ATE313183T1 - System und verfahren zur beurteilung der verletzlichkeit der netzsicherheit mit fuzzy logik regeln - Google Patents
System und verfahren zur beurteilung der verletzlichkeit der netzsicherheit mit fuzzy logik regelnInfo
- Publication number
- ATE313183T1 ATE313183T1 AT01910366T AT01910366T ATE313183T1 AT E313183 T1 ATE313183 T1 AT E313183T1 AT 01910366 T AT01910366 T AT 01910366T AT 01910366 T AT01910366 T AT 01910366T AT E313183 T1 ATE313183 T1 AT E313183T1
- Authority
- AT
- Austria
- Prior art keywords
- network
- vulnerability
- data
- fuzzy logic
- model database
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99941—Database schema or data structure
- Y10S707/99944—Object-oriented database structure
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99941—Database schema or data structure
- Y10S707/99944—Object-oriented database structure
- Y10S707/99945—Object-oriented database structure processing
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer And Data Communications (AREA)
- Devices For Executing Special Programs (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Maintenance And Management Of Digital Transmission (AREA)
- Burglar Alarm Systems (AREA)
- Alarm Systems (AREA)
- Debugging And Monitoring (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US09/500,269 US6883101B1 (en) | 2000-02-08 | 2000-02-08 | System and method for assessing the security posture of a network using goal oriented fuzzy logic decision rules |
| PCT/US2001/002825 WO2001059594A2 (en) | 2000-02-08 | 2001-01-26 | System and method for assessing the security vulnerability of a network using fuzzy logic rules |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ATE313183T1 true ATE313183T1 (de) | 2005-12-15 |
Family
ID=23988703
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AT01910366T ATE313183T1 (de) | 2000-02-08 | 2001-01-26 | System und verfahren zur beurteilung der verletzlichkeit der netzsicherheit mit fuzzy logik regeln |
Country Status (10)
| Country | Link |
|---|---|
| US (1) | US6883101B1 (de) |
| EP (1) | EP1254537B1 (de) |
| KR (1) | KR20020081310A (de) |
| CN (1) | CN1266879C (de) |
| AT (1) | ATE313183T1 (de) |
| AU (1) | AU2001237979A1 (de) |
| CA (1) | CA2396981A1 (de) |
| DE (1) | DE60115845T2 (de) |
| TW (1) | TWI221985B (de) |
| WO (1) | WO2001059594A2 (de) |
Families Citing this family (64)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7096502B1 (en) * | 2000-02-08 | 2006-08-22 | Harris Corporation | System and method for assessing the security posture of a network |
| US20040073617A1 (en) | 2000-06-19 | 2004-04-15 | Milliken Walter Clark | Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
| US7162649B1 (en) * | 2000-06-30 | 2007-01-09 | Internet Security Systems, Inc. | Method and apparatus for network assessment and authentication |
| US20030187761A1 (en) * | 2001-01-17 | 2003-10-02 | Olsen Richard M. | Method and system for storing and processing high-frequency data |
| AU2002243763A1 (en) * | 2001-01-31 | 2002-08-12 | Internet Security Systems, Inc. | Method and system for configuring and scheduling security audits of a computer network |
| US20030028803A1 (en) * | 2001-05-18 | 2003-02-06 | Bunker Nelson Waldo | Network vulnerability assessment system and method |
| US7234168B2 (en) * | 2001-06-13 | 2007-06-19 | Mcafee, Inc. | Hierarchy-based method and apparatus for detecting attacks on a computer system |
| US7096503B1 (en) * | 2001-06-29 | 2006-08-22 | Mcafee, Inc. | Network-based risk-assessment tool for remotely detecting local computer vulnerabilities |
| US7146642B1 (en) * | 2001-06-29 | 2006-12-05 | Mcafee, Inc. | System, method and computer program product for detecting modifications to risk assessment scanning caused by an intermediate device |
| US6966053B2 (en) * | 2001-08-10 | 2005-11-15 | The Boeing Company | Architecture for automated analysis and design with read only structure |
| US6546493B1 (en) * | 2001-11-30 | 2003-04-08 | Networks Associates Technology, Inc. | System, method and computer program product for risk assessment scanning based on detected anomalous events |
| JP4190765B2 (ja) * | 2002-01-18 | 2008-12-03 | 株式会社コムスクエア | セキュリティレベル情報提供方法及びシステム |
| CA2488901A1 (en) * | 2002-06-18 | 2003-12-24 | Computer Associates Think, Inc. | Methods and systems for managing enterprise assets |
| US8909926B2 (en) * | 2002-10-21 | 2014-12-09 | Rockwell Automation Technologies, Inc. | System and methodology providing automation security analysis, validation, and learning in an industrial controller environment |
| MXPA04007406A (es) * | 2003-05-17 | 2005-02-17 | Microsoft Corp | Mecanismo para evaluar riesgos de seguridad. |
| US7580909B2 (en) * | 2003-08-26 | 2009-08-25 | Northrop Grumman Corporation | Visual representation tool for structured arguments |
| WO2005091107A1 (en) * | 2004-03-16 | 2005-09-29 | Netcraft Limited | Security component for use with an internet browser application and method and apparatus associated therewith |
| US7383259B2 (en) * | 2004-06-04 | 2008-06-03 | Taiwan Semiconductor Manufacturing Co., Ltd. | Method and system for merging wafer test results |
| US7392324B2 (en) * | 2004-08-13 | 2008-06-24 | International Business Machines Corporation | Consistent snapshots of dynamic heterogeneously managed data |
| US20060075503A1 (en) * | 2004-09-13 | 2006-04-06 | Achilles Guard, Inc. Dba Critical Watch | Method and system for applying security vulnerability management process to an organization |
| KR20060030993A (ko) * | 2004-10-07 | 2006-04-12 | 한국전자통신연구원 | 정보 자산의 보안 수준 분석 방법 |
| US7610610B2 (en) | 2005-01-10 | 2009-10-27 | Mcafee, Inc. | Integrated firewall, IPS, and virus scanner system and method |
| EP1850261A1 (de) * | 2005-02-10 | 2007-10-31 | Matsushita Electric Industrial Co., Ltd. | Programmumsetzungseinrichtung und programmausführungseinrichtung |
| US7743421B2 (en) | 2005-05-18 | 2010-06-22 | Alcatel Lucent | Communication network security risk exposure management systems and methods |
| US20060265324A1 (en) * | 2005-05-18 | 2006-11-23 | Alcatel | Security risk analysis systems and methods |
| US7627593B2 (en) * | 2005-08-25 | 2009-12-01 | International Business Machines Corporation | Method and system for unified support of multiple system management information models in a multiple host environment |
| US8438643B2 (en) * | 2005-09-22 | 2013-05-07 | Alcatel Lucent | Information system service-level security risk analysis |
| US8095984B2 (en) * | 2005-09-22 | 2012-01-10 | Alcatel Lucent | Systems and methods of associating security vulnerabilities and assets |
| US8544098B2 (en) | 2005-09-22 | 2013-09-24 | Alcatel Lucent | Security vulnerability information aggregation |
| US20070156691A1 (en) * | 2006-01-05 | 2007-07-05 | Microsoft Corporation | Management of user access to objects |
| GB0613192D0 (en) | 2006-07-01 | 2006-08-09 | Ibm | Methods, apparatus and computer programs for managing persistence |
| US20080052508A1 (en) * | 2006-08-25 | 2008-02-28 | Huotari Allen J | Network security status indicators |
| CN101425936B (zh) * | 2007-10-30 | 2011-08-31 | 北京启明星辰信息技术股份有限公司 | 基于异常度量的宏观网络安全状态评估方法 |
| US8266518B2 (en) * | 2008-01-16 | 2012-09-11 | Raytheon Company | Anti-tamper process toolset |
| US8732838B2 (en) * | 2008-06-26 | 2014-05-20 | Microsoft Corporation | Evaluating the effectiveness of a threat model |
| US8533843B2 (en) * | 2008-10-13 | 2013-09-10 | Hewlett-Packard Development Company, L. P. | Device, method, and program product for determining an overall business service vulnerability score |
| CN101436937B (zh) * | 2008-11-26 | 2011-05-11 | 国家计算机网络与信息安全管理中心 | 一种对网络系统控制能力进行评价的方法 |
| US8549628B2 (en) * | 2009-04-07 | 2013-10-01 | Alcatel Lucent | Method and apparatus to measure the security of a system, network, or application |
| CN101883017B (zh) * | 2009-05-04 | 2012-02-01 | 北京启明星辰信息技术股份有限公司 | 一种网络安全状态评估系统及方法 |
| CN101692676B (zh) * | 2009-09-29 | 2012-09-19 | 华中师范大学 | 一种开放环境下的混合信任管理系统及其信任评估方法 |
| TWI423619B (zh) * | 2009-10-26 | 2014-01-11 | Intelligent network monitoring system | |
| US20110125548A1 (en) * | 2009-11-25 | 2011-05-26 | Michal Aharon | Business services risk management |
| CN106200616B (zh) | 2010-05-14 | 2019-11-19 | 久益环球表层采矿公司 | 用于远程机器监视的周期分解分析 |
| US7925874B1 (en) | 2010-05-18 | 2011-04-12 | Kaspersky Lab Zao | Adaptive configuration of conflicting applications |
| US8813235B2 (en) * | 2012-08-10 | 2014-08-19 | Nopsec Inc. | Expert system for detecting software security threats |
| US8756698B2 (en) | 2012-08-10 | 2014-06-17 | Nopsec Inc. | Method and system for managing computer system vulnerabilities |
| US8990949B2 (en) | 2013-02-15 | 2015-03-24 | International Business Machines Corporation | Automatic correction of security downgraders |
| US8973134B2 (en) * | 2013-05-14 | 2015-03-03 | International Business Machines Corporation | Software vulnerability notification via icon decorations |
| US9276951B2 (en) * | 2013-08-23 | 2016-03-01 | The Boeing Company | System and method for discovering optimal network attack paths |
| US10599852B2 (en) | 2014-08-15 | 2020-03-24 | Securisea, Inc. | High performance software vulnerabilities detection system and methods |
| US9454659B1 (en) | 2014-08-15 | 2016-09-27 | Securisea, Inc. | Software vulnerabilities detection system and methods |
| US9824214B2 (en) | 2014-08-15 | 2017-11-21 | Securisea, Inc. | High performance software vulnerabilities detection system and methods |
| US20160080408A1 (en) * | 2014-09-15 | 2016-03-17 | Lookingglass Cyber Solutions | Apparatuses, methods and systems for a cyber security assessment mechanism |
| CN104298225B (zh) * | 2014-09-25 | 2017-07-04 | 中国石油化工股份有限公司 | 化工过程异常工况因果关系推理模型建模与图形化展示方法 |
| CN111343135B (zh) * | 2018-12-19 | 2022-05-13 | 中国移动通信集团湖南有限公司 | 一种网络安全态势检测方法 |
| CN110225018A (zh) * | 2019-05-31 | 2019-09-10 | 江苏百达智慧网络科技有限公司 | 一种基于多设备评估web应用脆弱性的方法 |
| CN111654489B (zh) * | 2020-05-27 | 2022-07-29 | 杭州迪普科技股份有限公司 | 一种网络安全态势感知方法、装置、设备及存储介质 |
| CN112379645B (zh) * | 2020-10-23 | 2022-01-11 | 江苏大学 | 一种基于Drools规则引擎的群养母猪饲喂站物联网管控系统及方法 |
| CN115718797B (zh) * | 2021-08-23 | 2025-10-03 | 好心情健康产业集团有限公司 | 睡眠障碍的信息处理方法、装置和系统 |
| CN114866434B (zh) * | 2022-03-09 | 2023-05-02 | 上海纽盾科技股份有限公司 | 网络资产的安全评估方法及应用 |
| CN115455484B (zh) * | 2022-09-22 | 2023-04-18 | 重庆蓝数软件有限公司 | 一种针对云计算空间的数据泄露应对方法及服务器 |
| CN120017288B (zh) * | 2023-11-14 | 2025-11-04 | 上海交通大学 | 基于访问上下文逻辑推理的信息系统访问风险评估方法 |
| CN119720210B (zh) * | 2024-12-02 | 2025-10-21 | 中国人民解放军92493部队信息技术中心 | 一种基于平行嵌入的异构脆弱性数据融合方法及系统 |
| CN120430917A (zh) * | 2025-04-03 | 2025-08-05 | 中国科学院自动化研究所 | 应急态势理解方法、装置、设备、存储介质及程序产品 |
Family Cites Families (19)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CA1314101C (en) | 1988-02-17 | 1993-03-02 | Henry Shao-Lin Teng | Expert system for security inspection of a digital computer system in a network environment |
| US5138321A (en) | 1991-10-15 | 1992-08-11 | International Business Machines Corporation | Method for distributed data association and multi-target tracking |
| US5485409A (en) | 1992-04-30 | 1996-01-16 | International Business Machines Corporation | Automated penetration analysis system and method |
| JPH06282527A (ja) | 1993-03-29 | 1994-10-07 | Hitachi Software Eng Co Ltd | ネットワーク管理システム |
| US5528516A (en) * | 1994-05-25 | 1996-06-18 | System Management Arts, Inc. | Apparatus and method for event correlation and problem reporting |
| AU5174396A (en) | 1995-03-31 | 1996-10-16 | Abb Power T & D Company Inc. | System for optimizing power network design reliability |
| US5699403A (en) | 1995-04-12 | 1997-12-16 | Lucent Technologies Inc. | Network vulnerability management apparatus and method |
| US5787235A (en) * | 1995-05-09 | 1998-07-28 | Gte Government Systems Corporation | Fuzzy logic-based evidence fusion tool for network analysis |
| US5745382A (en) | 1995-08-31 | 1998-04-28 | Arch Development Corporation | Neural network based system for equipment surveillance |
| US5751965A (en) | 1996-03-21 | 1998-05-12 | Cabletron System, Inc. | Network connection status monitor and display |
| US5892903A (en) | 1996-09-12 | 1999-04-06 | Internet Security Systems, Inc. | Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system |
| US5963653A (en) | 1997-06-19 | 1999-10-05 | Raytheon Company | Hierarchical information fusion object recognition system and method |
| US6020889A (en) | 1997-11-17 | 2000-02-01 | International Business Machines Corporation | System for displaying a computer managed network layout with varying transience display of user selected attributes of a plurality of displayed network objects |
| US6298445B1 (en) | 1998-04-30 | 2001-10-02 | Netect, Ltd. | Computer security |
| US6054987A (en) * | 1998-05-29 | 2000-04-25 | Hewlett-Packard Company | Method of dynamically creating nodal views of a managed network |
| US6324656B1 (en) | 1998-06-30 | 2001-11-27 | Cisco Technology, Inc. | System and method for rules-driven multi-phase network vulnerability assessment |
| US6301668B1 (en) | 1998-12-29 | 2001-10-09 | Cisco Technology, Inc. | Method and system for adaptive network security using network vulnerability assessment |
| US6415321B1 (en) | 1998-12-29 | 2002-07-02 | Cisco Technology, Inc. | Domain mapping method and system |
| US6499107B1 (en) | 1998-12-29 | 2002-12-24 | Cisco Technology, Inc. | Method and system for adaptive network security using intelligent packet analysis |
-
2000
- 2000-02-08 US US09/500,269 patent/US6883101B1/en not_active Expired - Lifetime
-
2001
- 2001-01-26 WO PCT/US2001/002825 patent/WO2001059594A2/en not_active Ceased
- 2001-01-26 CA CA002396981A patent/CA2396981A1/en not_active Abandoned
- 2001-01-26 DE DE60115845T patent/DE60115845T2/de not_active Expired - Lifetime
- 2001-01-26 EP EP01910366A patent/EP1254537B1/de not_active Expired - Lifetime
- 2001-01-26 AT AT01910366T patent/ATE313183T1/de not_active IP Right Cessation
- 2001-01-26 KR KR1020027010254A patent/KR20020081310A/ko not_active Withdrawn
- 2001-01-26 CN CNB018046800A patent/CN1266879C/zh not_active Expired - Fee Related
- 2001-01-26 AU AU2001237979A patent/AU2001237979A1/en not_active Abandoned
- 2001-02-08 TW TW090102785A patent/TWI221985B/zh not_active IP Right Cessation
Also Published As
| Publication number | Publication date |
|---|---|
| TWI221985B (en) | 2004-10-11 |
| WO2001059594A3 (en) | 2002-04-18 |
| US6883101B1 (en) | 2005-04-19 |
| AU2001237979A1 (en) | 2001-08-20 |
| CN1266879C (zh) | 2006-07-26 |
| CN1425234A (zh) | 2003-06-18 |
| CA2396981A1 (en) | 2001-08-16 |
| DE60115845T2 (de) | 2006-08-10 |
| KR20020081310A (ko) | 2002-10-26 |
| DE60115845D1 (de) | 2006-01-19 |
| EP1254537A2 (de) | 2002-11-06 |
| WO2001059594A2 (en) | 2001-08-16 |
| EP1254537B1 (de) | 2005-12-14 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ATE313183T1 (de) | System und verfahren zur beurteilung der verletzlichkeit der netzsicherheit mit fuzzy logik regeln | |
| ATE300145T1 (de) | Vorrichtung und verfahren zur beurteilung der verletzlichkeit des netzsicherheit | |
| Vázquez-Rowe et al. | Review of life‐cycle approaches coupled with data envelopment analysis: launching the CFP+ DEA method for energy policy making | |
| CN104766166B (zh) | 一种面向等级保护的信息系统安全合规性检查方法 | |
| DE60220959D1 (de) | Verfahren und Vorrichtung zur Bereitstellung einer Liste von öffentlichen Schlüsseln in einem Public-Key-System | |
| DE69908360D1 (de) | Rechnersystem und verfahren zur erklärung des verhaltens eines modelles das eingangsdaten auf ausgangdaten abbildet | |
| DE60223296D1 (de) | Verfahren zur Erzeugung von Passwörtern aus biometrischen Daten | |
| DE10081401D2 (de) | Neuronales Netz zum Computergestützten Wissensmanagement | |
| Johansson et al. | Coordinating and implementing multiple systems for forest management: implications of the regulatory framework for sustainable forestry in Sweden | |
| DE60336946D1 (de) | System, Verfahren und Computerprogram zur Cachespeicherung von Domain-Name-System-Information in einem Netzwerkgateway | |
| ATE398801T1 (de) | Verfahren und system zum authentifizieren eines benutzers | |
| CN110069937A (zh) | 基于区块链的数据溯源方法、系统及装置 | |
| Haron et al. | Building information modelling: Literature review on model to determine the level of uptake by the organisation | |
| CN103902627A (zh) | 一种数据发布方法及装置 | |
| KR20060068162A (ko) | 제품계열 기반 소프트웨어 개발 방법 | |
| DE60330803D1 (de) | Verfahren und anordnung in einem netzwerk zur bestimmung einerzone, in der eine kommunikationseinheit verbunden ist | |
| CN113704624A (zh) | 基于用户分流的策略推荐方法、装置、设备及介质 | |
| Doss et al. | A review of existing capability maturity model (CMM) derivative frameworks | |
| ATE214494T1 (de) | Verfahren zur neuronalen modellierung der abhängigkeiten von einflussgrössen eines technischen systems | |
| CN112307757A (zh) | 基于辅助任务的情感分析方法、装置、设备及存储介质 | |
| Blackett et al. | Introduction: Social regionalism in the global economy | |
| Aiyer et al. | Waste not, want not | |
| Yahya et al. | A review paper: Security requirement patterns for a secure software development | |
| ATE391315T1 (de) | Verfahren, computerprogrammprodukte und vorrichtung zur überprüfung der identität | |
| Monroy et al. | On the Timely Detection of Mimicry Attacks |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |