilized The attack for the leak attack traffic system that target device itself in system is present, from the multiple defensive measures pre-set One defensive measure of middle determination, is repaired using the defensive measure determined to the target terminal in operation system, and then is dropped The value-at-risk of low operation system.
However, technical staff is different in the validity of local each defensive measure of equipment in advance, there are some defence to arrange Zero can be reduced to by the value-at-risk of operation system by applying, and have some defensive measures only to reduce a part of risk of operation system Value.
Therefore, after being repaired using the defensive measure determined to the target terminal in operation system, in addition it is also necessary to According to equation below, the residual risk value of operation system is determined:
U '=U* (1-P);
Q ' is the residual risk value of operation system, and P is the validity for the defensive measure determined, in the embodiment of the present invention In, the validity bit of defensive measure is between 0~1.
Fig. 3 is a kind of block diagram of risk value calculation apparatus according to an exemplary embodiment.Reference picture 3, the device Including:
First acquisition module 11, the apparatus value for obtaining target device;
Second acquisition module 12, the leak for obtaining the target device itself presence, the leak can be attacked Behavioral availability and attack the target device;Analysis module 13, is attacked for the target device according to the leak analysis The probable value of behavior attack;
Statistical module 14, the target attack behavior of the target device can be enough attacked for counting using the leak, 3rd acquisition module 15, for obtaining the first influence degree of each target attack behavior each respectively to the target device Value;
First computing module 16, for each according to the apparatus value, the probable value and each target attack behavior From the first influence degree value respectively to the target device, all target attack behaviors are calculated to the first of the target device Value-at-risk.
Wherein, the first computing module 16 includes:
First computing unit, for for each target attack behavior, according to the apparatus value, the probable value and The target attack behavior calculates the target attack behavior to the target to the first influence degree value of the target device Second value-at-risk of equipment;
Second computing unit, for the second wind according to each target attack behavior each respectively to the target device Danger value, calculates first value-at-risk of all target attack behaviors to the target device.
Wherein, first acquisition module includes:
First acquisition unit, confidentiality, integrality, availability and business correlation for obtaining the target device;
3rd computing unit, for related to the business according to the confidentiality, the integrality, the availability Property, the apparatus value for obtaining the target device is calculated according to equation below:
Wherein, W is the apparatus value, and C is the confidentiality, and I is the integrality, and A is the availability, and B is institute Business correlation is stated, N is the first predetermined threshold value, and M is the second predetermined threshold value.
Wherein, the analysis module 13 includes:
Second acquisition unit, each journey is influenceed for obtaining each described leak on the second of the target device respectively Angle value;
4th computing unit, for each influenceing journey to the second of the target device respectively according to each described leak Angle value, the probable value that the target device is attacked by attack is calculated according to equation below:
T=Vmax+logx(V’);
Wherein, T is the probable value, VmaxFor highest the second influence degree value in all second influence degree values; V ' is other all second influence degrees in addition to highest the second influence degree value in all second influence degree values The summation of value, X is the 3rd predetermined threshold value.
Wherein, the 3rd acquisition module 15 includes:
3rd acquiring unit, for for each target attack behavior, obtaining the target attack behavior to the mesh 3rd influence degree value of the confidentiality of marking device, to the 3rd influence degree value of the integrality of the target device, to described 3rd influence degree value of the 3rd influence degree value of the availability of equipment and the business correlation to the target device;
5th computing unit, for the 3rd influence according to the target attack behavior on the confidentiality of the target device Degree value, to the 3rd influence degree value of the integrality of the target device, on the 3rd influence journey of the availability of the equipment 3rd influence degree value of angle value and business correlation to the target device, calculates the target according to equation below and attacks Hit first influence degree value of the behavior to the target device:
Wherein, S is first influence degree value of the target attack behavior to the target device, and c is that the target is attacked Threeth influence degree value of the behavior to the confidentiality of the target device is hit, i is that the target attack behavior is set to the target 3rd influence degree value of standby integrality, a is threeth shadow of the target attack behavior to the availability of the target device Degree value is rung, and b is threeth influence degree value of the target attack behavior to the business correlation of equipment;X is the 4th pre- If threshold value, Y is the 5th predetermined threshold value.
Wherein, first computing unit specifically for:
For each target attack behavior, according to the apparatus value, the probable value and the target attack behavior To the first influence degree value of the target device, the target attack behavior is calculated to the target device according to equation below The second value-at-risk;
R=W*T*S;
Wherein, R is second value-at-risk of the target attack behavior to the target device, and S is the target attack row For the first influence degree value to the target device.
Second computing unit specifically for:
According to the second value-at-risk of each target attack behavior each respectively to the target device, all targets are calculated First value-at-risk of the attack to the target device:
Q=Rmax+logk(R’);
Wherein, Q is all target attack behaviors to the first value-at-risk of the target device, RmaxFor in each target Attack is each respectively to the value-at-risk of highest second in the second value-at-risk of the target device;R ' is in each mesh Attack is marked each respectively to other in addition to the value-at-risk of highest second in the second value-at-risk of the target device The summation of all second value-at-risks, K is the 6th predetermined threshold value.
Technical scheme provided in an embodiment of the present invention can include the following benefits:
Wherein, the first value-at-risk of target device should be attacked depending on apparatus value, the target device of target device The the first influence degree value of the probable value and each target attack behavior of behavior attack each respectively to target device.
The probable value that target device is attacked by attack should depend on the leak that target device itself is present, and with attacking The first influence degree value that behavior is hit to target device is unrelated.
Target attack behavior to the first influence degree value of target device should depend on target device apparatus value and Target attack behavior the 3rd influence degree value respectively to the integrality of target device, the 3rd shadow to the confidentiality of target device Ring the 3rd influence of degree value, the 3rd influence degree value on the availability of target device and the business correlation on target device Degree value, it is unrelated with the leak that target device itself is present.
But, in the prior art, the probable value that equipment is attacked be according to equipment itself exist each leak each The the first influence degree value of the second influence degree value and each attack each respectively to equipment respectively to equipment is calculated Obtain, include this dependent variable that should not be included:The first influence degree of each attack each respectively to equipment Value.
And, in the prior art, attack be to the first influence degree value of equipment according to equipment attacked it is general The apparatus value of rate value and equipment calculates what is obtained, that is, attack is according to equipment itself to the first value-at-risk of equipment What the apparatus value calculating of the second influence degree value and equipment of each leak existed each respectively to equipment was obtained, including This dependent variable that should not do not included:The second influence degree of each leak that equipment itself is present each respectively to equipment Value.
Therefore, all target attack behaviors calculated according to risk value calculating method of the prior art are to target device Value-at-risk it is inaccurate, and in embodiments of the present invention, obtain the apparatus value of target device;Target device itself is obtained to exist Leak, the leak can by attack utilization target of attack equipment;The leak analysis existed according to target device itself The probable value that target device is attacked by attack;The leak target of attack equipment that statistics can exist using target device itself Target attack behavior;Obtain the first influence degree value of each target attack behavior each respectively to target device;According to The probable value and each target attack behavior that the apparatus value, target device are attacked by attack are each set to target respectively The first standby influence degree value, calculates first value-at-risk of all target attack behaviors to target device.
It can be seen that, target device in the embodiment of the present invention is according to target device itself by the probable value that attack is attacked What the leak of presence was obtained, all target attack behaviors are to equipment valency that the first value-at-risk of target device is according to target device Probable value that value, target device are attacked by attack and each target attack behavior each respectively to target device first What influence degree was worth to, compared to prior art, obtained all target attack behaviors pair are calculated by the embodiment of the present invention The degree of accuracy of first value-at-risk of target device is higher.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method Embodiment in be described in detail, explanation will be not set forth in detail herein.
Those skilled in the art will readily occur to its of the present invention after considering specification and putting into practice invention disclosed herein Its embodiment.The application is intended to any modification, purposes or the adaptations of the embodiment of the present invention, these modifications, Purposes or adaptations follow the general principle of the embodiment of the present invention and including undocumented skill of the embodiment of the present invention Common knowledge or conventional techniques in art field.Description and embodiments are considered only as exemplary, the embodiment of the present invention True scope and spirit pointed out by appended claim.
It should be appreciated that the accurate knot that the embodiment of the present invention is not limited to be described above and is shown in the drawings Structure, and various modifications and changes can be being carried out without departing from the scope.The scope of the embodiment of the present invention is only by appended right It is required that to limit.

Claims (10)

1. a kind of risk value calculating method, it is characterised in that methods described includes:
Obtain the apparatus value of target device;
The leak of the target device itself presence is obtained, the leak can be utilized by attack and attack the target and set It is standby;The probable value that the target device according to the leak analysis is attacked by attack;
Statistics can enough attack the target attack behavior of the target device using the leak, obtain each target attack row For the first influence degree value each respectively to the target device;
According to the apparatus value, the probable value and each target attack behavior each respectively to the target device One influence degree value, calculates first value-at-risk of all target attack behaviors to the target device.
2. according to the method described in claim 1, it is characterised in that described according to the apparatus value, the probable value and every The the first influence degree value of one target attack behavior each respectively to the target device, calculates all target attack behaviors pair First value-at-risk of the target device, including:
For each target attack behavior, according to the apparatus value, the probable value and the target attack behavior to institute The first influence degree value of target device is stated, second value-at-risk of the target attack behavior to the target device is calculated;
According to the second value-at-risk of each target attack behavior each respectively to the target device, all target attacks are calculated First value-at-risk of the behavior to the target device.
3. method according to claim 2, it is characterised in that the apparatus value of the acquisition target device, including:
Obtain confidentiality, integrality, availability and the business correlation of the target device;
According to the confidentiality, the integrality, the availability and the business correlation, calculate and obtain according to equation below The apparatus value of the target device:
<mrow> <mi>W</mi> <mo>=</mo> <mo>{</mo> <msub> <mi>log</mi> <mi>N</mi> </msub> <mfrac> <mrow> <msup> <mi>M</mi> <mi>C</mi> </msup> <mo>+</mo> <msup> <mi>M</mi> <mi>I</mi> </msup> <mo>+</mo> <msup> <mi>M</mi> <mi>A</mi> </msup> <mo>+</mo> <msup> <mi>M</mi> <mi>B</mi> </msup> </mrow> <mn>4</mn> </mfrac> <mo>}</mo> <mo>;</mo> </mrow>
Wherein, W is the apparatus value, and C is the confidentiality, and I is the integrality, and A is the availability, and B is the industry Business correlation, N is the first predetermined threshold value, and M is the second predetermined threshold value.
4. method according to claim 3, it is characterised in that the target device according to the leak analysis is attacked The probable value of behavior attack is hit, including:
Obtain the second influence degree value of each described leak each respectively to the target device;
According to the second influence degree value of each described leak each respectively to the target device, calculated according to equation below The probable value that the target device is attacked by attack:
T=Vmax+logx(V’);
Wherein, T is the probable value, VmaxFor highest the second influence degree value in all second influence degree values;V ' is Other all second influence degree values in addition to highest the second influence degree value in all second influence degree values Summation, X is the 3rd predetermined threshold value.
5. method according to claim 4, it is characterised in that each target attack behavior of the acquisition is each right respectively First influence degree value of the target device, including:
For each target attack behavior, threeth shadow of the target attack behavior to the confidentiality of the target device is obtained Degree value is rung, to the 3rd influence degree value of the integrality of the target device, the 3rd influence on the availability of the equipment 3rd influence degree value of degree value and business correlation to the target device;
According to threeth influence degree value of the target attack behavior to the confidentiality of the target device, to the target device Integrality the 3rd influence degree value, the 3rd influence degree value to the availability of the equipment and to the target device Business correlation the 3rd influence degree value, calculate the target attack behavior to the target device according to equation below First influence degree value:
<mrow> <mi>S</mi> <mo>=</mo> <msub> <mi>log</mi> <mi>Y</mi> </msub> <msqrt> <mfrac> <mrow> <msup> <mi>Z</mi> <mrow> <mi>C</mi> <mo>*</mo> <mi>c</mi> </mrow> </msup> <mo>+</mo> <msup> <mi>Z</mi> <mrow> <mi>I</mi> <mo>*</mo> <mi>i</mi> </mrow> </msup> <mo>+</mo> <msup> <mi>Z</mi> <mrow> <mi>A</mi> <mo>*</mo> <mi>a</mi> </mrow> </msup> <mo>+</mo> <msup> <mi>Z</mi> <mrow> <mi>B</mi> <mo>*</mo> <mi>b</mi> </mrow> </msup> </mrow> <mn>4</mn> </mfrac> </msqrt> <mo>;</mo> </mrow>
Wherein, S is first influence degree value of the target attack behavior to the target device, and c is the target attack row For the 3rd influence degree value of the confidentiality to the target device, i is the target attack behavior to the target device 3rd influence degree value of integrality, a is threeth influence journey of the target attack behavior on the availability of the target device Angle value, and b are threeth influence degree value of the target attack behavior to the business correlation of equipment;X is the 4th default threshold Value, Y is the 5th predetermined threshold value.
6. method according to claim 5, it is characterised in that described according to the apparatus value, the probable value and institute First influence degree value of the target attack behavior to target device is stated, the target attack behavior is calculated to the target device Second value-at-risk, including:
For each target attack behavior, according to the apparatus value, the probable value and the target attack behavior to institute The first influence degree value of target device is stated, the target attack behavior is calculated to the of the target device according to equation below Two value-at-risks;
R=W*T*S;
Wherein, R is second value-at-risk of the target attack behavior to the target device, and S is the target attack behavior pair First influence degree value of the target device.
7. method according to claim 6, it is characterised in that described each right respectively according to each target attack behavior Second value-at-risk of the target device, calculates first value-at-risk of all target attack behaviors to the target device, including:
According to the second value-at-risk of each target attack behavior each respectively to the target device, all target attacks are calculated First value-at-risk of the behavior to the target device:
Q=Rmax+logk(R’);
Wherein, Q is all target attack behaviors to the first value-at-risk of the target device, RmaxFor in each target attack Behavior is each respectively to the value-at-risk of highest second in the second value-at-risk of the target device;R ' is to be attacked in each target Behavior is hit each respectively to own other in addition to the value-at-risk of highest second in the second value-at-risk of the target device The summation of second value-at-risk, K is the 6th predetermined threshold value.
8. a kind of risk value calculating method, methods described is applied to operation system, the operation system includes multiple targets and set It is standby, it is characterised in that methods described includes:
Obtain the first value-at-risk of each target device in the operation system, the first value-at-risk root of each target device According to:Probable value and root that the apparatus value of the target device, the target device gone out according to leak analysis are attacked by attack According to first influence degree value of the corresponding each target attack row of the target device to the target device, gained is calculated;
According to the value-at-risk of each target device, the value-at-risk of the operation system is calculated according to equation below:
U=Qmax+logk(Q’);
Wherein, U is the value-at-risk of the operation system, QmaxFor first of each target device in the operation system The value-at-risk of highest first in value-at-risk;In the first value-at-risks of the Q ' for each target device in the operation system All first value-at-risks of other in addition to the value-at-risk of highest first summation;K is the 6th predetermined threshold value.
9. a kind of risk value calculation apparatus, it is characterised in that described device includes:
First acquisition module, the apparatus value for obtaining target device;
Second acquisition module, the leak for obtaining the target device itself presence, the leak can be by attack profit With and attack the target device;Analysis module, is attacked for the target device according to the leak analysis by attack Probable value;
Statistical module, can enough attack the target attack behavior of the target device, the 3rd obtains for counting using the leak Modulus block, for obtaining the first influence degree value of each target attack behavior each respectively to the target device;
Computing module, for according to the apparatus value, the probable value and each target attack behavior each respectively to institute The first influence degree value of target device is stated, first value-at-risk of all target attack behaviors to the target device is calculated.
10. a kind of risk value calculation apparatus, described device is applied to operation system, the operation system includes multiple targets and set It is standby, it is characterised in that described device includes:
4th acquisition module, the first value-at-risk for obtaining each target device in the operation system, each target is set The first standby value-at-risk according to:The apparatus value of the target device, the target device gone out according to leak analysis are by attack The probable value of attack and according to first influence degree value of the corresponding each target attack row of the target device to the target device, Calculate gained;
Second computing module, for the value-at-risk according to each target device, the operation system is calculated according to equation below Value-at-risk:
U=Qmax+logk(Q’);
Wherein, U is the value-at-risk of the operation system, QmaxFor first of each target device in the operation system The value-at-risk of highest first in value-at-risk;In the first value-at-risks of the Q ' for each target device in the operation system All first value-at-risks of other in addition to the value-at-risk of highest first summation;K is the 6th predetermined threshold value.
CN201611262416.6A 2016-12-30 2016-12-30 Risk value calculation method and device Active CN107203720B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611262416.6A CN107203720B (en) 2016-12-30 2016-12-30 Risk value calculation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611262416.6A CN107203720B (en) 2016-12-30 2016-12-30 Risk value calculation method and device

Publications (2)

Publication Number Publication Date
CN107203720A true CN107203720A (en) 2017-09-26
CN107203720B CN107203720B (en) 2020-08-07

Family

ID=59904521

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611262416.6A Active CN107203720B (en) 2016-12-30 2016-12-30 Risk value calculation method and device

Country Status (1)

Country Link
CN (1) CN107203720B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113469584A (en) * 2021-09-02 2021-10-01 云账户技术(天津)有限公司 Risk management method and device for business service operation
CN113806751A (en) * 2021-09-24 2021-12-17 深信服科技股份有限公司 Method, device and medium for determining vulnerability and intelligence information activity

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101150432A (en) * 2007-08-24 2008-03-26 北京启明星辰信息技术有限公司 An information system risk evaluation method and system
US20100332889A1 (en) * 2009-06-25 2010-12-30 Vmware, Inc. Management of information technology risk using virtual infrastructures
CN102402723A (en) * 2011-11-03 2012-04-04 北京谷安天下科技有限公司 Method and system for detecting security of information assets
US20120095946A1 (en) * 2010-10-14 2012-04-19 The Government Of The United States Of America, As Represented By The Secretary Of The Navy Coupled METOC/INTEL Risk Assessment
CN102799954A (en) * 2012-07-18 2012-11-28 中国信息安全测评中心 Method and system for multi-objective optimization applied to risk assessment
CN103023889A (en) * 2012-11-29 2013-04-03 武汉华中电力电网技术有限公司 Safety margin risk quantification method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101150432A (en) * 2007-08-24 2008-03-26 北京启明星辰信息技术有限公司 An information system risk evaluation method and system
US20100332889A1 (en) * 2009-06-25 2010-12-30 Vmware, Inc. Management of information technology risk using virtual infrastructures
US20120095946A1 (en) * 2010-10-14 2012-04-19 The Government Of The United States Of America, As Represented By The Secretary Of The Navy Coupled METOC/INTEL Risk Assessment
CN102402723A (en) * 2011-11-03 2012-04-04 北京谷安天下科技有限公司 Method and system for detecting security of information assets
CN102799954A (en) * 2012-07-18 2012-11-28 中国信息安全测评中心 Method and system for multi-objective optimization applied to risk assessment
CN103023889A (en) * 2012-11-29 2013-04-03 武汉华中电力电网技术有限公司 Safety margin risk quantification method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113469584A (en) * 2021-09-02 2021-10-01 云账户技术(天津)有限公司 Risk management method and device for business service operation
CN113469584B (en) * 2021-09-02 2021-11-16 云账户技术(天津)有限公司 Risk management method and device for business service operation
CN113806751A (en) * 2021-09-24 2021-12-17 深信服科技股份有限公司 Method, device and medium for determining vulnerability and intelligence information activity

Also Published As

Publication number Publication date
CN107203720B (en) 2020-08-07

Similar Documents

Publication Publication Date Title
US10185832B2 (en) Methods and systems for defending cyber attack in real-time
KR101568224B1 (en) Analysis device and method for software security
CN104301302B (en) Go beyond one&#39;s commission attack detection method and device
CN103258165A (en) Processing method and device for leak evaluation
CN101950338A (en) Bug repair method based on hierarchical bug threat assessment
CN110493179B (en) Network security situation awareness system and method based on time sequence
CN105205394B (en) Data detection method and device for intrusion detection
CN113032792B (en) System business vulnerability detection method, system, equipment and storage medium
CN110598411A (en) Sensitive information detection method and device, storage medium and computer equipment
CN106254368A (en) The detection method of Web vulnerability scanning and device
CN103577323B (en) Based on the software plagiarism detection method of dynamic keyword instruction sequence birthmark
CN107819631A (en) A kind of unit exception detection method, device and equipment
CN103095485A (en) Network risk assessment method based on combination of Bayesian algorithm and matrix method
CN107508816A (en) A kind of attack traffic means of defence and device
CN108108624A (en) Information security method for evaluating quality and device based on products & services
CN107203720A (en) risk value calculating method and device
CN107506355A (en) Object group technology and device
Hassan et al. Déjà Vu: Side-Channel Analysis of Mozilla's NSS
CN106203100A (en) A kind of integrity checking method and device
CN106411951A (en) Network attack behavior detection method and device
Song et al. A comprehensive approach to detect unknown attacks via intrusion detection alerts
CN113824736B (en) Asset risk handling method, device, equipment and storage medium
WO2023052728A1 (en) Method for analyzing the vulnerability of an information system to a cyber attack
CN114553517A (en) Nonlinear weighted network security assessment method, device, equipment and storage medium
CN106790169A (en) The means of defence and device of scanning device scanning

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP02 Change in the address of a patent holder
CP02 Change in the address of a patent holder

Address after: Room 813, 8 / F, 34 Haidian Street, Haidian District, Beijing 100080

Patentee after: BEIJING ULTRAPOWER INFORMATION SAFETY TECHNOLOGY Co.,Ltd.

Address before: 100107 Beijing city Haidian District wanquanzhuang Road No. 28 Wanliu new building 6 storey block A room 626

Patentee before: BEIJING ULTRAPOWER INFORMATION SAFETY TECHNOLOGY Co.,Ltd.