CN103996006B - A kind of method and apparatus of Evaluation of Information System Security Risk - Google Patents

A kind of method and apparatus of Evaluation of Information System Security Risk Download PDF

Info

Publication number
CN103996006B
CN103996006B CN201310050945.XA CN201310050945A CN103996006B CN 103996006 B CN103996006 B CN 103996006B CN 201310050945 A CN201310050945 A CN 201310050945A CN 103996006 B CN103996006 B CN 103996006B
Authority
CN
China
Prior art keywords
behavior
weights
threat
calling
information system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310050945.XA
Other languages
Chinese (zh)
Other versions
CN103996006A (en
Inventor
李斌
常乐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Shanxi Co Ltd
Original Assignee
China Mobile Group Shanxi Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Shanxi Co Ltd filed Critical China Mobile Group Shanxi Co Ltd
Priority to CN201310050945.XA priority Critical patent/CN103996006B/en
Publication of CN103996006A publication Critical patent/CN103996006A/en
Application granted granted Critical
Publication of CN103996006B publication Critical patent/CN103996006B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of methods of Evaluation of Information System Security Risk, construction threatens behavior pattern library, the calling behavior of information system record is matched with the threat behavior in behavior pattern library is threatened, each decision content for calling behavior matched is obtained, threat behavior weights are determined according to each decision content for calling behavior matched;The weights of behavior weights combination fragility, the weights of Compensation measures will be threatened to obtain risk class;The present invention also discloses a kind of devices of Evaluation of Information System Security Risk, scheme through the invention, it is capable of being measured to information system security risk for various dimensions, compensate for the deficiency of availability risk evaluation quantization, improve the accuracy and credibility of Threat verdict, and the key problem of Risk of Information System quantization can be solved so that user is capable of the risk status of more convenient objective understanding information system operation, makes information system security risk that can perceive.

Description

A kind of method and apparatus of Evaluation of Information System Security Risk
Technical field
The present invention relates to information security technology more particularly to a kind of method and apparatus of Evaluation of Information System Security Risk.
Background technology
With making rapid progress for IT technologies, the entire national economic development all be unable to do without the operation and support of information system, such as What ensures that the operation of these information system security becomes the most important thing;Foundation《2006-2020 national information development strategies》It wants Ask, to reinforce national information efficient public security system construction comprehensively, it is desirable that each tissue adheres to active defense, comprehensive precaution, explore and The information-based inherent law with information security is held, information security challenge is actively coped with.
To realize information security activeization, be critical to solve how evaluation information system safety hazards or in early days perceive wind The situation of danger.Risk status is again related to all many factors, includes mainly:Outside information system fragility sexual factor itself, system The factors such as deterrent, control measure and Compensation measures;These factors interact again, influence each other.
The prior art mainly passes through following three kinds of modes evaluation information system safety hazards:One, from angle is threatened, i.e., The security incident amount of relevant device is judged, daily record of the Main Analysis from safety equipment and information technoloy equipment, and therefrom extracts wind The high daily record of dangerous grade is judged;Two, from fragility angle, i.e., to the relevant network facilities of carrying information system, master Machine resource, code resource etc. carry out Evaluation of vulnerability, to obtain the height of risk status;Three, in conjunction with threat, fragility and money Production value carries out overall merit.
Existing risk evaluation system is mainly reflected in the following aspects there are larger defect and deficiency:
Or one, evaluation index relies on single factors or too complicated, true risk status can not be all reacted;From prestige Side of body angle sets out and can more actually react outside world situation, but since extraneous threat is large number of, source is complicated, existing Novel attack and there is very old attack, and attack applicability and be also required to accurately screen, therefore it is inclined generally to will appear risk status High evaluation is unfavorable for threatening disposition and the development of Compensation measures;It can really reflect information system from fragility angle The loophole situation of system, but since fragility is static, to form risk and be the need for threatening attack participation, therefore often go out Existing risk status evaluation distortion, is unfavorable in effective resource input to risk control, cost is excessive;From threat, fragility Risk status level can be reflected by comparing with assets value progress overall merit, but this overall merit is due to being related to said three-dimensional body System, and three factors are the relationship of multi-to-multi, mapping relations and calculating complex, are difficult to realize in real use.
Two, current appraisement system is often concerned only with risk threats, fragility and assets value, and often ignores very heavy The Compensation measures link wanted, and an important factor for Compensation measures link is actually risk control.
Invention content
In view of this, the main purpose of the present invention is to provide a kind of method of Evaluation of Information System Security Risk and dresses It sets, is capable of being measured to information system security risk for various dimensions.
In order to achieve the above objectives, the technical proposal of the invention is realized in this way:
A kind of method of Evaluation of Information System Security Risk provided by the invention, this method include:
Construction threatens behavior pattern library, by the calling behavior of information system record and threatens the threat row in behavior pattern library To be matched, each decision content for calling behavior matched is obtained, is determined according to each decision content for calling behavior matched Threat behavior weights;
The weights of behavior weights combination fragility, the weights of Compensation measures will be threatened to obtain risk class.
In said program, construction threat behavior pattern library is:It is each specifically to threaten behavior as principle of classification It includes more than one by triple that the threat behavior of type, which maps a system function to call collection, each system function calling collection, <Module No., function number, detailed rules and regulations number>Come the calling behavior of the system application programming interface api function indicated, all threats Behavior composition threatens behavior pattern library.
In said program, it is described by information system record call behavior and the threat behavior that threatens in behavior pattern library into Row matches:The format of the calling behavior of transitional information system record is triple<Module No., function number, detailed rules and regulations number>Lattice Formula matches transformed calling behavior with the threat behavior in behavior pattern library is threatened.
In said program, the decision content for obtaining each calling behavior matched is:Each calling row in statistical match For appearance mean value, the decision content of each calling behavior is obtained according to the appearance mean value of each calling behavior.
It is described that the weights of behavior weights combination fragility, the weights of Compensation measures will be threatened to obtain risk in said program Grade is:According to the risk class formula of the weights including threatening behavior weights, the weights of fragility, Compensation measures, wind is obtained Dangerous grade;
Risk class (V)={ [(A × 2 Log2=Round1The+B×2Vul+C×2Con)/3]}×Asset(value)
Wherein, The represents threat behavior weights;Vul represents the weights of fragility;Con represents the weights of Compensation measures; Round functions are by formulation digit, and the function that logarithm rounds up, Round1 indicates to retain 1 decimal;Asset(value) Represent assets value;A is the coefficient of threat behavior weights;B is the coefficient of the weights of fragility;C is the weights of Compensation measures Coefficient.
A kind of device of Evaluation of Information System Security Risk provided by the invention, the device include:Constructing module, matching mould Block, decision content acquisition module, determining module, risk class acquisition module;Wherein,
The constructing module threatens behavior pattern library for constructing;
The matching module calls behavior and the threat behavior in threat behavior pattern library for record information system It is matched, and each calling behavior matched is sent to decision content acquisition module;
The decision content acquisition module, for obtaining each decision content for calling behavior matched;
The determining module, for determining threat behavior weights according to the decision content;
The risk class acquisition module, for the weights of behavior weights combination fragility, the power of Compensation measures will to be threatened Value obtains risk class.
In said program, the constructing module, specifically for specifically to threaten behavior as principle of classification, each type Threat behavior map system function and call collection, it includes more than one by triple that each system function, which calls collection,<Mould Block number, function number, detailed rules and regulations number>Calling behavior come the API calls indicated, all threat behavior compositions threaten behavior pattern Library.
In said program, the matching module, the format for being specifically used for the calling behavior of transitional information system record is three Tuple<Module No., function number, detailed rules and regulations number>Format, by transformed calling behavior with threaten the threat row in behavior pattern library To be matched.
In said program, the risk class acquisition module is specifically used for according to including threatening behavior weights, fragility Weights, Compensation measures weights risk class formula, obtain risk class;
Risk class (V)={ [(A × 2 Log2=Round1The+B×2Vul+C×2Con)/3]}×Asset(value)
Wherein, The represents threat behavior weights;Vul represents the weights of fragility;Con represents the weights of Compensation measures; Round functions are by formulation digit, and the function that logarithm rounds up, Round1 indicates to retain 1 decimal;Asset(value) Represent assets value;A is the coefficient of threat behavior weights;B is the coefficient of the weights of fragility;C is the weights of Compensation measures Coefficient.
The present invention provides a kind of method and apparatus of Evaluation of Information System Security Risk, construction threatens behavior pattern library, The calling behavior of information system record is matched with the threat behavior in behavior pattern library is threatened, obtains each tune matched With the decision content of behavior, threat behavior weights are determined according to each decision content for calling behavior matched;Behavior weights will be threatened Risk class is obtained in conjunction with the weights of fragility, the weights of Compensation measures;So, it is possible various dimensions to information system security wind Danger is measured, and is compensated for the deficiency of availability risk evaluation quantization, is improved the accuracy and credibility of Threat verdict, simultaneously Solve the key problem of Risk of Information System quantization so that user being capable of the more convenient objective wind for understanding information system operation Dangerous situation makes information system security risk that can perceive.
Description of the drawings
Fig. 1 is the method flow schematic diagram of Evaluation of Information System Security Risk provided by the invention;
Fig. 2 is the structural schematic diagram in threat behavior pattern library provided by the invention;
Fig. 3 is the structural schematic diagram of the device of Evaluation of Information System Security Risk provided by the invention.
Specific implementation mode
The present invention basic thought be:Construction threatens behavior pattern library, by the calling behavior of information system record and threat Threat behavior in behavior pattern library is matched, and each decision content for calling behavior matched is obtained, each according to what is matched The decision content of calling behavior determines threat behavior weights;The weights of behavior weights combination fragility, the power of Compensation measures will be threatened Value obtains risk class.
Below by drawings and the specific embodiments, the present invention is described in further detail.
The present invention realizes a kind of method of Evaluation of Information System Security Risk, as shown in Figure 1, this method includes following Step:
Step 101:Construction threatens behavior pattern library;
Specifically, specifically to threaten behavior as principle of classification, as shown in Fig. 2, the threat behavior A mappings of each type One system function calls collection S, each system function to call collection S including more than one by triple<Module No., function number, Detailed rules and regulations number>Calling behavior come the API calls indicated, the system function call known to the calling behavior that collection S includes Threat behavior, all threat behavior A composition threatens behavior pattern libraries;
The specific threat behavior includes:Wiretapping type, long-range spy's class, premeditated divulge a secret class, hacker attacks class, system/ Network over loading class etc..
Step 102:The calling behavior of information system record is matched with the threat behavior in behavior pattern library is threatened;
Specifically, the format of the calling behavior of transitional information system record is triple<Module No., function number, detailed rules and regulations number> Format, transformed calling behavior is matched with the threat behavior in behavior pattern library is threatened.
Step 103:Obtain each decision content for calling behavior matched;
Specifically, each appearance mean value for calling behavior in statistical match, obtains according to the appearance mean value of each calling behavior Each decision content for calling behavior;Here, the decision content is success attack number or the attack frequency of failure;
The decision content that the appearance mean value according to each calling behavior obtains each calling behavior is:In going out for each calling behavior In existing mean value, the attack result of each calling behavior is counted, using the attack result as decision content;
The attack result is success attack number or the attack frequency of failure.
Step 104:Threat behavior weights are determined according to each decision content for calling behavior matched;
Specifically, when the decision content of the calling behavior matched is more than pre-set threshold value, the calling row is marked For threat behavior, to count all calling behavior quantity for being labeled as threat behavior, determining threat behavior weights.
Step 105:The weights of behavior weights combination fragility, the weights of Compensation measures will be threatened to obtain risk class;
Specifically, public according to the risk class of the weights including threatening behavior weights, the weights of fragility, Compensation measures Formula obtains risk class;
Risk class (V)={ [(A × 2 Log2=Round1The+B×2Vul+C×2Con)/3]}×Asset(value)
Wherein, The represents threat behavior weights;Vul represents the weights of fragility;Con represents the weights of Compensation measures; Round functions are by formulation digit, and the function that logarithm rounds up, Round1 indicates to retain 1 decimal;Asset(value) Represent assets value;A is the coefficient of threat behavior weights;B is the coefficient of the weights of fragility;C is the weights of Compensation measures Coefficient;According to the foundation judged in the world weights, can be set as here:A=0.7, B=0.5, C=0.8;
The weights of the fragility are generally determined according to the loophole rank evaluated in international vulnerability database (CVE);
The weights of the Compensation measures are generally assigned according to the strength of Compensation measures (validity avoided risk) Value, numerical value is higher, and the effect avoided risk is better.
In order to realize the above method, the present invention also provides a kind of device of Evaluation of Information System Security Risk, the devices one As be arranged using Linux Server provide API service hardware device on, as shown in figure 3, the device includes:Constructing module 31, matching module 32, decision content acquisition module 33, determining module 34, risk class acquisition module 35;Wherein,
The constructing module 31 threatens behavior pattern library for constructing;
The matching module 32 calls behavior and the threat row in threat behavior pattern library for record information system To be matched, and each calling behavior matched is sent to decision content acquisition module 33;
The decision content acquisition module 33, for obtaining each decision content for calling behavior matched;
The determining module 34, for determining threat behavior weights according to the decision content;
The risk class acquisition module 35, for the weights of behavior weights combination fragility, Compensation measures will to be threatened Weights obtain risk class.
The constructing module 31, specifically for specifically to threaten behavior as principle of classification, the threat row of each type It includes more than one by triple to call collection, each system function calling collection for one system function of mapping<Module No., function Number, detailed rules and regulations number>Calling behavior come the API calls indicated, the system function have called the calling behavior concentrated and include The threat behavior known, all threat behavior compositions threaten behavior pattern library.
The matching module 32, the format for being specifically used for the calling behavior of transitional information system record is triple<Module Number, function number, detailed rules and regulations number>Format, transformed calling behavior is carried out with the threat behavior in behavior pattern library is threatened Match.
The risk class acquisition module 35, specifically for according to including threatening the weights of behavior weights, fragility, making up The risk class formula of the weights of measure obtains risk class;
Risk class (V)={ [(A × 2 Log2=Round1The+B×2Vul+C×2Con)/3]}×Asset(value)
Wherein, The represents threat behavior weights;Vul represents the weights of fragility;Con represents the weights of Compensation measures; Round functions are by formulation digit, and the function that logarithm rounds up, Round1 indicates to retain 1 decimal;Asset(value) Represent assets value;A is the coefficient of threat behavior weights;B is the coefficient of the weights of fragility;C is the weights of Compensation measures Coefficient;According to the foundation judged in the world weights, can be set as here:A=0.7, B=0.5, C=0.8.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.

Claims (6)

1. a kind of method of Evaluation of Information System Security Risk, which is characterized in that this method includes:
Construction threatens behavior pattern library, by information system record call behavior and the threat behavior that threatens in behavior pattern library into Row matching obtains the decision content for respectively calling behavior matched, and threat is determined according to each decision content for calling behavior matched Behavior weights;
The weights of behavior weights combination fragility, the weights of Compensation measures will be threatened to obtain risk class;
Wherein, the decision content for obtaining each calling behavior matched is:Each appearance for calling behavior in statistical match is equal Value, the decision content of each calling behavior is obtained according to the appearance mean value of each calling behavior;
Wherein, the weights acquisition risk class by the weights for threatening behavior weights combination fragility, Compensation measures is:According to Including threaten behavior weights, the weights of fragility, Compensation measures weights risk class formula, obtain risk class;
Risk class (V)={ [(A × 2 Log2=Round1The+B×2Vul+C×2Con)/3]}×Asset(value)
Wherein, The represents threat behavior weights;Vul represents the weights of fragility;Con represents the weights of Compensation measures;Round Function is by formulation digit, and the function that logarithm rounds up, Round1 indicates to retain 1 decimal;Asset (value) is represented Assets value;A is the coefficient of threat behavior weights;B is the coefficient of the weights of fragility;C is the coefficient of the weights of Compensation measures.
2. according to the method described in claim 1, it is characterized in that, construction threat behavior pattern library is:With specific prestige Side of body behavior maps a system function and collection, each system function is called to call as principle of classification, the threat behavior of each type Collection all includes more than one by triple<Module No., function number, detailed rules and regulations number>Come the system application programming interface API indicated The calling behavior of function, all threat behavior compositions threaten behavior pattern library.
3. according to the method described in claim 2, it is characterized in that, the calling behavior by information system record is gone with threat Carrying out matching for the threat behavior in pattern base is:The format of the calling behavior of transitional information system record is triple<Module Number, function number, detailed rules and regulations number>Format, transformed calling behavior is carried out with the threat behavior in behavior pattern library is threatened Match.
4. a kind of device of Evaluation of Information System Security Risk, which is characterized in that the device includes:Constructing module, matching module, Decision content acquisition module, determining module, risk class acquisition module;Wherein,
The constructing module threatens behavior pattern library for constructing;
The matching module calls behavior to be carried out with the threat behavior in behavior pattern library is threatened for record information system Matching, and each calling behavior matched is sent to decision content acquisition module;
The decision content acquisition module, for obtaining each decision content for calling behavior matched;
The determining module, for determining threat behavior weights according to the decision content;
The risk class acquisition module, for the weights of behavior weights combination fragility, the weights of Compensation measures will to be threatened to obtain Obtain risk class;
Wherein, the decision content acquisition module, each appearance mean value for calling behavior being specifically used in statistical match, according to each tune The decision content of each calling behavior is obtained with the appearance mean value of behavior;
Wherein, the risk class acquisition module, specifically for according to including threatening the weights of behavior weights, fragility, making up The risk class formula of the weights of measure obtains risk class;
Risk class (V)={ [(A × 2 Log2=Round1The+B×2Vul+C×2Con)/3]}×Asset(value)
Wherein, The represents threat behavior weights;Vul represents the weights of fragility;Con represents the weights of Compensation measures;Round Function is by formulation digit, and the function that logarithm rounds up, Round1 indicates to retain 1 decimal;Asset (value) is represented Assets value;A is the coefficient of threat behavior weights;B is the coefficient of the weights of fragility;C is the coefficient of the weights of Compensation measures.
5. device according to claim 4, which is characterized in that the constructing module is specifically used for going with specific threat Collection, each system function is called to call collection to map a system function as the threat behavior of principle of classification, each type Including more than one by triple<Module No., function number, detailed rules and regulations number>Calling behavior come the API calls indicated is owned Threat behavior composition threatens behavior pattern library.
6. device according to claim 5, which is characterized in that the matching module is specifically used for transitional information system and remembers The format of the calling behavior of record is triple<Module No., function number, detailed rules and regulations number>Format, by transformed calling behavior and prestige Threat behavior in side of body behavior pattern library is matched.
CN201310050945.XA 2013-02-17 2013-02-17 A kind of method and apparatus of Evaluation of Information System Security Risk Active CN103996006B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310050945.XA CN103996006B (en) 2013-02-17 2013-02-17 A kind of method and apparatus of Evaluation of Information System Security Risk

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310050945.XA CN103996006B (en) 2013-02-17 2013-02-17 A kind of method and apparatus of Evaluation of Information System Security Risk

Publications (2)

Publication Number Publication Date
CN103996006A CN103996006A (en) 2014-08-20
CN103996006B true CN103996006B (en) 2018-09-04

Family

ID=51310168

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310050945.XA Active CN103996006B (en) 2013-02-17 2013-02-17 A kind of method and apparatus of Evaluation of Information System Security Risk

Country Status (1)

Country Link
CN (1) CN103996006B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105844169B (en) * 2015-01-15 2019-09-13 中国移动通信集团安徽有限公司 Information security measure and device
CN106407813B (en) * 2016-05-17 2020-04-07 北京摄星科技有限公司 Heterogeneous vulnerability scanner data normalization processing device and method
CN106656996B (en) * 2016-11-09 2020-09-15 航天科工智慧产业发展有限公司 Information security risk assessment method
CN107239707B (en) * 2017-06-06 2020-09-29 国家电投集团河南电力有限公司 Threat data processing method for information system
CN108776861A (en) * 2018-04-27 2018-11-09 中国铁路总公司 Railway Communication safety risk estimating method and device
CN110839000B (en) * 2018-08-15 2022-02-08 中国信息通信研究院 Method and device for determining security level of network information system
CN109684366A (en) * 2018-12-20 2019-04-26 国家计算机网络与信息安全管理中心 A kind of knowledge base group volume method for industrial control system risk assessment
CN112565296A (en) * 2020-12-24 2021-03-26 深信服科技股份有限公司 Security protection method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101017458A (en) * 2007-03-02 2007-08-15 北京邮电大学 Software safety code analyzer based on static analysis of source code and testing method therefor
CN101374051A (en) * 2008-08-22 2009-02-25 中国航天科工集团第二研究院七○六所 Method for evaluating information system risk base on multi-element fusion
CN102238038A (en) * 2011-07-26 2011-11-09 北京神州绿盟信息安全科技股份有限公司 Network equipment security evaluation method and device
CN102799954A (en) * 2012-07-18 2012-11-28 中国信息安全测评中心 Method and system for multi-objective optimization applied to risk assessment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8103601B2 (en) * 2006-06-12 2012-01-24 Projectioneering, LLC Complexity systems management method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101017458A (en) * 2007-03-02 2007-08-15 北京邮电大学 Software safety code analyzer based on static analysis of source code and testing method therefor
CN101374051A (en) * 2008-08-22 2009-02-25 中国航天科工集团第二研究院七○六所 Method for evaluating information system risk base on multi-element fusion
CN102238038A (en) * 2011-07-26 2011-11-09 北京神州绿盟信息安全科技股份有限公司 Network equipment security evaluation method and device
CN102799954A (en) * 2012-07-18 2012-11-28 中国信息安全测评中心 Method and system for multi-objective optimization applied to risk assessment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于行为的病毒检测系统的设计与实现;李江涛;《中国优秀硕士学位论文全文数据库(信息科技辑)》;20080815(第8期);正文第19,20,22,23页 *

Also Published As

Publication number Publication date
CN103996006A (en) 2014-08-20

Similar Documents

Publication Publication Date Title
CN103996006B (en) A kind of method and apparatus of Evaluation of Information System Security Risk
CN108055119B (en) Safety excitation method and system based on block chain in crowd sensing application
CN108347430A (en) Network invasion monitoring based on deep learning and vulnerability scanning method and device
CN102158879B (en) Essential factor lost score data processing method and equipment
CN110620759A (en) Network security event hazard index evaluation method and system based on multidimensional correlation
CN106295349A (en) Risk Identification Method, identification device and the anti-Ore-controlling Role that account is stolen
CN103875003A (en) System and method for whitelisting applications in a mobile network environment
KR20170137138A (en) Address matching based risk identification method and apparatus
CN103793650A (en) Static analysis method and static analysis device for Android application program
CN113947215A (en) Federal learning management method and device, computer equipment and storage medium
CN102299918A (en) Network transaction safety system and method thereof
Saad et al. Dine and dash: Static, dynamic, and economic analysis of in-browser cryptojacking
CN109583056A (en) A kind of network-combination yarn tool performance appraisal procedure and system based on emulation platform
CN110445772B (en) Internet host scanning method and system based on host relationship
CN107360047A (en) Network safety evaluation method based on CIA attributes
CN109167832B (en) Electronic commerce system based on cloud computing
CN109684837A (en) A kind of mobile application malware detection method and system towards electric power enterprise
CN116595554B (en) Method and device for realizing government affair data security analysis based on multiple dimensions
CN115640305B (en) Fair and reliable federal learning method based on blockchain
CN115767515B (en) Encryption sharing method and system for base station-free real-time noise big data
CN109873836A (en) A kind of methods of risk assessment and device of data
CN112001812B (en) Intelligent water affair comprehensive management system, method and storage medium
CN103200184A (en) Evaluation method for mobile terminal security
CN110991906B (en) Cloud system information security risk assessment method
CN114553517A (en) Nonlinear weighted network security assessment method, device, equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant