CN102739649B - Method and device for determining network threat level - Google Patents

Method and device for determining network threat level Download PDF

Info

Publication number
CN102739649B
CN102739649B CN201210167091.9A CN201210167091A CN102739649B CN 102739649 B CN102739649 B CN 102739649B CN 201210167091 A CN201210167091 A CN 201210167091A CN 102739649 B CN102739649 B CN 102739649B
Authority
CN
China
Prior art keywords
time
patch
attack
cyberthreat
leak
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210167091.9A
Other languages
Chinese (zh)
Other versions
CN102739649A (en
Inventor
鲍旭华
赵粮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nsfocus Technologies Group Co Ltd
Original Assignee
Beijing NSFocus Information Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing NSFocus Information Security Technology Co Ltd filed Critical Beijing NSFocus Information Security Technology Co Ltd
Priority to CN201210167091.9A priority Critical patent/CN102739649B/en
Publication of CN102739649A publication Critical patent/CN102739649A/en
Application granted granted Critical
Publication of CN102739649B publication Critical patent/CN102739649B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

The invention provides a method and a device for determining network threat level. The method comprises the following steps: acquiring network threat information; and determining the network threat level according to the formula shown in the specification based on network threat information. The device comprises an acquisition module and a processing module. According to the invention, for vulnerabilities occurring in the whole Internet environment, according to the disclosure time, acquisition time and vulnerability coefficients of vulnerability information, the network threat level of the current vulnerability is quantitatively analyzed and determined, so that the accuracy of network threat level judgment can be improved, the changes of the vulnerability based network threat level with time can be analyzed, the severity degree and changes of a network threat can be timely and intuitively understood, and then corresponding safety measures are taken.

Description

Determine method and the device of Cyberthreat degree
Technical field
The present invention relates to network safety filed, relate in particular to a kind of method and device of definite Cyberthreat degree.
Background technology
In open shared internet environment, information security issue is on the rise, and the loss producing is therefrom difficult to estimate, wherein it is evident that most Cyberthreat.
In prior art, conventionally in single piece of information system or specific network range, for specific Cyberthreat, analyze Cyberthreat degree, user be difficult to timely, intuitively understand Cyberthreat degree and variation, and take corresponding safety measure, need a kind of quantitative analysis method that whole Internet is threatened badly.
Summary of the invention
The invention provides a kind of method and apparatus of definite Cyberthreat degree, to improve the accuracy to the Cyberthreat degree judgement of the leak in internet environment, accurately to select counter-measure.
On the one hand, the invention provides a kind of method, comprising:
Obtain Cyberthreat information, described Cyberthreat information comprises: the exposure time of vulnerability information, time of receipt and leak coefficient, the exposure time representation leak of described vulnerability information found time first in forum information or instrument sample, described time of receipt represents the time that leak is included by public leak and exposure, and described leak coefficient represents the order of severity of described vulnerability information;
According to described Cyberthreat information, and according to f v ( t ) = 0 t &le; t v D v &times; e - T v t - t v , t v < t < t v + T v D v &times; e - 1 t &GreaterEqual; t v + T v Determine Cyberthreat degree;
Wherein, t represents the time; D vrepresent described leak coefficient; t v1represent the described exposure time; t v2represent described time of receipt; T vrepresent that described vulnerability information spreads the needed time, if known t v1and t v2one of, T vit is a preset value; If known t v1and t v2both, t vthe estimation discovery time that represents leak, if known t v1, t v=t v1-β * T v; If known t v2, t v=t v2-(alpha-beta) * T v; α, β is the positive number of alpha+beta <1 of satisfying condition.
On the other hand, the present invention also provides a kind of device, comprising:
Acquisition module, be used for obtaining Cyberthreat information, described Cyberthreat information comprises: the exposure time of vulnerability information, time of receipt and leak coefficient, the exposure time representation leak of described vulnerability information found time first in forum information or instrument sample, described time of receipt represents the time that leak is included by public leak and exposure, and described leak coefficient represents the order of severity of described vulnerability information;
Processing module, for according to described Cyberthreat information, and according to
f v ( t ) = 0 t &le; t v D v &times; e - T v t - t v , t v < t < t v + T v D v &times; e - 1 t &GreaterEqual; t v + T v Determine Cyberthreat degree;
Wherein, t represents the time; D vrepresent described leak coefficient; t v1represent the described exposure time; t v2represent described time of receipt; T vrepresent that described vulnerability information spreads the needed time, if known t v1and t v2one of, T vit is a preset value; If known t v1and t v2both, t vthe estimation discovery time that represents leak, if known t v1, t v=t v1-β * T v; If known t v2, t v=t v2-(alpha-beta) * T v; α, β is the positive number of alpha+beta <1 of satisfying condition.
The method and apparatus of definite Cyberthreat degree provided by the invention, for the leak occurring in whole internet environment, according to the exposure time of vulnerability information, time of receipt and leak coefficient, the Cyberthreat degree based on current leak is determined in quantitative analysis, can improve the accuracy to the judgement of Cyberthreat degree, and analyze Cyberthreat degree based on leak situation over time, with in time, understand intuitively the order of severity and the variation of Cyberthreat, and take corresponding safety measure.
Accompanying drawing explanation
Fig. 1 is the flow chart of an embodiment of method of definite Cyberthreat degree provided by the invention;
Fig. 2 is the curve synoptic diagram figure of Cyberthreat degree of the method for the definite Cyberthreat degree shown in Fig. 1;
Fig. 3 is the flow chart of another embodiment of method of definite Cyberthreat degree provided by the invention;
Fig. 4 is a kind of curve synoptic diagram of patch threat index of the method for the definite Cyberthreat degree shown in Fig. 3;
Fig. 5 is the another kind of curve synoptic diagram of patch threat index of the method for the definite Cyberthreat degree shown in Fig. 3;
Fig. 6 is the curve synoptic diagram of Cyberthreat degree of the method for the definite Cyberthreat degree shown in Fig. 3;
Fig. 7 is the flow chart of another embodiment of method of definite Cyberthreat degree provided by the invention;
Fig. 8 is the curve synoptic diagram of instrument threat index of the method for the definite Cyberthreat degree shown in Fig. 7;
Fig. 9 is the curve synoptic diagram of Cyberthreat degree of the method for the definite Cyberthreat degree shown in Fig. 7;
Figure 10 is the flow chart of another embodiment of method of definite Cyberthreat degree provided by the invention;
Figure 11 is the curve synoptic diagram of event threat index of the method for the definite Cyberthreat degree shown in Figure 10;
Figure 12 is the curve synoptic diagram of Cyberthreat degree of the method for the definite Cyberthreat degree shown in Figure 10;
Figure 13 is the structural representation of the device of definite Cyberthreat degree provided by the invention.
Embodiment
Below in conjunction with accompanying drawing and embodiment, the present invention will be further described.
Fig. 1 is the flow chart of an embodiment of method of definite Cyberthreat degree provided by the invention, the present embodiment is determining applicable to the Cyberthreat degree in internet environment specifically, form with software and/or hardware realizes, for example can be implemented by the device of determining Cyberthreat degree, the concrete steps of the method for definite Cyberthreat degree of the present embodiment are as follows:
S100: obtain Cyberthreat information.
Cyberthreat information comprises: the exposure time of vulnerability information, time of receipt and leak coefficient.The exposure time representation leak of vulnerability information found time first in forum information or instrument sample; Time of receipt represents the time that leak is included by public leak and exposure (Common Vulnerabilities & Exposures, is abbreviated as CVE); Leak coefficient represents the order of severity of described vulnerability information, the numerical value that adopts CVSS (Common Vulnerability Scoring System, is abbreviated as CVSS) to announce.
Wherein, the channel that obtains Cyberthreat information is diversified.For instance, can be that leak list, the security bulletin of manufacturer's announcement, the news report of relevant great security incident etc. that authoritative institution announces do not enumerate at this.
The leak here refers to the defect existing on the specific implementation of hardware, software, agreement or System Security Policy, thereby can make assailant in undelegated situation, access or destruction system.Embodiments of the invention, by exposure time, time of receipt and the leak coefficient of vulnerability information, can be analyzed Cyberthreat degree over time based on this, therefore, can determine more accurately threaten degree.
S110: according to described Cyberthreat information, and according to f v ( t ) = 0 t &le; t v D v &times; e - T v t - t v , t v < t < t v + T v D v &times; e - 1 t &GreaterEqual; t v + T v Determine Cyberthreat degree.
As a kind of feasible execution mode, can be according to the exposure time t of the vulnerability information of collecting v1time of receipt t with vulnerability information v2, determine that vulnerability information spreads needed time T vestimation discovery time t with leak v;
If known t v1and t v2one of, T vit is a preset value; If known t v1and t v2both,
If known t v1, t v=t v1-β * T v; If known t v2, t v=t v2-(alpha-beta) * T v; α wherein, β is the positive number of alpha+beta <1 of satisfying condition.
Further, can basis:
f v ( t ) = 0 t &le; t v D v &times; e - T v t - t v , t v < t < t v + T v D v &times; e - 1 t &GreaterEqual; t v + T v Determine Cyberthreat degree;
Wherein, t represents the time; D vrepresent leak coefficient, the numerical value that adopts CVSS to announce.
At this, implement under scene, as shown in Figure 2, x axle represents time t to the Cyberthreat degree curve synoptic diagram obtaining, and y axle represents Cyberthreat degree f v(t).Explanation is not in the situation that considering other factors, along with leak is found from t vconstantly start, its information constantly spreads, and by increasing assailant, is understood, and threatens also and constantly rises; Until issued from t by authoritative institution or manufacturer v+ T vconstantly start, become public information, threaten and also will continue to remain on high point.
In above-described embodiment, for the leak in the Internet, the leak list of announcing from authoritative institution,, the news of the security bulletin that manufacturer announces, relevant great security incident reports and public network obtains the exposure time of vulnerability information, the time of receipt of vulnerability information and leak coefficient, is determined Cyberthreat degree.Information source can be verified, can not produce deviation because of the conversion of attacking ways.And there is generality, the whole the Internet overall situation is had to directive significance.And by quantitative analysis, go out Cyberthreat degree based on leak situation over time, thereby ensure that user can timely, intuitively understand the order of severity and the variation of Cyberthreat, the influence degree of judgement leak to self, selects counter-measure.
As the feasible execution mode of another kind, when Dang You mechanism or harpoon are issued unofficial patch to described leak, illustrate that this leak is more serious, while now calculating leak threat index, can be announced by CVSS the order of severity D of leak vmust be multiplied by again a default weighting parameters k.Therefore, under this enforcement scene, can basis:
f v ( t ) = 0 t &le; t v k D v &times; e - T v t - t v , t v < t < t v + T v kD v &times; e - 1 t &GreaterEqual; t v + T v Determine Cyberthreat degree;
Wherein, t represents the time; D vrepresent leak coefficient, the numerical value that adopts CVSS to announce; Whether k is default weighting parameters, can issue and determine according to unofficial patch, for being greater than 1 numerical value.For instance, unofficial patch issue, k can elect 1.5 as, or k can also determine according to real needs or actual conditions, also can choose based on experience value.
T vrepresent that vulnerability information spreads the needed time, if known t v1and t v2one of, T vit is a preset value; If known t v1and t v2both, t v1for the exposure time of described vulnerability information, t v2time of receipt for described vulnerability information;
T vthe estimation discovery time that represents leak, if known t v1, t v=t v1-β * T v; If known t v2, t v=t v2-(alpha-beta) * T v; α, β is the positive number of the default alpha+beta <1 that satisfies condition.
In above-described embodiment, after the Internet leak occurs, Dang You mechanism or harpoon have been issued unofficial patch to this leak, illustrate that the threaten degree of this leak increases, now by the leak order of severity D that CVSS is announced vafter being multiplied by a default weighting parameters k, determine again Cyberthreat degree.By the threaten degree of the quantitative current particular vulnerability of calculating, thereby ensure that user can judge the influence degree of leak to self, select counter-measure.
The method of definite Cyberthreat degree that the present embodiment provides, for the leak occurring in internet environment, according to the exposure time of vulnerability information, time of receipt and leak coefficient, determine the threaten degree of current leak, can improve the accuracy to the Cyberthreat degree judgement of the current leak in internet environment, and analyze Cyberthreat degree based on leak situation over time, with in time, understand intuitively the order of severity and the variation of Cyberthreat, accurately to select counter-measure.Meanwhile, information source of the present invention is mainly leak list, the security bulletin of manufacturer's announcement and the news report of relevant great security incident that authoritative institution announces, and has generality, and the whole the Internet overall situation is had to directive significance.
Optionally, above-mentioned Cyberthreat information also comprises following any one or more combination: the issuing time of patch information, attack tool and the issuing time of attack.
Wherein, above-mentioned patch information comprises unofficial patch issuing time and formal patch issuing time, above-mentioned unofficial patch issuing time is illustrated in the formal patch issue time that patch or third party's patch are issued first temporarily before, and above-mentioned formal patch issuing time represents the time that formal patch is issued first.The channel that obtains of patch information is various.For instance, can be authoritative release mechanism or tissue issue, manufacturer's announcement, software or system house's issue or research institution's issue etc., at this, do not enumerate.Above-mentioned interim patch refers to for current leak, interim for special program or the code of repairing current leak by the producer of the leaky software of tool or the system issue for endanger emergent.Above-mentioned third party's patch refers to program or the code for the current leak of special reparation by the user of non-software or system and producer's issue.And above-mentioned formal patch refers to and generally can repair program or the code of current leak completely by the producer issue of the leaky software of tool or system, this patch is strong to the repair ability of current leak, generally can effectively control the harm that current leak brings.
In network, there is for the first time the time of download version in the attack signature that above-mentioned attack tool issuing time represents every kind of attack tool for the first time found time or attack tool.The channel that obtains of attack tool issuing time is various.For instance, can be authoritative release mechanism or tissue issue, manufacturer's announcement, software or system house's issue, research institution's issue or the Internet community or forum etc., at this, do not enumerate.Above-mentioned attack tool refers to the program software that is specifically designed to network attack or system attack.
Above-mentioned attack issuing time represents that verifiable attack starts the earliest time occurring.The channel that obtains of above-mentioned attack issuing time is various.For instance, can be that the bulletin of authoritative institution's announcement, manufacturer, the news report of relevant great security incident etc. do not enumerate at this.Above-mentioned attack refers to by network or other technologies means; utilize configuration defect, agreement defect, the bugs of information system or use force to attack Information System Implementation is attacked, and cause that information system is abnormal or current operation causes the information security events of potential hazard to information system.
Accordingly, can obtain patch threat index f according to above-mentioned patch information p(t), and/or, according to the issuing time of above-mentioned attack tool, obtain above-mentioned attack tool threat index f t(t), and/or, according to the issuing time of above-mentioned attack, obtain above-mentioned attack threat index f e(t);
According to above-mentioned f p(t), above-mentioned f tand above-mentioned f (t) e(t) any at least one and above-mentioned f in v(t) product is determined above-mentioned Cyberthreat degree.
Following Fig. 3 ~ Fig. 5, Fig. 7 ~ Fig. 8, Figure 10 ~ embodiment illustrated in fig. 11 providing are respectively obtained patch threat index f p(t), obtain described attack tool threat index f tand obtain described attack threat index f (t) e(t) feasible execution mode.
Fig. 3 is the flow chart of the another embodiment of method of definite Cyberthreat degree provided by the invention, and on the basis of above-described embodiment, the method for definite Cyberthreat degree of the present embodiment comprises the following steps:
S200: obtain patch information.
Patch information comprises: unofficial patch issuing time and formal patch issuing time.Unofficial patch issuing time, before being illustrated in formal patch issue, the time that interim patch or third party's patch are issued first; Formal patch issuing time, represents the time that formal patch is issued first.The channel that obtains of patch information is various.For instance, can be authoritative release mechanism or tissue issue, manufacturer's announcement, software or system house's issue or research institution's issue etc., at this, do not enumerate.
S210: obtain patch threat index according to described patch information.
As a kind of embodiment, use t p0the issuing time first that represents unofficial patch; Use t p1the issuing time first that represents formal patch.According to the patch issue situation for described leak, Ruo You mechanism or organize and first issued unofficial patch, has issued again formal patch and t afterwards p1-t p0≤ T p, T prepresenting that patch produces the required time cycle of governance role from occurring, is preset value.Can basis:
f p ( t ) = 1 t &le; t p 0 e - D p 0 &times; ( t - t p 0 ) D p 1 &times; ( T p + t p 0 - t p 1 ) + D p 0 &times; ( t p 1 - t p 0 ) t p 0 < t < t p 1 e - D p 1 &times; ( t - t p 1 ) + D p 0 &times; ( t p 1 - t p 0 ) D p 1 &times; ( T p + t p 0 - t p 1 ) + D p 0 &times; ( t p 1 - t p 0 ) , t p 1 &le; t < t p 0 + T p e - 1 t &GreaterEqual; t p 0 + T p Determine patch threat index;
Wherein, f p(t) represent patch threat index; T represents the time; D p0the governance role parameter that represents unofficial patch, is preset as 0.5; D p1the governance role parameter that represents formal patch, is preset as 1.
At this, implement under scene, as shown in Figure 4, x axle represents time t to the curve synoptic diagram of the patch threat index obtaining, and y axle represents patch threat index f p(t).Illustrate in the situation of not considering other factors, after an interim patch issue, from t p0constantly start, certain customers' selection is installed, and can make whole threat gradually decline, and still, due to publication channel and the mounting means problem of interim patch, spreading speed often more formal patch wants slow; And after the issue of formal patch from t p1constantly start, along with user generally installs, whole threat can decline at faster speed.Yet, in reality, exist certain customers due to business or IT maintenance, corresponding patch is not installed all the time, so finally can exist certain remnants to threaten.
As a kind of embodiment, according to the patch issue situation for described leak, if only issued unofficial patch or unofficial patch and formal patch, all issued, but t p1-t p0>T p, T prepresenting that patch produces the required time cycle of governance role from occurring, is preset value, now gets t p=t p0, the governance role parameter D of patch pvalue is 0.5; If only issued formal patch, now get t p=t p1, the governance role parameter D of patch pvalue is 1.Can basis:
f p ( t ) = 1 t &le; t p e - D p &times; ( t - t p ) T p , t p < t < t p + T p e - 1 t &GreaterEqual; t p + T p Determine patch threat index;
Wherein, f p(t) represent patch threat index; T represents the time.
At this, implement under scene, as shown in Figure 5, x axle represents time t to the curve synoptic diagram of the patch threat index obtaining, and y axle represents patch threat index f p(t).Illustrate in the situation of not considering other factors to only have in the situation of a patch issue, from t pconstantly start, along with user generally installs, whole threat can constantly decline; But, in reality, exist certain customers due to business or IT maintenance, corresponding patch is not installed all the time, so finally still can exist certain remnants to threaten.
S220: determine Cyberthreat degree according to described patch threat index.
As a kind of embodiment, on the basis of above-described embodiment, in the present embodiment, with f (t), represent Cyberthreat degree, so can be according to f (t)=f v(t) * f p(t) determine Cyberthreat degree.
Under this implements scene, the curve synoptic diagram of the Cyberthreat degree obtaining as shown in Figure 6, shown after discovery leak, when mechanism, tissue or manufacturer have provided for the patch of this leak, and the variation of the Cyberthreat degree of current leak.Leak is found rear threat and constantly rises, after Dang You mechanism, tissue or manufacturer's issue patch, reason due to deployment cycle, threaten still and can rise a stage by inertia, until reach a natural flex point, start to decline, to most of user installation patch, threat can maintain a lower level, but can have certain residual risk all the time.
In above-described embodiment, for the leak in the Internet, from authoritative institution and public network, obtain unofficial patch issuing time and formal patch issuing time, calculate and obtain patch threat index, and then from leak itself and two aspects of patch, determine Cyberthreat degree and situation over time thereof, thereby ensure that user can judge the influence degree of leak to self, accurately select counter-measure.And information source is reliable, and there is generality, so and definite Cyberthreat degree has directive significance to the whole the Internet overall situation.
Fig. 7 is the flow chart of the another embodiment of method of definite Cyberthreat degree provided by the invention, and on the basis of above-described embodiment, the method for definite Cyberthreat degree of the present embodiment comprises the following steps:
S300: obtain attack tool issuing time.
Attack tool issuing time, the attack signature that represents every kind of attack tool is the found time for the first time, or the time of download version appears in attack tool for the first time in network.Wherein, the channel that obtains of described attack tool issuing time is various.For instance, can be authoritative release mechanism or tissue issue, manufacturer's announcement, software or system house's issue, research institution's issue or the Internet community or forum etc., at this, do not enumerate.
S310: determine instrument threat index according to described attack tool issuing time.
For the attack tool of same leak, may have multiplely, as a kind of embodiment, use t tkthe issuing time that represents k kind attack tool.
D tkthe order of severity that represents k kind attack tool is preset value.The order of severity of attack tool is determined by two combined factors conventionally: the destructiveness (high, medium and low) of the ease for use of attack tool (difficult, in, easily) and attack tool.The order of severity preset value of attack tool is as shown in table 1.
Table 1
T trepresenting that attack tool produces the required time cycle of damaging effect, is preset value.
Can basis:
f tk ( t ) = 0 t &le; t tk D tk &times; e - 16 &times; ( t - t k - T t 2 ) 2 T t 2 , t tk < t < t tk + T t 0 t &GreaterEqual; t tk + T t Determine the threat index of attack tool;
Can basis:
determine the whole attack tool threat indexes for this leak;
Wherein, f t(t) represent the whole attack tool threat indexes for this leak; T represents the time.
At this, implement under scene, as shown in Figure 8, x axle represents time t to the curve synoptic diagram of the instrument threat index obtaining, y axle representational tool threat index f t(t).Illustrate in the situation of not considering other factors, when the several attack tool for same leak spreads in network, at least from t k1constantly start, along with the range of scatter of these instruments constantly increases, user is more and more, and the overall threat of generation is also increasing; When its impact acquires a certain degree, security firm can release corresponding detection or safeguard procedures, and this threat is progressively declined.
S320: determine Cyberthreat degree according to described instrument threat index.
As a kind of embodiment, on the basis of above-described embodiment, with f (t), represent Cyberthreat degree, can be according to f (t)=f v(t) * f t(t) determine Cyberthreat degree.The determined Cyberthreat degree of this embodiment refers to, after starting a leak, any patch and any attack for this leak do not occur, the Cyberthreat degree while only there is the attack tool for this leak.
As a kind of embodiment, on the basis of above-described embodiment, with f (t), represent Cyberthreat degree, can be according to f (t)=f v(t) * f p(t) * f t(t) determine Cyberthreat degree.
At this, implement under scene, the curve synoptic diagram of the Cyberthreat degree obtaining as shown in Figure 9, has shown in the situation of appearance for the attack tool of this leak the variation of Cyberthreat degree.Leak is found rear threat and constantly rises, and after Dang You mechanism, tissue or manufacturer's issue patch, due to deployment cycle, threatens still and can rise a stage by inertia, until reach a natural flex point, starts to decline; When there being attack tool to start spread in network and use, now the patch of certain customers is disposed and is not yet completed, caused the rise cycle threatening, until have mechanism, tissue or manufacturer's issue to detect and preventive means, threatened and finally start decline and tend towards stability.
In above-described embodiment, for the leak in the Internet, according to the attack tool issuing time for this leak, determine patch threat index, and then from leak itself, patch and three aspects of attack tool, determine Cyberthreat degree and situation over time thereof, thereby ensure that user can judge the influence degree of leak to self, accurately select suitable counter-measure.And information source is reliable and have generality, so and definite Cyberthreat degree has directive significance to the whole the Internet overall situation.
Figure 10 is the flow chart of the another embodiment of method of definite Cyberthreat degree provided by the invention, and on the basis of above-described embodiment, the method for definite Cyberthreat degree of the present embodiment comprises the following steps:
S400: obtain attack issuing time.
Attack issuing time, represents that verifiable attack starts the earliest time occurring.The channel that obtains of described attack issuing time is various.For instance, can be that the bulletin of authoritative institution's announcement, manufacturer, the news report of relevant great security incident etc. do not enumerate at this.
S410: determine event threat index according to described attack issuing time.
For the attack of same leak, may have a plurality ofly, as a kind of embodiment, use t eithe issuing time that represents i attack.
D eithe order of severity that represents i attack is preset value.The order of severity of attack is determined by two combined factors: the destructiveness (high, medium and low) of the coverage of event (large, medium and small) and event.The order of severity preset value of attack is as shown in table 2.
Table 2
T erepresenting that attack produces the required time cycle of damaging effect, is preset value.
Can basis f ei ( t ) = 0 t &le; t ei - T e 2 D ei &times; e - 16 &times; ( t - t ei ) 2 T e 2 , t ei - T e 2 < t < t ei + T e 2 0 t &GreaterEqual; t ei + T e 2 Determine the threat index of i attack;
Can basis determine whole attack threat indexes;
Wherein, t represents the time.
At this, implement under scene, as shown in figure 11, x axle represents time t to the curve synoptic diagram of the event threat index obtaining, y axle presentation of events threat index f e(t).Illustrate in the situation of not considering other factors, when several attacks with significant impact for same leak occur, represent to exist some impacts of the unknown before, special-purpose attack tool for example, the focus of attention of hacker's tissue, politics opposition etc., threat now has reached a peak value.This means need to be to threat condition trace back for the previous period, and the concern that event outburst causes itself can make to threaten the cycle that enters a relative decline with reply.
S420: determine Cyberthreat degree according to described event threat index.
As a kind of embodiment, on the basis of above-described embodiment, with f (t), represent Cyberthreat degree, so can be according to f (t)=f v(t) * f e(t) determine Cyberthreat degree.The determined Cyberthreat degree of this embodiment refers to, after starting a leak, any patch and any attack tool for this leak do not occur, the Cyberthreat degree while only there is the attack for this leak.
As a kind of embodiment, on the basis of above-described embodiment, with f (t), represent Cyberthreat degree, so can be according to f (t)=f v(t) * f e(t) * f p(t) determine Cyberthreat degree.The determined Cyberthreat degree of this embodiment refers to, after starting a leak, any attack tool for this leak does not occur, the Cyberthreat degree while only having occurred for the patch issue of this leak and attack.
As a kind of embodiment, on the basis of above-described embodiment, with f (t), represent Cyberthreat degree, so can be according to f (t)=f v(t) * f e(t) * f t(t) determine Cyberthreat degree.The determined Cyberthreat degree of this embodiment refers to, after starting a leak, any patch for this leak does not occur, the Cyberthreat degree while only having occurred for the attack of this leak and attack tool.
As a kind of embodiment, on the basis of above-described embodiment, with f (t), represent Cyberthreat degree, so can be according to f (t)=f v(t) * f p(t) * f t(t) * f e(t), determine Cyberthreat degree.
At this, implement under scene, the curve synoptic diagram of the Cyberthreat degree obtaining as shown in figure 12, has shown in the situation of appearance for the attack of this leak the variation of Cyberthreat degree.Leak is found rear threat and constantly rises, and after Dang You mechanism, tissue or manufacturer's issue patch, due to deployment cycle, threatens still and can rise a stage by inertia, until reach a natural flex point, starts to decline; Have attack tool to start in network, spread and use, now the patch of certain customers is disposed and is not yet completed, and has caused the rise cycle threatening, until have mechanism, tissue or manufacturer's issue to detect and preventive means, threatens and finally starts to decline.When there being hacker some website to be concentrated after the event of attacking, show that preparation, information, the personnel arrangement for the attack tool of this leak continued certain hour.And after attack, by object of attack, started to strengthen protection, and there are mechanism, tissue or manufacturer to release new scheme and measure etc. factor, can cause threatening from peak value starting to decline.
In above-described embodiment, for the leak in the Internet, according to the attack issuing time for this leak, calculate acquisition event threat index, and then from leak itself, patch, attack tool and four aspects of attack, determine to obtain Cyberthreat degree and situation over time thereof, thereby ensure that user can judge the influence degree of leak to self, accurately select suitable counter-measure.And information source is reliable, can not produce deviation because of the conversion of attacking ways; And there is generality, the whole the Internet overall situation is had to directive significance.
It should be noted that in above-described embodiment and calculate the related time, all adopt the UNIX time well-known to those skilled in the art.
Figure 13 is the structural representation of the device of definite Cyberthreat degree provided by the invention, and as shown in figure 13, this device comprises: acquisition module 10 and processing module 11.
Acquisition module 10, be used for obtaining Cyberthreat information, described Cyberthreat information comprises: the exposure time of vulnerability information, time of receipt and leak coefficient, the exposure time representation leak of described vulnerability information found time first in forum information or instrument sample, described time of receipt represents the time that leak is included by public leak and exposure, and described leak coefficient represents the order of severity of described vulnerability information.
Processing module 11, for according to described Cyberthreat information, and according to
f v ( t ) = 0 t &le; t v D v &times; e - T v t - t v , t v < t < t v + T v D v &times; e - 1 t &GreaterEqual; t v + T v Determine Cyberthreat degree;
Wherein, t represents the time; D vrepresent described leak coefficient; t v1represent the described exposure time; t v2represent described time of receipt; T vrepresent that described vulnerability information spreads the needed time, if known t v1and t v2one of, T vit is a preset value; If known t v1and t v2both,
T vthe estimation discovery time that represents leak, if known t v1, t v=t v1-β * T v; If known t v2, t v=t v2-(alpha-beta) * T v; α, β is the positive number of alpha+beta <1 of satisfying condition.
Optionally, the Cyberthreat information that acquisition module 10 obtains also comprises following any one or more combination: the issuing time of patch information, attack tool and the issuing time of attack; Wherein, patch information comprises unofficial patch issuing time and formal patch issuing time, unofficial patch issuing time is illustrated in the formal patch issue time that patch or third party's patch are issued first temporarily before, formal patch issuing time represents the time that formal patch is issued first, there is the time of download version in the attack signature that attack tool issuing time represents every kind of attack tool for the first time found time or attack tool, attack issuing time represents that verifiable attack starts the earliest time occurring for the first time in network.
Optionally, processing module 11 specifically can be used for: according to patch information, obtain patch threat index f p(t), and/or, according to the issuing time of attack tool, obtain described attack tool threat index f t(t), and/or, according to the issuing time of attack, obtain described attack threat index f e(t); According to f p(t), f tand f (t) e(t) any at least one and f in v(t) product is determined Cyberthreat degree.
Optionally, processing module 11 specifically can be used for:
According to f v ( t ) = 0 t &le; t v kD v &times; e - T v t - t v , t v < t < t v + T v k D v &times; e - 1 t &GreaterEqual; t v + T v Determine described Cyberthreat degree;
Wherein, t represents the time; D vrepresent described leak coefficient; K represents default weighting parameters, and described k is determined by the issue of described unofficial patch; T vrepresent that vulnerability information spreads the needed time, if known t v1and t v2one of, T vit is a preset value; If known t v1and t v2both, t v1for the exposure time of described vulnerability information, t v2time of receipt for described vulnerability information; t vthe estimation discovery time that represents leak, if known t v1, t v=t v1-β * T v; If known t v2, t v=t v2-(alpha-beta) * T v; α, β is the positive number of the default alpha+beta <1 that satisfies condition;
And/or processing module 11 specifically can be used for:
According to f p ( t ) = 1 t &le; t p 0 e - D p 0 &times; ( t - t p 0 ) D p 1 &times; ( T p + t p 0 - t p 1 ) + D p 0 &times; ( t p 1 - t p 0 ) t p 0 < t < t p 1 e - D p 1 &times; ( t - t p 1 ) + D p 0 &times; ( t p 1 - t p 0 ) D p 1 &times; ( T p + t p 0 - t p 1 ) + D p 0 &times; ( t p 1 - t p 0 ) , t p 1 &le; t < t p 0 + T p e - 1 t &GreaterEqual; t p 0 + T p Determine patch threat index;
Wherein, f p(t) represent patch threat index; T represents the time; D p0the governance role parameter that represents unofficial patch, is preset as 0.5; D p1the governance role parameter that represents formal patch, is preset as 1; T prepresenting that patch produces the required time cycle of governance role from occurring, is preset value; t p0the issuing time first that represents unofficial patch; t p1the issuing time first that represents formal patch; And t p1-t p0≤ T p;
Or processing module 11 specifically can be used for: according to f p ( t ) = 1 t &le; t p e - D p &times; ( t - t p ) T p , t p < t < t p + T p e - 1 t &GreaterEqual; t p + T p
Determine patch threat index;
Wherein, f p(t) represent patch threat index; T represents the time; T prepresenting that patch produces the required time cycle of governance role from occurring, is preset value; D pthe governance role parameter that represents patch; If only issued unofficial patch or unofficial patch, all issued with formal patch, but t p1-t p0>T p, t p=t p0, D p=0.5; If only issued formal patch, t p=t p1, D p=1;
And/or processing module 11 specifically can be used for:
According to determine attack tool threat index;
Wherein, f t(t) represent whole instrument threat indexes; T represents the time; f tk(t) represent the threat index of k kind attack tool;
f tk ( t ) = 0 t &le; t tk D tk &times; e - 16 &times; ( t - t k - T t 2 ) 2 T t 2 , t tk < t < t tk + T t 0 t &GreaterEqual; t tk + T t ;
T tkthe issuing time that represents k kind attack tool; D tkthe order of severity that represents k kind attack tool is preset value; T trepresenting that attack tool produces the required time cycle of damaging effect, is preset value;
And/or processing module 11 specifically can be used for:
According to determine attack threat index;
Wherein, f e(t) represent whole attack threat indexes; T represents the time; f ei(t) represent the threat index of i attack;
f ei ( t ) = 0 t &le; t ei - T e 2 D ei &times; e - 16 &times; ( t - t ei ) 2 T e 2 , t ei - T e 2 < t < t ei + T e 2 0 t &GreaterEqual; t ei + T e 2 ;
T eithe issuing time that represents i attack; D eithe order of severity that represents i attack is preset value; T erepresenting that attack produces the required time cycle of damaging effect, is preset value.
The device embodiment of definite Cyberthreat degree provided by the invention, corresponding with the embodiment of the method for definite Cyberthreat degree provided by the invention, actuating equipment for the method for definite Cyberthreat degree provided by the invention, the operation that in its concrete structure and structure, each several part is carried out can, referring to embodiment of the method, not repeat them here.
The device of definite Cyberthreat degree provided by the invention, for the leak occurring in whole internet environment, according to the exposure time of vulnerability information, time of receipt and leak coefficient, the Cyberthreat degree of current leak is determined in quantitative analysis, can improve the accuracy to the judgement of Cyberthreat degree, and analyze Cyberthreat degree based on leak situation over time, with in time, understand intuitively the order of severity and the variation of Cyberthreat, and take corresponding safety measure.
One of ordinary skill in the art will appreciate that: all or part of step that realizes above-mentioned each embodiment of the method can complete by the relevant hardware of program command.Aforesaid program can be stored in a computer read/write memory medium.This program, when carrying out, is carried out the step that comprises above-mentioned each embodiment of the method; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CDs.
Finally it should be noted that: each embodiment, only in order to technical scheme of the present invention to be described, is not intended to limit above; Although the present invention is had been described in detail with reference to aforementioned each embodiment, those of ordinary skill in the art is to be understood that: its technical scheme that still can record aforementioned each embodiment is modified, or some or all of technical characterictic is wherein equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution depart from the scope of various embodiments of the present invention technical scheme.

Claims (9)

1. a method for definite Cyberthreat degree, is characterized in that, comprising:
Obtain Cyberthreat information, described Cyberthreat information comprises: the exposure time of vulnerability information, time of receipt and leak coefficient, the exposure time representation leak of described vulnerability information found time first in forum information or instrument sample, described time of receipt represents the time that leak is included by public leak and exposure, and described leak coefficient represents the order of severity of described vulnerability information;
According to described Cyberthreat information, and according to f v ( t ) = 0 t &le; t v D v &times; e - T v t - t v , t v < t < t v + T v D v &times; e - 1 t &GreaterEqual; t v + T v Determine Cyberthreat degree;
Wherein, t represents the time; D vrepresent described leak coefficient; t v1represent the described exposure time; t v2represent described time of receipt; T vrepresent that described vulnerability information spreads the needed time, if known t v1and t v2one of, T vit is a preset value; If known t v1and t v2both, t vthe estimation discovery time that represents leak, if known t v1, t v=t v1-β * T v; If known t v2, t v=t v2-(alpha-beta) * T v; α, β is the positive number of alpha+beta <1 of satisfying condition.
2. method according to claim 1, is characterized in that, described Cyberthreat information also comprises following any one or more combination: the issuing time of patch information, attack tool and the issuing time of attack, wherein, described patch information comprises unofficial patch issuing time and formal patch issuing time, described unofficial patch issuing time is illustrated in the formal patch issue time that patch or third party's patch are issued first temporarily before, described formal patch issuing time represents the time that formal patch is issued first, in network, there is for the first time the time of download version in the attack signature that described attack tool issuing time represents every kind of attack tool for the first time found time or attack tool, described attack issuing time represents that verifiable attack starts the earliest time occurring.
3. method according to claim 2, is characterized in that, comprising:
According to described Cyberthreat information, and according to f v ( t ) = 0 t &le; t v D v &times; e - T v t - t v , t v < t < t v + T v D v &times; e - 1 t &GreaterEqual; t v + T v Determine described Cyberthreat degree;
Wherein, t represents the time; D vrepresent described leak coefficient; K represents default weighting parameters, and described k is determined by the issue of described unofficial patch, for being greater than 1 numerical value; T vrepresent that vulnerability information spreads the needed time, if known t v1and t v2one of, T vit is a preset value; If known t v1and t v2both, t v1for the exposure time of described vulnerability information, t v2time of receipt for described vulnerability information; t vthe estimation discovery time that represents leak, if known t v1, t v=t v1-β * T v; If known t v2, t v=t v2-(alpha-beta) * T v; α, β is the positive number of the default alpha+beta <1 that satisfies condition.
4. according to the method in claim 2 or 3, it is characterized in that, comprising:
According to described patch information, obtain patch threat index f p(t), and/or, according to the issuing time of described attack tool, obtain described attack tool threat index f t(t), and/or, according to the issuing time of described attack, obtain described attack threat index f e(t);
According to described f p(t), described f tand described f (t) e(t) any at least one and described f in v(t) product is determined described Cyberthreat degree.
5. method according to claim 4, is characterized in that, described patch threat index basis
f p ( t ) = 1 t &le; t p 0 e - D p 0 &times; ( t - t p 0 ) D p 1 &times; ( T p + t p 0 - t p 1 ) + D p 0 &times; ( t p 1 - t p 0 ) t p 0 < t < t p 1 e - D p 1 &times; ( t - t p 1 ) + D p 0 &times; ( t p 1 - t p 0 ) D p 1 &times; ( T p + t p 0 - t p 1 ) + D p 0 &times; ( t p 1 - t p 0 ) , t p 1 &le; t < t p 0 + T p e - 1 t &GreaterEqual; t p 0 + T p Determine;
Wherein, f p(t) represent patch threat index; T represents the time; D p0the governance role parameter that represents unofficial patch, is preset as 0.5; D p1the governance role parameter that represents formal patch, is preset as 1; T prepresenting that patch produces the required time cycle of governance role from occurring, is preset value; t p0the issuing time first that represents unofficial patch; t p1the issuing time first that represents formal patch; And t p1-t p0≤ T p;
Or, described patch threat index basis f p ( t ) = 1 t &le; t p e - D p &times; ( t - t p ) T p , t p < t < t p + T p e - 1 t &GreaterEqual; t p + T p Determine;
Wherein, f p(t) represent patch threat index; T represents the time; T prepresenting that patch produces the required time cycle of governance role from occurring, is preset value; D pthe governance role parameter that represents patch; If only issued unofficial patch or unofficial patch, all issued with formal patch, but t p1-t p0>T p, t p=t p0, D p=0.5; If only issued formal patch, t p=t p1, D p=1;
And/or,
Described attack tool threat index basis determine;
Wherein, f t(t) represent whole instrument threat indexes; T represents the time; f tk(t) represent the threat index of k kind attack tool;
f tk ( t ) = 0 t < t tk D tk &times; e - 16 &times; ( t - t tk ) 2 T t 2 , t tk < t < t tk + T t 0 t &GreaterEqual; t tk + T t ;
T tkthe issuing time that represents k kind attack tool; D tkthe order of severity that represents k kind attack tool is preset value; T trepresenting that attack tool produces the required time cycle of damaging effect, is preset value;
And/or,
Described attack threat index basis determine;
Wherein, f e(t) represent whole attack threat indexes; T represents the time; f ei(t) represent the threat index of i attack;
f ei ( t ) = 0 t &le; t ei - T e 2 D ei &times; e - 16 &times; ( t - t ei ) 2 T e 2 , t ei - T e 2 < t < t ei + T e 2 0 t &GreaterEqual; t ei + T e 2 ;
T eithe issuing time that represents i attack; D eithe order of severity that represents i attack is preset value; T erepresenting that attack produces the required time cycle of damaging effect, is preset value.
6. a device for definite Cyberthreat degree, is characterized in that, comprising:
Acquisition module, be used for obtaining Cyberthreat information, described Cyberthreat information comprises: the exposure time of vulnerability information, time of receipt and leak coefficient, the exposure time representation leak of described vulnerability information found time first in forum information or instrument sample, described time of receipt represents the time that leak is included by public leak and exposure, and described leak coefficient represents the order of severity of described vulnerability information;
Processing module, for according to described Cyberthreat information, and according to
f v ( t ) = 0 t &le; t v D v &times; e - T v t - t v , t v < t < t v + T v D v &times; e - 1 t &GreaterEqual; t v + T v Determine Cyberthreat degree;
Wherein, t represents the time; D vrepresent described leak coefficient; t v1represent the described exposure time; t v2represent described time of receipt; T vrepresent that described vulnerability information spreads the needed time, if known t v1and t v2one of, T vit is a preset value; If known t v1and t v2both,
T vthe estimation discovery time that represents leak, if known t v1, t v=t v1-β * T v; If known t v2, t v=t v2-(alpha-beta) * T v; α, β is the positive number of alpha+beta <1 of satisfying condition.
7. device according to claim 6, is characterized in that, the Cyberthreat information that described acquisition module obtains also comprises following any one or more combination: the issuing time of patch information, attack tool and the issuing time of attack, wherein, described patch information comprises unofficial patch issuing time and formal patch issuing time, described unofficial patch issuing time is illustrated in the formal patch issue time that patch or third party's patch are issued first temporarily before, described formal patch issuing time represents the time that formal patch is issued first, in network, there is for the first time the time of download version in the attack signature that described attack tool issuing time represents every kind of attack tool for the first time found time or attack tool, described attack issuing time represents that verifiable attack starts the earliest time occurring.
8. device according to claim 7, is characterized in that, described processing module specifically for: according to described patch information, obtain patch threat index f p(t), and/or, according to the issuing time of described attack tool, obtain described attack tool threat index f t(t), and/or, according to the issuing time of described attack, obtain described attack threat index f e(t); According to described f p(t), described f tand described f (t) e(t) any at least one and described f in v(t) product is determined described Cyberthreat degree.
9. device according to claim 8, is characterized in that, described processing module specifically for: according to f v ( t ) = 0 t &le; t v D v &times; e - T v t - t v , t v < t < t v + T v D v &times; e - 1 t &GreaterEqual; t v + T v Determine described Cyberthreat degree;
Wherein, t represents the time; D vrepresent described leak coefficient; K represents default weighting parameters, and described k is determined by the issue of described unofficial patch, for being greater than 1 numerical value; T vrepresent that vulnerability information spreads the needed time, if known t v1and t v2one of, T vit is a preset value; If known t v1and t v2both, t v1for the exposure time of described vulnerability information, t v2time of receipt for described vulnerability information; t vthe estimation discovery time that represents leak, if known t v1, t v=t v1-β * T v; If known t v2, t v=t v2-(alpha-beta) * T v; α, β is the positive number of the default alpha+beta <1 that satisfies condition;
And/or, processing module specifically for:
According to f p ( t ) = 1 t &le; t p 0 e - D p 0 &times; ( t - t p 0 ) D p 1 &times; ( T p + t p 0 - t p 1 ) + D p 0 &times; ( t p 1 - t p 0 ) t p 0 < t < t p 1 e - D p 1 &times; ( t - t p 1 ) + D p 0 &times; ( t p 1 - t p 0 ) D p 1 &times; ( T p + t p 0 - t p 1 ) + D p 0 &times; ( t p 1 - t p 0 ) , t p 1 &le; t < t p 0 + T p e - 1 t &GreaterEqual; t p 0 + T p Determine described patch threat index;
Wherein, f p(t) represent patch threat index; T represents the time; D p0the governance role parameter that represents unofficial patch, is preset as 0.5; D p1the governance role parameter that represents formal patch, is preset as 1; T prepresenting that patch produces the required time cycle of governance role from occurring, is preset value; t p0the issuing time first that represents unofficial patch; t p1the issuing time first that represents formal patch; And t p1-t p0≤ T p;
Or, processing module specifically for: according to f p ( t ) = 1 t &le; t p e - D p &times; ( t - t p ) T p , t p < t < t p + T p e - 1 t &GreaterEqual; t p + T p Determine described patch threat index;
Wherein, f p(t) represent patch threat index; T represents the time; T prepresenting that patch produces the required time cycle of governance role from occurring, is preset value; D pthe governance role parameter that represents patch; If only issued unofficial patch or unofficial patch, all issued with formal patch, but t p1-t p0>T p, t p=t p0, D p=0.5; If only issued formal patch, t p=t p1, D p=1;
And/or, processing module specifically for:
According to determine described attack tool threat index;
Wherein, f t(t) represent whole instrument threat indexes; T represents the time; f tk(t) represent the threat index of k kind attack tool;
f tk ( t ) = 0 t < t tk D tk &times; e - 16 &times; ( t - t tk ) 2 T t 2 , t tk < t < t tk + T t 0 t &GreaterEqual; t tk + T t ;
T tkthe issuing time that represents k kind attack tool; D tkthe order of severity that represents k kind attack tool is preset value; T trepresenting that attack tool produces the required time cycle of damaging effect, is preset value;
And/or, processing module specifically for:
According to determine described attack threat index;
Wherein, f e(t) represent whole attack threat indexes; T represents the time; f ei(t) represent the threat index of i attack;
f ei ( t ) = 0 t &le; t ei - T e 2 D ei &times; e - 16 &times; ( t - t ei ) 2 T e 2 , t ei - T e 2 < t < t ei + T e 2 0 t &GreaterEqual; t ei + T e 2 ;
T eithe issuing time that represents i attack; D eithe order of severity that represents i attack is preset value; T erepresenting that attack produces the required time cycle of damaging effect, is preset value.
CN201210167091.9A 2012-05-25 2012-05-25 Method and device for determining network threat level Active CN102739649B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210167091.9A CN102739649B (en) 2012-05-25 2012-05-25 Method and device for determining network threat level

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210167091.9A CN102739649B (en) 2012-05-25 2012-05-25 Method and device for determining network threat level

Publications (2)

Publication Number Publication Date
CN102739649A CN102739649A (en) 2012-10-17
CN102739649B true CN102739649B (en) 2014-11-26

Family

ID=46994434

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210167091.9A Active CN102739649B (en) 2012-05-25 2012-05-25 Method and device for determining network threat level

Country Status (1)

Country Link
CN (1) CN102739649B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105871834B (en) * 2016-03-29 2019-08-30 杭州朗和科技有限公司 A kind of method and apparatus calculating malice index
US10333965B2 (en) 2016-09-12 2019-06-25 Qualcomm Incorporated Methods and systems for on-device real-time adaptive security based on external threat intelligence inputs
CN107480533B (en) * 2017-08-08 2022-05-24 深圳市腾讯计算机系统有限公司 Vulnerability repairing method and device and storage medium
CN108363926A (en) * 2017-10-19 2018-08-03 北京安天网络安全技术有限公司 A kind of loophole defence method and system
CN111404879A (en) * 2020-02-26 2020-07-10 亚信科技(成都)有限公司 Visualization method and device for network threats

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101436967A (en) * 2008-12-23 2009-05-20 北京邮电大学 Method and system for evaluating network safety situation

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9756076B2 (en) * 2009-12-17 2017-09-05 American Express Travel Related Services Company, Inc. Dynamically reacting policies and protections for securing mobile financial transactions

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101436967A (en) * 2008-12-23 2009-05-20 北京邮电大学 Method and system for evaluating network safety situation

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李斌,王声远、鲍旭华等.《业务流程状态分析的风险评估》.《清华大学学报》.2009,第49卷(第S2期),2144-2148. *
鲍旭华,戴英侠,冯萍慧等.《基于入侵意图的复合攻击检测和预测算法》.《软件学报》.2005,第16卷(第12期),2132-2138. *

Also Published As

Publication number Publication date
CN102739649A (en) 2012-10-17

Similar Documents

Publication Publication Date Title
CN102739649B (en) Method and device for determining network threat level
Hemsley et al. History of industrial control system cyber incidents
Moore Detecting ransomware with honeypot techniques
WO2015184752A1 (en) Abnormal process detection method and apparatus
CN105991554A (en) Vulnerability detection method and equipment
KR101444250B1 (en) System for monitoring access to personal information and method therefor
Schreck et al. BISSAM: Automatic vulnerability identification of office documents
CN112131571A (en) Threat tracing method and related equipment
Tatar et al. Impact assessment of cyber attacks: A quantification study on power generation systems
CN116340931A (en) RASP-based SCA linkage protection method, device, equipment and medium
CN105825130A (en) Information security early-warning method and device
KR101480040B1 (en) Method, system and computer readable recording medium for web-page monitoring
CN114285630B (en) Security domain risk warning method, system, device and readable storage medium
CN105791263A (en) Information security risk pre-warning method and management system
CN115906093A (en) Alarming method and device based on component bill of materials and electronic equipment
CN114726623A (en) Advanced threat attack evaluation method and device, electronic equipment and storage medium
KR101725670B1 (en) System and method for malware detection and prevention by checking a web server
Tiniou et al. Fault detection with discrete-time measurements: An application for the cyber security of power networks
Tolo et al. Nuclear facilities and cyber threats
Fronimos et al. Evaluating low interaction honeypots and on their use against advanced persistent threats
Awan et al. Continuous monitoring and assessment of cybersecurity risks in large computing infrastructures
CN111626523A (en) Test risk early warning method and system
KR101650445B1 (en) Apparatus and method for detecting webshell in real time using kernel-based file event notification function
Deming For good measure
Koch et al. Defending the grid: backfitting non-expandable control systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100089 3rd floor, Yitai building, 4 Beiwa Road, Haidian District, Beijing

Patentee after: NSFOCUS Technologies Group Co.,Ltd.

Address before: 100089 3rd floor, Yitai building, 4 Beiwa Road, Haidian District, Beijing

Patentee before: NSFOCUS INFORMATION TECHNOLOGY Co.,Ltd.