[go: up one dir, main page]

CN108683662B - Individual online equipment risk assessment method and system - Google Patents

Individual online equipment risk assessment method and system Download PDF

Info

Publication number
CN108683662B
CN108683662B CN201810455479.6A CN201810455479A CN108683662B CN 108683662 B CN108683662 B CN 108683662B CN 201810455479 A CN201810455479 A CN 201810455479A CN 108683662 B CN108683662 B CN 108683662B
Authority
CN
China
Prior art keywords
equipment
alarm
detection result
detected
risk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810455479.6A
Other languages
Chinese (zh)
Other versions
CN108683662A (en
Inventor
涂大志
郭景楠
王新成
王志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Leagsoft Technology Co ltd
Original Assignee
Shenzhen Leagsoft Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Leagsoft Technology Co ltd filed Critical Shenzhen Leagsoft Technology Co ltd
Priority to CN201810455479.6A priority Critical patent/CN108683662B/en
Publication of CN108683662A publication Critical patent/CN108683662A/en
Priority to PCT/CN2019/085191 priority patent/WO2019218875A1/en
Application granted granted Critical
Publication of CN108683662B publication Critical patent/CN108683662B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a method and a system for evaluating the risk of single online equipment, wherein in the method, a plurality of inspection items and the risk level of each inspection item are set; detecting the single online equipment to be detected in real time according to the inspection items to obtain a detection result; storing the detection result obtained within the preset evaluation time, wherein the detection result comprises the inspection item with the alarm, the risk level of the inspection item and the alarm frequency of the single network equipment to be detected; analyzing the stored detection result according to a preset evaluation model to obtain an equipment behavior loss value; and calculating the risk value of the single online equipment to be tested according to the equipment behavior loss value. The method abandons the idea of taking the highest alarm score in all the inspection items in the prior art, detects the network equipment at regular time, counts all the detection results in a certain time period, can add alarm times for analysis, and is more effective.

Description

Individual online equipment risk assessment method and system
Technical Field
The invention belongs to the technical field of internet, and particularly relates to a method and a system for evaluating the risk of a single online device.
Background
In the prior art, the risk evaluation of a single online device mainly has the following modes:
1. setting a detection rule, setting a plurality of detection items, detecting the network equipment according to the detection items, and artificially determining a risk level through the threat degree of each detection item to be used as a risk measurement index of the network equipment;
2. and setting equipment inspection items, setting scores for all the inspection items, and enabling the alarm of a single detection item to not visually show the overall equipment risk condition.
The evaluation granularity of the two methods is too coarse, and the general network risk evaluation is a risk state in a certain time period, but some danger detections may frequently give alarms in a certain time period, but the risk grades or deductions are the same, so that the alarm times cannot be reasonably added into the investigation, the results of various alarms cannot be comprehensively considered, and effective reference cannot be provided for a network security administrator.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides the method and the system for evaluating the risk of the single online device, which can add the alarm times for analysis, can comprehensively consider various alarm types, and are more effective.
In a first aspect, a method for evaluating risk of a single online device includes the following steps:
setting a plurality of examination items and a risk level of each examination item;
detecting the single online equipment to be detected in real time according to the inspection items to obtain a detection result;
storing the detection result obtained within the preset evaluation time, wherein the detection result comprises the inspection item with the alarm, the risk level of the inspection item and the alarm frequency of the single network equipment to be detected;
analyzing the stored detection result according to a preset evaluation model to obtain an equipment behavior loss value;
and calculating the risk value of the single online equipment to be tested according to the equipment behavior loss value.
Further, the real-time detection of the single online equipment to be detected according to the inspection items specifically comprises the steps of obtaining a detection result;
detecting the single on-line equipment to be detected in real time according to the inspection items;
grading the risk level of the inspection item with the alarm to obtain an alarm score;
recording the alarm score;
the detection result includes the alert score.
Further, the analyzing all the detection results according to the preset evaluation model to obtain the device behavior loss value specifically includes:
setting analysis time;
when the analysis time arrives, the device behavior loss value is calculated by:
behavior_loss=(max_level+sum_level×0.1)×max_level×tanh(check_count);
wherein, behavior _ loss is the equipment behavior loss value of the single network equipment to be detected, max _ level is the highest alarm score in the detection result of the single network equipment to be detected, and sum _ level is the value in the detection result of the single network equipment to be detectedThe check _ count is the accumulated times of alarms appearing in the network equipment of the single equipment to be tested,
Figure BDA0001659542680000021
further, the calculating the risk score of the single online device to be tested according to the device behavior loss value specifically includes:
setting a full score value;
and subtracting the equipment behavior loss value of the single online equipment to be tested by adopting a deduction method on the basis of the full score value to obtain the risk score.
In a second aspect, a single online device risk assessment system includes:
a setting unit: the risk level setting module is used for setting a plurality of examination items and the risk level of each examination item;
a detection unit: the system is used for detecting the single on-line equipment to be detected in real time according to the detection items to obtain a detection result;
a statistic unit: the system comprises a storage unit, a processing unit and a processing unit, wherein the storage unit is used for storing a detection result obtained within preset evaluation time, and the detection result comprises a check item with an alarm appearing in the detection result, a risk level of the check item and the number of times of the alarm appearing in the network equipment of a single unit to be detected;
an evaluation unit: the device is used for analyzing the stored detection result according to a preset evaluation model to obtain a device behavior loss value; and the risk score of the single online equipment to be tested is calculated according to the equipment behavior loss value.
Further, the real-time detection of the single online equipment to be detected according to the inspection items specifically comprises the steps of obtaining a detection result;
detecting the single on-line equipment to be detected in real time according to the inspection items;
grading the risk level of the inspection item with the alarm to obtain an alarm score;
recording the alarm score;
the detection result includes the alert score.
Further, the analyzing all the detection results according to the preset evaluation model to obtain the device behavior loss value specifically includes:
setting analysis time;
when the analysis time arrives, the device behavior loss value is calculated by:
behavior_loss=(max_level+sum_level×0.1)×max_level×tanh(check_count);
wherein, behavior _ loss is the equipment behavior loss value of the single network equipment to be detected, max _ level is the highest alarm score in the detection result of the single network equipment to be detected, sum _ level is the sum of all alarm scores in the detection result of the single network equipment to be detected, check _ count is the accumulated times of alarms appearing in the single network equipment to be detected,
Figure BDA0001659542680000031
further, the calculating the risk score of the single online device to be tested according to the device behavior loss value specifically includes:
setting a full score value;
and subtracting the equipment behavior loss value of the single online equipment to be tested by adopting a deduction method on the basis of the full score value to obtain the risk score.
According to the technical scheme, the method and the system for evaluating the risk of the single online device abandon the thought of taking the highest alarm score in all the inspection items in the prior art, detect the network device at regular time, count all the detection results in a certain time period, add alarm times for analysis, and have more effective evaluation method.
Drawings
In order to more clearly illustrate the detailed description of the invention or the technical solutions in the prior art, the drawings that are needed in the detailed description of the invention or the prior art will be briefly described below. Throughout the drawings, like elements or portions are generally identified by like reference numerals. In the drawings, elements or portions are not necessarily drawn to scale.
Fig. 1 is a flowchart of an evaluation method according to an embodiment.
Fig. 2 is a block diagram of an evaluation system according to a fourth embodiment.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and therefore are only examples, and the protection scope of the present invention is not limited thereby. It is to be noted that, unless otherwise specified, technical or scientific terms used herein shall have the ordinary meaning as understood by those skilled in the art to which the invention pertains.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
The first embodiment is as follows:
referring to fig. 1, a method for evaluating risk of a single online device includes the following steps:
s1, setting a plurality of examination items and the risk level of each examination item;
specifically, the inspection item occurrence alarm includes three aspects of "non-compliant behavior", "abnormal behavior", and "dangerous behavior". For example, if a change in the IP/MAC address of a network device, a change in the device name, a change in the operating system, etc. is detected, then an abnormal behavior is considered to have occurred. Different inspection items define the risk level according to the threat degree, and for the inspection item with low threat degree, the risk level is low. For the examination items with high threat degree, the risk level is high. The single online device includes a PC device, a network device, a mobile device, an IoT device, an ICS device, and the like.
S2, detecting the single online equipment to be detected in real time according to the check items to obtain a detection result;
specifically, when a single online device to be detected detects, all the check items need to be detected. The detection result comprises all inspection items of compliance behaviors, non-compliance behaviors, abnormal behaviors and dangerous behaviors, and the risk level of the inspection item of the alarm behavior is recorded. When the detection is carried out according to the check items, the detection is carried out in real time, so that the safety of the network equipment can be detected in real time.
S3, storing the detection result obtained in the preset evaluation time, wherein the detection result comprises the check item of the alarm appearing in the detection result, the risk level of the check item and the alarm appearing frequency of the single network equipment to be detected;
specifically, the checking items of the alarm are counted, so that the risk assessment is conveniently carried out subsequently. The number of times of alarm occurrence of a single network device is the accumulated number of check items of alarm occurrence in all detection reports.
S4, analyzing the stored detection result according to a preset evaluation model to obtain a device behavior loss value;
specifically, the detection result may be analyzed at regular time. For example: for example, the analysis time is set, and the analysis time can be one hour or two hours, so as to update the risk state of the single on-line device to be tested. If the evaluation time is set to be 24 hours, the risk state of the single online device to be tested on the current day is updated. That is to say, the single on-line device to be tested is always tested according to the check items, if the single on-line device to be tested is analyzed once in an hour, the detection result obtained by the single on-line device to be tested in the same day is obtained for analysis, and the risk state of the single on-line device to be tested is updated. Therefore, the risk state of the single on-line equipment to be tested is ensured to be updated in real time.
And S5, calculating the risk score of the single online device to be tested according to the device behavior loss value.
The method abandons the idea of taking the highest alarm score in all the inspection items in the prior art, detects the network equipment at regular time, counts all the detection results in a certain time period, can add alarm times for analysis, and is more effective.
Example two:
the method provided by the second embodiment is added with the following contents on the basis of the first embodiment:
the detection of the single online equipment to be detected according to the inspection item specifically comprises the steps of obtaining a detection result;
detecting the single on-line equipment to be detected in real time according to the inspection items;
grading the risk level of the inspection item with the alarm to obtain an alarm score;
recording the alarm score;
the detection result includes the alert score.
Specifically, the risk level is more intuitive through scoring, and the higher the risk level, the higher the score. For example: the risk level of the device accessing in the non-working time is 4 points, and the risk level of the illegal enterprise software is 6 points. The risk level is 4 when 1 alarm occurs in the inspection item a, and the risk level is upgraded to 5 if 2 alarms occur in the inspection item a.
For a brief description of the method provided by the embodiment of the present invention, reference may be made to the corresponding contents in the first embodiment.
Example three:
the method provided by the third embodiment is added with the following contents on the basis of the second embodiment:
analyzing all detection results according to a preset evaluation model to obtain an equipment behavior loss value specifically comprises:
setting analysis time;
when the analysis time arrives, the device behavior loss value is calculated by:
behavior_loss=(max_level+sum_level×0.1)×max_level×tanh(check_count);
wherein, behavior _ loss is the equipment behavior loss value of the single network equipment to be detected, max _ level is the highest alarm score in the detection result of the single network equipment to be detected, sum _ level is the sum of all alarm scores in the detection result of the single network equipment to be detected, check _ count is the accumulated times of alarms appearing in the single network equipment to be detected,
Figure BDA0001659542680000071
in particular, as the deployment time of the network equipment increases after the network equipment is deployed on the client site, the number of the detection items of the network equipment is larger and larger. And when the evaluation model is established, the upper limit of the number of the examination items of the deployed network equipment cannot be estimated. Therefore, the hyperbolic tangent model in the method is completely free from the influence of the upper limit of the alarm times on the robustness of the evaluation model. The results obtained from the evaluation model were always positive, between 0, 100. The value of the loss of computing device behavior obtained by the above formula can increase as the number of alarms occurring for the check term increases. Namely, if the more times of alarms of the single device to be tested on the network equipment, the higher the risk level.
In the analysis, all detection results within the evaluation time are used as input of the evaluation model. For example: and if the analysis time is up, the times of the check items with alarm are respectively 5, 7 and 4 in 3 detection results of the single network equipment to be detected. 3 parts of detection results; the score for the highest risk rating is 6; in the 3 detection results, the sum of the scores of the risk grades of the inspection items with alarms is 25,50 and 22 respectively. Then max _ level is 6, sum _ level is 25+50+22 is 97, and check _ count is 5+7+4 is 16.
Optionally, the calculating the risk score of the single online device to be tested according to the device behavior loss value specifically includes:
setting a full score value;
and subtracting the equipment behavior loss value of the single online equipment to be tested by adopting a deduction method on the basis of the full score value to obtain the risk score.
Specifically, the full score may be set to 100 points, with the risk score equal to 100 minus the device behavioral loss value. The greater the device behavior loss value, the lower the risk score, and the higher the risk of the network device. Conversely, the smaller the device behavior loss value, the higher the risk score, and the lower the risk of the network device. The safest case of the network device is 100 points, and the most dangerous case is 0 points. The score grading and qualitative description is configured individually by the user.
For a brief description of the method provided by the embodiment of the present invention, reference may be made to the corresponding contents in the second embodiment.
Example four:
referring to fig. 2, the fourth embodiment provides a system for evaluating risk of a single online device, including:
a setting unit: the risk level setting module is used for setting a plurality of examination items and the risk level of each examination item;
a detection unit: the system is used for detecting the single on-line equipment to be detected in real time according to the detection items to obtain a detection result;
a statistic unit: the system comprises a storage unit, a processing unit and a processing unit, wherein the storage unit is used for storing a detection result obtained within preset evaluation time, and the detection result comprises a check item with an alarm appearing in the detection result, a risk level of the check item and the number of times of the alarm appearing in the network equipment of a single unit to be detected;
an evaluation unit: the device is used for analyzing the stored detection result according to a preset evaluation model to obtain a device behavior loss value; and the risk score of the single online equipment to be tested is calculated according to the equipment behavior loss value.
Further, the real-time detection of the single online equipment to be detected according to the inspection items specifically comprises the steps of obtaining a detection result;
detecting the single on-line equipment to be detected in real time according to the inspection items;
grading the risk level of the inspection item with the alarm to obtain an alarm score;
recording the alarm score;
the detection result includes the alert score.
Further, the analyzing all the detection results according to the preset evaluation model to obtain the device behavior loss value specifically includes:
setting analysis time;
when the analysis time arrives, the device behavior loss value is calculated by:
behavior_loss=(max_level+sum_level×0.1)×max_level×tanh(check_count);
wherein, behavior _ loss is the equipment behavior loss value of the single network equipment to be detected, max _ level is the highest alarm score in the detection result of the single network equipment to be detected, sum _ level is the sum of all alarm scores in the detection result of the single network equipment to be detected, check _ count is the accumulated times of alarms appearing in the single network equipment to be detected,
Figure BDA0001659542680000091
further, the calculating the risk score of the single online device to be tested according to the device behavior loss value specifically includes:
setting a full score value;
and subtracting the equipment behavior loss value of the single online equipment to be tested by adopting a deduction method on the basis of the full score value to obtain the risk score.
The device provided by the embodiment of the present invention has the same implementation principle and technical effect as the method embodiments, and for the sake of brief description, reference may be made to the corresponding contents in the method embodiments without reference to the device embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed system and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment of the present invention.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention essentially or partially contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the present invention, and they should be construed as being included in the following claims and description.

Claims (4)

1. A single online equipment risk assessment method is characterized by comprising the following steps:
setting a plurality of examination items and a risk level of each examination item;
detecting the single online equipment to be detected in real time according to the inspection items to obtain a detection result;
storing the detection result obtained within the preset evaluation time, wherein the detection result comprises the inspection item with the alarm, the risk level of the inspection item and the alarm frequency of the single network equipment to be detected;
analyzing the stored detection result according to a preset evaluation model to obtain an equipment behavior loss value;
calculating the risk value of the single online equipment to be tested according to the equipment behavior loss value;
the real-time detection of the single online equipment to be detected according to the inspection items specifically comprises the following steps:
detecting the single on-line equipment to be detected in real time according to the inspection items;
grading the risk level of the inspection item with the alarm to obtain an alarm score;
recording the alarm score;
the detection result comprises the alarm score;
analyzing all detection results according to a preset evaluation model to obtain an equipment behavior loss value specifically comprises:
setting analysis time;
when the analysis time arrives, the device behavior loss value is calculated by:
behavior_loss=(max_level+sum_level×0.1)×max_level×tanh(check_count);
wherein behavior _ loss is the equipment behavior loss value of the single on-line equipment to be tested,max _ level is the highest alarm score in the detection result of the network equipment of the single equipment to be detected, sum _ level is the sum of all alarm scores in the detection result of the network equipment of the single equipment to be detected, check _ count is the accumulated times of alarm occurrence of the network equipment of the single equipment to be detected,
Figure FDA0002455541740000011
2. the method for risk assessment of individual online devices of claim 1,
the calculating the risk score of the single online device to be tested according to the device behavior loss value specifically comprises:
setting a full score value;
and subtracting the equipment behavior loss value of the single online equipment to be tested by adopting a deduction method on the basis of the full score value to obtain the risk score.
3. A single online device risk assessment system, comprising:
a setting unit: the risk level setting module is used for setting a plurality of examination items and the risk level of each examination item;
a detection unit: the system is used for detecting the single on-line equipment to be detected in real time according to the detection items to obtain a detection result;
a statistic unit: the system comprises a storage unit, a processing unit and a processing unit, wherein the storage unit is used for storing a detection result obtained within preset evaluation time, and the detection result comprises a check item with an alarm appearing in the detection result, a risk level of the check item and the number of times of the alarm appearing in the network equipment of a single unit to be detected;
an evaluation unit: the device is used for analyzing the stored detection result according to a preset evaluation model to obtain a device behavior loss value; the system is also used for calculating the risk value of the single online equipment to be tested according to the equipment behavior loss value;
the real-time detection of the single online equipment to be detected according to the inspection items specifically comprises the following steps:
detecting the single on-line equipment to be detected in real time according to the inspection items;
grading the risk level of the inspection item with the alarm to obtain an alarm score;
recording the alarm score;
the detection result comprises the alarm score;
analyzing all detection results according to a preset evaluation model to obtain an equipment behavior loss value specifically comprises:
setting analysis time;
when the analysis time arrives, the device behavior loss value is calculated by:
behavior_loss=(max_level+sum_level×0.1)×max_level×tanh(check_count);
wherein, behavior _ loss is the equipment behavior loss value of the single network equipment to be detected, max _ level is the highest alarm score in the detection result of the single network equipment to be detected, sum _ level is the sum of all alarm scores in the detection result of the single network equipment to be detected, check _ count is the accumulated times of alarms appearing in the single network equipment to be detected,
Figure FDA0002455541740000031
4. the individual online device risk assessment system of claim 3,
the calculating the risk score of the single online device to be tested according to the device behavior loss value specifically comprises:
setting a full score value;
and subtracting the equipment behavior loss value of the single online equipment to be tested by adopting a deduction method on the basis of the full score value to obtain the risk score.
CN201810455479.6A 2018-05-14 2018-05-14 Individual online equipment risk assessment method and system Active CN108683662B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810455479.6A CN108683662B (en) 2018-05-14 2018-05-14 Individual online equipment risk assessment method and system
PCT/CN2019/085191 WO2019218875A1 (en) 2018-05-14 2019-04-30 Single network equipment risk assessment method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810455479.6A CN108683662B (en) 2018-05-14 2018-05-14 Individual online equipment risk assessment method and system

Publications (2)

Publication Number Publication Date
CN108683662A CN108683662A (en) 2018-10-19
CN108683662B true CN108683662B (en) 2020-08-14

Family

ID=63806390

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810455479.6A Active CN108683662B (en) 2018-05-14 2018-05-14 Individual online equipment risk assessment method and system

Country Status (2)

Country Link
CN (1) CN108683662B (en)
WO (1) WO2019218875A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108683662B (en) * 2018-05-14 2020-08-14 深圳市联软科技股份有限公司 Individual online equipment risk assessment method and system
CN110443515A (en) * 2019-08-09 2019-11-12 杭州安恒信息技术股份有限公司 Internet of Things safety detection method and system based on threat index
CN111865660A (en) * 2020-06-12 2020-10-30 广东电网有限责任公司 An operation risk assessment method and system for network equipment

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9015090B2 (en) * 2005-09-06 2015-04-21 Daniel Chien Evaluating a questionable network communication
US20140143864A1 (en) * 2012-11-21 2014-05-22 Snoopwall Llc System and method for detecting, alerting and blocking data leakage, eavesdropping and spyware
CN104092469A (en) * 2014-07-22 2014-10-08 西安电子科技大学 A Simplified Log-BP Iterative Decoding Method Based on Equichord Straight Line Approximation
CN106203666A (en) * 2015-04-30 2016-12-07 中国南方电网有限责任公司 A kind of data networking equipment methods of risk assessment and device
CN105205732A (en) * 2015-09-28 2015-12-30 中国南方电网有限责任公司 Risk assessment and maintenance method based on equipment risk characteristic model
CN107172004A (en) * 2016-03-08 2017-09-15 中兴通讯股份有限公司 The methods of risk assessment and device of a kind of Network Security Device
CN106790198A (en) * 2016-12-30 2017-05-31 北京神州绿盟信息安全科技股份有限公司 A kind of method for evaluating information system risk and system
CN107204876B (en) * 2017-05-22 2020-09-29 成都网络空间安全技术有限公司 Network security risk assessment method
CN107451402A (en) * 2017-07-13 2017-12-08 北京交通大学 A kind of equipment health degree appraisal procedure and device based on alarm data analysis
CN107911231B (en) * 2017-10-25 2020-12-25 北京神州绿盟信息安全科技股份有限公司 Threat data evaluation method and device
CN108009711A (en) * 2017-11-23 2018-05-08 平安科技(深圳)有限公司 Methods of risk assessment, device, computer equipment and readable storage medium storing program for executing
CN108683662B (en) * 2018-05-14 2020-08-14 深圳市联软科技股份有限公司 Individual online equipment risk assessment method and system

Also Published As

Publication number Publication date
WO2019218875A1 (en) 2019-11-21
CN108683662A (en) 2018-10-19

Similar Documents

Publication Publication Date Title
CN103581155B (en) Information security Situation analysis method and system
US9507936B2 (en) Systems, methods, apparatuses, and computer program products for forensic monitoring
CN105516130B (en) A data processing method and device
US8549637B2 (en) Website defacement incident handling system, method, and computer program storage device
US20230328097A1 (en) Method And Apparatus For Measuring Information System Device Integrity And Evaluating Endpoint Posture
CN113542279A (en) Network security risk assessment method, system and device
KR20180013998A (en) Account theft risk identification method, identification device, prevention and control system
Holm A large-scale study of the time required to compromise a computer system
US20190182283A1 (en) Log analysis device, log analysis method, and log analysis program
CN108683662B (en) Individual online equipment risk assessment method and system
CN105243252A (en) Method and device for account risk assessment
JP2021034807A (en) Network monitoring equipment, network monitoring methods, and network monitoring programs
CN114884735B (en) Multi-source data intelligent evaluation system based on security situation
CN112181781A (en) Host security threat degree warning method, device, equipment and storage medium
CN112866230B (en) Risk detection method, risk detection device and storage medium
US20140189872A1 (en) Method and device for monitoring virus trend abnormality
CN112235312B (en) Method and device for determining credibility of security event and electronic equipment
CN116015979B (en) Intelligent security situation awareness method, system and storage medium
CN112511538B (en) Network security detection method based on time sequence and related components
JP2008287435A (en) Security level monitoring and evaluation apparatus and security level monitoring and evaluation program
CN112825059B (en) Security determination method and device and electronic equipment
CN115378739A (en) API access behavior detection method, device, equipment and storage medium
CN117972686B (en) Data management method and related device
JP2006093832A (en) Intrusion detection system, intrusion detection program, intrusion detection information analysis apparatus, and intrusion detection information analysis program
CN111612677B (en) Event security detection method, detection device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant