CN114615016B - Enterprise network security assessment method and device, mobile terminal and storage medium - Google Patents

Enterprise network security assessment method and device, mobile terminal and storage medium Download PDF

Info

Publication number
CN114615016B
CN114615016B CN202210122613.7A CN202210122613A CN114615016B CN 114615016 B CN114615016 B CN 114615016B CN 202210122613 A CN202210122613 A CN 202210122613A CN 114615016 B CN114615016 B CN 114615016B
Authority
CN
China
Prior art keywords
index
assessment
risk index
data
enterprise
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210122613.7A
Other languages
Chinese (zh)
Other versions
CN114615016A (en
Inventor
李程雄
陈旭
黄江平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Energy Group Science And Technology Research Institute Co ltd
Original Assignee
Guangdong Energy Group Science And Technology Research Institute Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Energy Group Science And Technology Research Institute Co ltd filed Critical Guangdong Energy Group Science And Technology Research Institute Co ltd
Priority to CN202210122613.7A priority Critical patent/CN114615016B/en
Publication of CN114615016A publication Critical patent/CN114615016A/en
Application granted granted Critical
Publication of CN114615016B publication Critical patent/CN114615016B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Abstract

The invention discloses an enterprise network security assessment method, an enterprise network security assessment device, a mobile terminal and a storage medium, wherein the enterprise network security assessment method comprises the following steps: acquiring basic data of an enterprise to be evaluated; according to the basic data, after carrying out flow situation assessment, asset situation assessment, internal threat risk assessment and external threat risk assessment by combining with the deep learning unit, respectively generating a flow risk index, an asset situation index, an internal threat risk index and an external threat risk index; and carrying out network security assessment on the enterprise to be assessed according to the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index. By adopting the embodiment of the invention, the accuracy of the enterprise network security assessment result can be improved.

Description

Enterprise network security assessment method and device, mobile terminal and storage medium
Technical Field
The present invention relates to the field of data processing, and in particular, to an enterprise network security assessment method, an enterprise network security assessment device, a mobile terminal, and a storage medium.
Background
Networks are the product of the information age and currently cover almost all important areas of the world. As network scale continues to expand, network attacks and vandalism are increasingly frequent, and network security situations become more severe. In order to form the network safety active protection capability, firstly, the internal and external threat and the overall safety state of the network are required to be known, then, the factors influencing the safety in the network are subjected to deep comprehensive processing analysis by a network safety situation assessment technology, the overall safety condition of the network is assessed in real time, and guidance is provided for network safety management command and decision.
However, the factors referred to by the method for evaluating the network security of the enterprise in the prior art are not comprehensive enough, and the accuracy of the evaluation result is not high.
Disclosure of Invention
The embodiment of the invention provides an enterprise network security assessment method, an enterprise network security assessment device, a mobile terminal and a storage medium, which improve the accuracy of an enterprise network security assessment result.
A first aspect of an embodiment of the present application provides an enterprise network security assessment method, including:
acquiring basic data of an enterprise to be evaluated;
according to the basic data, after carrying out flow situation assessment, asset situation assessment, internal threat risk assessment and external threat risk assessment by combining with the deep learning unit, respectively generating a flow risk index, an asset situation index, an internal threat risk index and an external threat risk index;
and carrying out network security assessment on the enterprise to be assessed according to the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index.
In a possible implementation manner of the first aspect, the traffic situation assessment is performed, specifically:
acquiring flow packet data of an enterprise to be evaluated; wherein the base data comprises traffic packet data;
when the number of the traffic packets belonging to the same source address in the first preset period is judged to be larger than a first preset threshold value according to the traffic packet data, confirming that the source address is a malicious address and the traffic packets are malicious traffic packets; wherein the first preset period of time includes: a first period and a second period;
after the total number of malicious flow packets in the first time period and the second time period is calculated, the total number is respectively recorded as a first total number and a second total number;
calculating the probability of occurrence of the malicious address in the second period of time, and marking the probability as the first probability;
and inputting the first total number, the second total number and the first probability into a deep learning unit so that the deep learning unit carries out flow situation assessment and generates a flow risk index.
In a possible implementation manner of the first aspect, the asset situation assessment is performed, specifically:
acquiring asset data of an enterprise to be evaluated; wherein the base data includes asset data;
after carrying out security grade division and importance grade division according to the asset data, obtaining the number of alarm events and the number of loopholes according to the division result;
and inputting the number of alarm events and the number of loopholes into the deep learning unit so that the deep learning unit carries out asset situation assessment and generates asset situation indexes.
In a possible implementation manner of the first aspect, the internal threat risk assessment is performed, specifically:
acquiring intranet data of an enterprise to be evaluated; wherein the basic data comprises intranet data;
acquiring abnormal condition data in a second preset period according to intranet data; wherein the abnormal situation data comprises: illegal equipment access times, the number of intranet illegal wifi hotspots, the number of illegal user access times, the number of internal malicious requests, the number of loopholes and the number of infected viruses;
and inputting the abnormal condition data into the deep learning unit so that the deep learning unit carries out internal threat risk assessment and generates an internal threat risk index.
In a possible implementation manner of the first aspect, the external threat risk assessment is performed, specifically:
acquiring external threat situation data of an enterprise to be evaluated in a third preset period; wherein the base data includes external threat situation data, the external threat situation data including: the external attack frequency, the intrusion success frequency and the intrusion interception frequency information;
and inputting the external threat condition data into the deep learning unit so that the deep learning unit carries out external threat risk assessment and generates an external threat risk index.
In one possible implementation manner of the first aspect, the network security assessment is performed on the enterprise to be assessed according to the traffic risk index, the asset situation index, the internal threat risk index and the external threat risk index, specifically:
calculating subjective weights of flow risk indexes, asset situation indexes, internal threat risk indexes and external threat risk indexes by adopting an analytic hierarchy process;
calculating objective weights of flow risk indexes, asset situation indexes, internal threat risk indexes and external threat risk indexes by adopting an entropy weight method;
calculating comprehensive weights according to the subjective weights and the objective weights;
and calculating to obtain the overall network risk score of the enterprise to be evaluated according to the comprehensive weight, the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index, and carrying out network security evaluation according to the overall network risk score.
In a possible implementation manner of the first aspect, basic data of the enterprise to be evaluated is obtained, specifically:
and acquiring basic data according to the security equipment data, the system log data, the network flow data, the terminal flow data and the service flow data of the enterprise to be evaluated.
A second aspect of an embodiment of the present application provides an enterprise network security assessment apparatus, including: the system comprises an acquisition module, a generation module and an evaluation module;
the acquisition module is used for acquiring basic data of an enterprise to be evaluated;
the generation module is used for respectively generating a flow risk index, an asset situation index, an internal threat risk index and an external threat risk index after carrying out flow situation assessment, asset situation assessment, internal threat risk assessment and external threat risk assessment by combining the deep learning unit according to the basic data;
the evaluation module is used for carrying out network security evaluation on the enterprise to be evaluated according to the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index.
A third aspect of the embodiments of the present application provides a mobile terminal, including a processor and a memory, where the memory stores computer readable program code, and the processor implements the steps of an enterprise network security assessment method described above when executing the computer readable program code.
A fourth aspect of the embodiments of the present application provides a storage medium storing computer readable program code which when executed performs the steps of an enterprise network security assessment method described above.
Compared with the prior art, the method, the device, the mobile terminal and the storage medium for evaluating the enterprise network security provided by the embodiment of the invention comprise the following steps: acquiring basic data of an enterprise to be evaluated; according to the basic data, after carrying out flow situation assessment, asset situation assessment, internal threat risk assessment and external threat risk assessment by combining with the deep learning unit, respectively generating a flow risk index, an asset situation index, an internal threat risk index and an external threat risk index; and carrying out network security assessment on the enterprise to be assessed according to the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index.
The beneficial effects are that: according to the embodiment of the invention, after the flow situation assessment, the asset situation assessment, the internal threat risk assessment and the external threat risk assessment are carried out through the basic data of the enterprise and the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index are respectively generated, the network security assessment is carried out on the enterprise to be assessed according to the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index, the network risk of the enterprise to be assessed can be considered in multiple aspects, and the comprehensive network security assessment is carried out on the enterprise to be assessed, so that the accuracy of the network security assessment result is improved. In addition, the embodiment of the invention calculates the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index through the deep learning unit, and can improve the accuracy and efficiency of index calculation, thereby further improving the accuracy and the evaluation efficiency of the network security evaluation result.
Furthermore, the situation display layer is improved to visually display the results of the application service layer and the big data analysis layer, so that the network security assessment results can be intuitively and dynamically reflected; the user can also check through each application portal established by the application service layer, so that the look and feel and experience of the user are improved, the operation is simple and quick, and the user can be ensured to obtain the network security assessment result conveniently.
Drawings
FIG. 1 is a flow chart of an enterprise network security assessment method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of an enterprise network security assessment apparatus according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an enterprise network security assessment system according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, a flow chart of an enterprise network security assessment method according to an embodiment of the present invention includes S101-S103:
s101: and obtaining basic data of the enterprise to be evaluated.
In this embodiment, the obtaining basic data of the enterprise to be evaluated specifically includes:
and acquiring the basic data according to the security equipment data, the system log data, the network flow data, the terminal flow data and the service flow data of the enterprise to be evaluated.
S102: according to the basic data, after flow situation assessment, asset situation assessment, internal threat risk assessment and external threat risk assessment are carried out by combining the deep learning unit, flow risk indexes, asset situation indexes, internal threat risk indexes and external threat risk indexes are respectively generated.
In this embodiment, the flow situation evaluation is specifically:
acquiring flow packet data of the enterprise to be evaluated; wherein the base data includes the traffic packet data;
when the number of the traffic packets belonging to the same source address in a first preset period is judged to be larger than a first preset threshold value according to the traffic packet data, confirming that the source address is a malicious address and the traffic packets are malicious traffic packets; wherein the first preset period of time includes: a first period and a second period;
after the total number of the malicious flow packets in the first time period and the second time period is calculated, the total number is respectively recorded as a first total number and a second total number;
calculating the probability of occurrence of the malicious address in the second period of time, and recording the probability as a first probability;
and inputting the first total number, the second total number and the first probability into the deep learning unit so that the deep learning unit carries out flow situation assessment and generates the flow risk index.
In a specific embodiment, the method further comprises:
in a first period, classifying and aggregating the flow packets based on the flow packet source addresses in the flow packet data to obtain an aggregation result; the aggregation result is the source address of the flow packet and the attribution of the flow packet.
In this embodiment, the asset situation assessment is specifically:
acquiring asset data of the enterprise to be evaluated; wherein the base data includes the asset data;
after carrying out security grade division and importance grade division according to the asset data, obtaining the number of alarm events and the number of loopholes according to the division result;
and inputting the alarm event number and the vulnerability number into the deep learning unit so that the deep learning unit performs asset situation assessment and generates the asset situation index.
In a specific embodiment, the asset data includes hardware assets and software assets, the importance/security evaluation is scored for each hardware asset or software asset according to expert scoring, the asset data is classified according to scoring results, and the classifying results are the asset data with different security levels/different importance levels, and the different alarm event numbers include: the number of alarm events in the asset data of different importance levels and the number of alarm events in the asset data of different security levels; the vulnerability number includes: the number of vulnerabilities in asset data of different importance levels and the number of vulnerabilities in asset data of different security levels.
In this embodiment, the internal threat risk assessment is specifically:
acquiring intranet data of the enterprise to be evaluated; wherein the base data comprises the intranet data;
acquiring abnormal condition data in a second preset period according to the intranet data; wherein the abnormal-condition data includes: illegal equipment access times, the number of intranet illegal wifi hotspots, the number of illegal user access times, the number of internal malicious requests, the number of loopholes and the number of infected viruses;
and inputting the abnormal condition data into the deep learning unit so that the deep learning unit carries out internal threat risk assessment and generates the internal threat risk index.
In this embodiment, the external threat risk assessment is specifically:
acquiring external threat situation data of the enterprise to be evaluated in a third preset period; wherein the base data includes the external threat situation data, the external threat situation data including: the external attack frequency, the intrusion success frequency and the intrusion interception frequency information;
and inputting the external threat situation data into the deep learning unit so that the deep learning unit carries out external threat risk assessment and generates the external threat risk index.
Preferably, the deep learning unit is a deep learning unit based on a long-term and short-term memory artificial intelligent network, and the deep learning unit comprises: the system comprises a first deep learning unit, a second deep learning unit, a third deep learning unit and a fourth deep learning unit.
When the flow situation assessment is carried out, the flow situation assessment is carried out through the first deep learning unit, and a flow risk index is generated; when the asset situation assessment is carried out, carrying out asset situation assessment through a second deep learning unit to generate an asset situation index; when the internal threat risk assessment is carried out, the internal threat risk assessment is carried out through the deep learning unit, and an internal threat risk index is generated; and when the external threat risk assessment is carried out, carrying out the external threat risk assessment through the deep learning unit, and generating an external threat risk index.
S103: and carrying out network security assessment on the enterprise to be assessed according to the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index.
In this embodiment, the network security evaluation is performed on the enterprise to be evaluated according to the traffic risk index, the asset situation index, the internal threat risk index, and the external threat risk index, which specifically is:
calculating subjective weights of the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index by adopting an analytic hierarchy process;
calculating objective weights of the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index by adopting an entropy weight method;
calculating comprehensive weights according to the subjective weights and the objective weights;
and calculating to obtain an overall network risk score of the enterprise to be evaluated according to the comprehensive weight, the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index, and carrying out network security evaluation according to the overall network risk score.
In one embodiment, the process of calculating the integrated weights may be represented by the following formula:
W=α*W1+β*W2;
wherein, W is comprehensive weight, W1 is subjective weight, W2 is objective weight, alpha is the relative importance of the analytic hierarchy process, and beta is the relative importance of the entropy weight process.
In one embodiment, the overall network risk score for an enterprise under evaluation may be calculated by the following formula:
B=A1*W+A2*W+A3*W+A4*W
wherein B is the overall network risk score of the enterprise to be evaluated, A1 is the flow risk index, A2 is the asset situation index, A3 is the internal threat risk index, and A4 is the external threat risk index.
In one embodiment, the subjective weight W1 is calculated by using an analytic hierarchy process, specifically:
establishing an evaluation index, wherein the evaluation index comprises: flow risk indicators, asset situation indicators, internal threat risk indicators, and external threat risk indicators.
Establishing a judgment matrix, judging the relative importance of each evaluation index in the same layer by comparing the evaluation indexes in pairs, and listing the judgment matrix A as follows:
V i :V j =a ij
A=(a ij ) n*m
wherein V is i V as an evaluation index j A is another evaluation index ij Is a scale.
When the scale is 1, the two indexes are of equal importance; when the scale is 3, it represents V i Ratio V j Slightly important; when the scale is 5, it represents V i Ratio V j Is obviously important; when the scale is 7, it represents V i Ratio V j Is of great importance; when the scale is 9, it represents V i Ratio V j Is extremely important.
Calculating a feature vector of the maximum feature root of the judgment matrix A, namely a weight vector W1, substituting the weight vector W1 into a basic data value, and calculating to obtain:
W1=[0.4659 0.2009 0.1555 0.0598] T
in a specific embodiment, the objective weight W2 is calculated by using a layer entropy weight method, which is specifically as follows:
establishing an evaluation index, wherein the evaluation index comprises: flow risk indicators, asset situation indicators, internal threat risk indicators, and external threat risk indicators.
Calculating the specific gravity P of the jth evaluation index under the ith factor ij
Wherein r is ij For the eigenvalue of the normalized matrix, n is the value under a single evaluation index.
Calculating the entropy value e of the ith factor i
Where k is a constant.
Calculating the difference coefficient g of the ith factor i : for a given entropy value e i The larger the factor evaluation value is, the smaller the difference is, the smaller the factor plays in the comprehensive evaluation, and thus, the difference coefficient g can be defined i =1-e i Then when factor g i The larger the factor, the larger the effect the factor plays in the comprehensive evaluation;
defining weights w ij
Wherein w is ij The objective weight determined by the entropy weight method, namely a weight vector W2, is calculated to obtain:
W2=[0.3581 0.2463 0.2149 0.0421] T
in one embodiment, the process of calculating the integrated weights may be represented by the following formula:
W=α*W1+β*W2;
wherein alpha is the relative importance degree of the analytic hierarchy process, and the value of alpha is 0.5; beta is the relative importance degree of the entropy weight method, and the value can be 0.5, and then the following steps are obtained:
W=[0.1796 0.10045 0.1834 0.0691] T
further, the overall network risk score B for the enterprise under evaluation is as follows:
B=A1*0.1796+A2*0.10045+A3*0.1834+A4*0.0691。
after the overall network risk score of the enterprise to be evaluated is obtained, network security evaluation can be performed on the enterprise to be evaluated according to the overall network risk score of the enterprise to be evaluated.
For further explanation of the enterprise network security assessment apparatus, please refer to fig. 2, fig. 2 is a schematic diagram of an enterprise network security assessment apparatus according to an embodiment of the present invention, which includes: an acquisition module 201, a generation module 202 and an evaluation module 203;
the acquiring module 201 is configured to acquire basic data of an enterprise to be evaluated;
the generating module 202 is configured to generate a traffic risk indicator, an asset situation indicator, an internal threat risk indicator, and an external threat risk indicator respectively after performing traffic situation assessment, asset situation assessment, internal threat risk assessment, and external threat risk assessment by combining a deep learning unit according to the basic data;
the evaluation module 203 is configured to perform network security evaluation on the enterprise to be evaluated according to the traffic risk indicator, the asset situation indicator, the internal threat risk indicator, and the external threat risk indicator.
An embodiment of the present invention provides a mobile terminal, including a processor and a memory, where the memory stores computer readable program code, and the processor implements the steps of an enterprise network security assessment method when executing the computer readable program code.
A specific embodiment of the present invention provides a storage medium storing computer readable program code which when executed performs the steps of an enterprise network security assessment method described above.
To further illustrate the overall flow of enterprise network security assessment, please refer to fig. 3, fig. 3 is a schematic diagram of an enterprise network security assessment system according to an embodiment of the present invention, which includes: a data acquisition layer 301, a big data analysis layer 302, an application service layer 303 and a situation presentation layer 304.
The data collection layer 301 is configured to collect basic data of an enterprise user, where the basic data is derived from security device data, system log data, network traffic data, terminal traffic data, and service traffic data of an enterprise to be evaluated.
Specifically, the data acquisition layer 301 has the following functions:
(1) Hardware assets on an enterprise user's network are discovered and categorized and summarized, including servers, storage, network devices, security devices, virtualization platforms, backup devices, end hosts, and the like.
(2) Software assets on the enterprise user's network are discovered and summarized, including host operating systems and versions, middleware, web services, databases and versions, and so forth.
(3) Asset information is collected, including IP address, name, make, model, category, description, location, responsible person, responsible department.
(4) And (5) collecting logs. The system and the method support the acquisition of syslog and flow logs of various security devices and network devices, support a linux and windows dual-platform, and provide omnibearing acquisition for system logs, database logs, middleware logs and other text logs. And consider a scheme for interfacing with an existing Sifodi log audit system.
(5) And (5) collecting flow. And restoring session behaviors, transactions and application actions in the network traffic by using special traffic acquisition equipment, forming relevant logs, entering a storage and analysis link, and completely restoring all traffic behaviors. And the traffic of the HTTPS protocol in the acquisition network is supported and can be automatically decrypted and analyzed.
(6) And (5) terminal behavior acquisition. Various terminal behavior logs are collected, including behavior logs of terminal processes, flow behaviors, terminal file behaviors, U disk file transmission, mail file transmission, IM file transmission and the like, and support is provided for the whole threat discovery and backtracking process.
The big data analysis layer 302 is configured to perform evaluation analysis according to the basic data, obtain risk indexes of a plurality of sub-items, and calculate an overall network risk score of the enterprise based on the risk indexes of the sub-items.
Specifically, the risk indicators of the sub-items include: flow risk indicators, asset situation indicators, internal threat risk indicators, and external threat risk indicators.
The application service layer 303 is used for building a unified security monitoring service portal, providing applications such as asset management, security analysis, early warning disposition, threat management, situation presentation and the like, and realizing efficient security monitoring and response.
The situation display layer 304 is an extension of the application service layer, and is used for visually displaying the results of the application service layer and the big data analysis layer, and performing network security assessment.
According to the method, basic data of an enterprise to be evaluated is acquired through an acquisition module; then, according to basic data, a generating module is used for carrying out flow situation assessment, asset situation assessment, internal threat risk assessment and external threat risk assessment by combining with a deep learning unit, and then respectively generating a flow risk index, an asset situation index, an internal threat risk index and an external threat risk index; and finally, carrying out network security assessment on the enterprise to be assessed according to the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index by an assessment module.
According to the embodiment of the invention, after the flow situation assessment, the asset situation assessment, the internal threat risk assessment and the external threat risk assessment are carried out through the basic data of the enterprise and the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index are respectively generated, the network security assessment is carried out on the enterprise to be assessed according to the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index, the network risk of the enterprise to be assessed can be considered in multiple aspects, and the comprehensive network security assessment is carried out on the enterprise to be assessed, so that the accuracy of the network security assessment result is improved. In addition, the embodiment of the invention calculates the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index through the deep learning unit, and can improve the accuracy and efficiency of index calculation, thereby further improving the accuracy and the evaluation efficiency of the network security evaluation result.
Furthermore, the situation display layer is improved to visually display the results of the application service layer and the big data analysis layer, so that the network security assessment results can be intuitively and dynamically reflected; the user can also check through each application portal established by the application service layer, so that the look and feel and experience of the user are improved, the operation is simple and quick, and the user can be ensured to obtain the network security assessment result conveniently.
While the foregoing is directed to the preferred embodiments of the present invention, it will be appreciated by those skilled in the art that changes and modifications may be made without departing from the principles of the invention, such changes and modifications are also intended to be within the scope of the invention.

Claims (9)

1. A method for evaluating security of an enterprise network, comprising:
acquiring basic data of an enterprise to be evaluated;
according to the basic data, after carrying out flow situation assessment, asset situation assessment, internal threat risk assessment and external threat risk assessment by combining a deep learning unit, respectively generating a flow risk index, an asset situation index, an internal threat risk index and an external threat risk index; the network security assessment is carried out on the enterprise to be assessed according to the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index, specifically: calculating subjective weights of the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index by adopting an analytic hierarchy process; calculating objective weights of the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index by adopting an entropy weight method; calculating comprehensive weights according to the subjective weights and the objective weights; calculating to obtain an overall network risk score of the enterprise to be evaluated according to the comprehensive weight, the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index, and carrying out network security evaluation according to the overall network risk score;
and carrying out network security assessment on the enterprise to be assessed according to the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index.
2. The enterprise network security assessment method according to claim 1, wherein the traffic situation assessment is specifically:
acquiring flow packet data of the enterprise to be evaluated; wherein the base data includes the traffic packet data;
when the number of the traffic packets belonging to the same source address in a first preset period is judged to be larger than a first preset threshold value according to the traffic packet data, confirming that the source address is a malicious address and the traffic packets are malicious traffic packets; wherein the first preset period of time includes: a first period and a second period;
after the total number of the malicious flow packets in the first time period and the second time period is calculated, the total number is respectively recorded as a first total number and a second total number;
calculating the probability of occurrence of the malicious address in the second period of time, and recording the probability as a first probability;
and inputting the first total number, the second total number and the first probability into the deep learning unit so that the deep learning unit carries out flow situation assessment and generates the flow risk index.
3. The enterprise network security assessment method according to claim 1, wherein the performing asset situation assessment specifically comprises:
acquiring asset data of the enterprise to be evaluated; wherein the base data includes the asset data;
after carrying out security grade division and importance grade division according to the asset data, obtaining the number of alarm events and the number of loopholes according to the division result;
and inputting the alarm event number and the vulnerability number into the deep learning unit so that the deep learning unit performs asset situation assessment and generates the asset situation index.
4. The enterprise network security assessment method of claim 1, wherein the performing the internal threat risk assessment comprises:
acquiring intranet data of the enterprise to be evaluated; wherein the base data comprises the intranet data;
acquiring abnormal condition data in a second preset period according to the intranet data; wherein the abnormal-condition data includes: illegal equipment access times, the number of intranet illegal wifi hotspots, the number of illegal user access times, the number of internal malicious requests, the number of loopholes and the number of infected viruses;
and inputting the abnormal condition data into the deep learning unit so that the deep learning unit carries out internal threat risk assessment and generates the internal threat risk index.
5. The enterprise network security assessment method of claim 1, wherein the performing the external threat risk assessment comprises:
acquiring external threat situation data of the enterprise to be evaluated in a third preset period; wherein the base data includes the external threat situation data, the external threat situation data including: the external attack frequency, the intrusion success frequency and the intrusion interception frequency information;
and inputting the external threat situation data into the deep learning unit so that the deep learning unit carries out external threat risk assessment and generates the external threat risk index.
6. The method for evaluating enterprise network security according to claim 1, wherein the obtaining basic data of the enterprise to be evaluated specifically includes:
and acquiring the basic data according to the security equipment data, the system log data, the network flow data, the terminal flow data and the service flow data of the enterprise to be evaluated.
7. An enterprise network security assessment apparatus, comprising: the system comprises an acquisition module, a generation module and an evaluation module;
the acquisition module is used for acquiring basic data of an enterprise to be evaluated;
the generation module is used for respectively generating a flow risk index, an asset situation index, an internal threat risk index and an external threat risk index after carrying out flow situation assessment, asset situation assessment, internal threat risk assessment and external threat risk assessment by combining the deep learning unit according to the basic data; the generating module is further configured to: calculating subjective weights of the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index by adopting an analytic hierarchy process; calculating objective weights of the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index by adopting an entropy weight method; calculating comprehensive weights according to the subjective weights and the objective weights; calculating to obtain an overall network risk score of the enterprise to be evaluated according to the comprehensive weight, the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index, and carrying out network security evaluation according to the overall network risk score;
the evaluation module is used for carrying out network security evaluation on the enterprise to be evaluated according to the flow risk index, the asset situation index, the internal threat risk index and the external threat risk index.
8. A mobile terminal comprising a processor and a memory, the memory storing computer readable program code, the processor implementing the steps of an enterprise network security assessment method as claimed in any one of claims 1 to 6 when the computer readable program code is executed by the processor.
9. A storage medium storing computer readable program code which when executed implements the steps of an enterprise network security assessment method of any one of claims 1 to 6.
CN202210122613.7A 2022-02-09 2022-02-09 Enterprise network security assessment method and device, mobile terminal and storage medium Active CN114615016B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210122613.7A CN114615016B (en) 2022-02-09 2022-02-09 Enterprise network security assessment method and device, mobile terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210122613.7A CN114615016B (en) 2022-02-09 2022-02-09 Enterprise network security assessment method and device, mobile terminal and storage medium

Publications (2)

Publication Number Publication Date
CN114615016A CN114615016A (en) 2022-06-10
CN114615016B true CN114615016B (en) 2023-08-01

Family

ID=81858328

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210122613.7A Active CN114615016B (en) 2022-02-09 2022-02-09 Enterprise network security assessment method and device, mobile terminal and storage medium

Country Status (1)

Country Link
CN (1) CN114615016B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115174420A (en) * 2022-07-05 2022-10-11 中信百信银行股份有限公司 Safe operation method, system, terminal device and storage medium based on index measurement
CN115225384B (en) * 2022-07-19 2024-01-23 天翼安全科技有限公司 Network threat degree evaluation method and device, electronic equipment and storage medium
CN115357910B (en) * 2022-10-20 2023-03-31 中孚安全技术有限公司 Network risk situation analysis method and system based on spatial relationship
CN116567062B (en) * 2023-07-07 2023-09-26 北京安博通科技股份有限公司 Method, device, electronic equipment and medium for discovering assets based on flow logs

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101436967A (en) * 2008-12-23 2009-05-20 北京邮电大学 Method and system for evaluating network safety situation
CN102624696A (en) * 2011-12-27 2012-08-01 中国航天科工集团第二研究院七〇六所 Network security situation evaluation method
CN108632081A (en) * 2018-03-26 2018-10-09 中国科学院计算机网络信息中心 Network Situation appraisal procedure, device and storage medium
CN110380896A (en) * 2019-07-04 2019-10-25 湖北央中巨石信息技术有限公司 Network security situation awareness model and method based on attack graph
CN110417721A (en) * 2019-03-07 2019-11-05 腾讯科技(深圳)有限公司 Safety risk estimating method, device, equipment and computer readable storage medium
CN111212067A (en) * 2019-12-31 2020-05-29 南京联成科技发展股份有限公司 Industrial network security risk assessment system based on threat prediction
CN111865982A (en) * 2020-07-20 2020-10-30 交通运输信息安全中心有限公司 Threat assessment system and method based on situation awareness alarm
CN111859393A (en) * 2020-07-20 2020-10-30 交通运输信息安全中心有限公司 Risk assessment system and method based on situation awareness alarm
CN112511351A (en) * 2020-12-01 2021-03-16 北京理工大学 Security situation prediction method and system based on MES identification data intercommunication system
CN112651006A (en) * 2020-12-07 2021-04-13 中国电力科学研究院有限公司 Power grid security situation perception platform framework
CN113242267A (en) * 2021-07-12 2021-08-10 深圳市永达电子信息股份有限公司 Situation perception method based on brain-like calculation
CN113780443A (en) * 2021-09-16 2021-12-10 中国民航大学 Network security situation assessment method oriented to threat detection
CN113839817A (en) * 2021-09-23 2021-12-24 北京天融信网络安全技术有限公司 Network asset risk assessment method, device and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200412767A1 (en) * 2015-10-28 2020-12-31 Qomplx, Inc. Hybrid system for the protection and secure data transportation of convergent operational technology and informational technology networks
US20210136120A1 (en) * 2015-10-28 2021-05-06 Qomplx, Inc. Universal computing asset registry

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101436967A (en) * 2008-12-23 2009-05-20 北京邮电大学 Method and system for evaluating network safety situation
CN102624696A (en) * 2011-12-27 2012-08-01 中国航天科工集团第二研究院七〇六所 Network security situation evaluation method
CN108632081A (en) * 2018-03-26 2018-10-09 中国科学院计算机网络信息中心 Network Situation appraisal procedure, device and storage medium
CN110417721A (en) * 2019-03-07 2019-11-05 腾讯科技(深圳)有限公司 Safety risk estimating method, device, equipment and computer readable storage medium
CN110380896A (en) * 2019-07-04 2019-10-25 湖北央中巨石信息技术有限公司 Network security situation awareness model and method based on attack graph
CN111212067A (en) * 2019-12-31 2020-05-29 南京联成科技发展股份有限公司 Industrial network security risk assessment system based on threat prediction
CN111865982A (en) * 2020-07-20 2020-10-30 交通运输信息安全中心有限公司 Threat assessment system and method based on situation awareness alarm
CN111859393A (en) * 2020-07-20 2020-10-30 交通运输信息安全中心有限公司 Risk assessment system and method based on situation awareness alarm
CN112511351A (en) * 2020-12-01 2021-03-16 北京理工大学 Security situation prediction method and system based on MES identification data intercommunication system
CN112651006A (en) * 2020-12-07 2021-04-13 中国电力科学研究院有限公司 Power grid security situation perception platform framework
CN113242267A (en) * 2021-07-12 2021-08-10 深圳市永达电子信息股份有限公司 Situation perception method based on brain-like calculation
CN113780443A (en) * 2021-09-16 2021-12-10 中国民航大学 Network security situation assessment method oriented to threat detection
CN113839817A (en) * 2021-09-23 2021-12-24 北京天融信网络安全技术有限公司 Network asset risk assessment method, device and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
network security assessment traffic asset internal threat deep learning;Niloofar Bayat, Weston Jackson, Derrick Liu;《Arxiv》;全文 *
网络安全态势感知中的威胁情报技术;尹彦,张红斌,刘滨,赵冬梅;《河北科技大学学报》;全文 *

Also Published As

Publication number Publication date
CN114615016A (en) 2022-06-10

Similar Documents

Publication Publication Date Title
CN114615016B (en) Enterprise network security assessment method and device, mobile terminal and storage medium
US20220124108A1 (en) System and method for monitoring security attack chains
CN110620759B (en) Multi-dimensional association-based network security event hazard index evaluation method and system
CA2641656C (en) Methods and system for determining performance of filters in a computer intrusion prevention detection system
CN107579956B (en) User behavior detection method and device
CN111859393B (en) Risk assessment system and method based on situation awareness alarm
JP2018530066A (en) Security incident detection due to unreliable security events
US9674210B1 (en) Determining risk of malware infection in enterprise hosts
CN114679338A (en) Network risk assessment method based on network security situation awareness
CN114584405B (en) Electric power terminal safety protection method and system
CN111865982B (en) Threat assessment system and method based on situation awareness alarm
CN111786950A (en) Situation awareness-based network security monitoring method, device, equipment and medium
Sathya et al. Discriminant analysis based feature selection in kdd intrusion dataset
CN110620696A (en) Grading method and device for enterprise network security situation awareness
US20150172302A1 (en) Interface for analysis of malicious activity on a network
US20200244693A1 (en) Systems and methods for cybersecurity risk assessment of users of a computer network
CN107944293B (en) Fictitious assets guard method, system, equipment and storage medium
CN117478433B (en) Network and information security dynamic early warning system
CN115659351B (en) Information security analysis method, system and equipment based on big data office
CN110955890B (en) Method and device for detecting malicious batch access behaviors and computer storage medium
CN113055362B (en) Method, device, equipment and storage medium for preventing abnormal behaviors
Arıkan et al. A Data Mining Based System for Automating Creation of Cyber Threat Intelligence
CN113312519A (en) Enterprise network data anomaly detection method based on time graph algorithm, system computer equipment and storage medium
CN115098602B (en) Data processing method, device and equipment based on big data platform and storage medium
CN114172707B (en) Fast-Flux botnet detection method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant