With the rapid development of information technology, network attacks and invasions are more and more common. Although Intranet systems arm themselves with various security devices for proactive defense, potential vulnerabilities still put them at risk. According to the "management outweighs technology" principle in information security area, security assessment, as a critical link in security management, plays an important role in safeguarding the IT systems. Comprehensive and objective evaluation result greatly helps network security administrators to analyze the whole security situation and guide them to make reasonable strategy, which could improve the robustness of the networks systems. Scientific methods of security assessment is the key point of the whole security assessing process, thus attract much attention and become the hot spot of research.In the background of Intranet management system, which has a complicated architecture and attaches great importance to hosts, a combined model is proposed to assess the Intranet security level. As to host level, a hidden Markov real-time assessing model based on security strategies is proposed, which takes corresponding security alerts as input, to dynamically reflect the security status of the system. It can limit the order of the observable matrix without losing accuracy. As to network level, an analytical hierarchy assessing model based on rules is proposed, which gives several indicators according to seven criterions on the features of network defending ability, and the weight of each indicator is calculated. Then the results of different host groups are combined with weighting method to get the final assessing result which is then converted to corresponding security level. In this way, the whole security situation knowledge is clearly shown to administrators.On the basis of the research mentioned above, a security assessment module of intranet security management system is designed and realized. The module division and implementation are also given. Main database tables and function codes are listed and the Web assessment report is rendered. Both the feasibility and practicability of the assessing method and the objectivity and efficiency of the assessing result is checked through test analyzation. |