Automatic threat ensuring method facing to network security risk assessment based on first order logic predicate reasoning

A network security and risk assessment technology, applied in the field of automated threat determination based on first-order logical predicate reasoning, can solve problems such as complex network topology and difficult to satisfy

Inactive Publication Date: 2009-09-23
BEIHANG UNIV
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As the scale of the network system becomes larger and the topology of the network becomes more and more complex, it becomes increasingly difficult for network system administrators or risk assessment experts to manually find and determine the threats that exist in the network to meet actual needs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic threat ensuring method facing to network security risk assessment based on first order logic predicate reasoning
  • Automatic threat ensuring method facing to network security risk assessment based on first order logic predicate reasoning
  • Automatic threat ensuring method facing to network security risk assessment based on first order logic predicate reasoning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The Datalog language is a subset of the Prolog language, which has clear declarative semantics (declarative semantics), which can formally describe network status information and attack rules, etc., and is suitable for analysis related to network attacks; and XSB (XSB is a logic programming and deductive The database system, XSB's official website's English annotation is "XSB is a Logic Programming and Deductive Database system for Unix and Windows") is a reverse reasoning system based on list technology, which can be used to execute Datalog programs, and can give the reasoning target when it is established. all possible reasoning paths. XSB can record all instances of rules that are instantiated and useful to the reasoning goal during the reasoning process, which is the evidence that proves that the reasoning goal is reachable.

[0018] In the present invention, the automated threat determination based on first-order logical predicate reasoning for network security ris...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an automatic threat ensuring method facing to network security risk assessment based on first order logic predicate reasoning. The method uses a first order logic predicate descriptive language Datalog to formally describe network security state information and attack rule knowledge base information, uses a logic reasoning engine XSB to automatically reason, and analyzes the evidence files in a reasoning result to obtain threat information in a current network system; wherein, the threat information comprises a threat potential attack source, a corresponding loophole and a possible attack action. By adopting the logical reasoning engine, the automatic threat ensuring method can automatically and effectively ensure the attack threat in a large-scale network system, greatly reduce the working pressure of network administrators, and help the network administrators to purposely adopt preventive measures to protect the network system.

Description

technical field [0001] The present invention relates to the field of network security risk assessment, and more specifically refers to an automatic threat determination method based on first-order logic predicate reasoning for network security risk assessment. Background technique [0002] Risk assessment is the first process in the risk management methodology. Network security risk assessment is the process of determining the probability of occurrence of threats and their impact in the context of network attack and defense, based on attack and defense knowledge, on the basis of identifying and determining assets, threats, and vulnerabilities, and calculating the size of the risk in combination with existing security measures. A threat is a potential cause of an unexpected event that could cause damage to an asset or an organization, that is, the potential for a threat source or threat agent to successfully exploit a specific vulnerability to negatively impact an asset. Ide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/36
Inventor 夏春和吉毅闻丹岩吕艳丽马心意
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products