Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security Risk Assessment Method of Assets in Network Based on Game Theory

A technology of security risk and game theory, applied in the field of security risk assessment of assets in the network, to achieve the effect of simple method

Active Publication Date: 2021-09-07
XIAN UNIV OF POSTS & TELECOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In addition, the size of the security risk is determined by two factors, one is the possibility of the vulnerability being exploited, and the second is the impact of the vulnerability being exploited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security Risk Assessment Method of Assets in Network Based on Game Theory
  • Security Risk Assessment Method of Assets in Network Based on Game Theory
  • Security Risk Assessment Method of Assets in Network Based on Game Theory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0191] This embodiment illustrates the method of the present invention through an embodiment.

[0192] In this embodiment, there is a host computer equipped with necessary and commonly used software, including operating system, word processing software, web browser and instant messaging software, and 10 vulnerabilities are found by manual and vulnerability scanning tools, as shown in Figure 5 .

[0193] 3 vulnerabilities were found in the operating system, 3 vulnerabilities were found in the word processing software, 2 vulnerabilities were found in the web browser, and 2 vulnerabilities were found in the instant messaging software. The cost of a vulnerability is a real number in the interval (0,1), the loss of a successful attack is the product of a real number in the interval (1,2) and the cost of focusing on the vulnerability, and the profit of a successful attack is in the interval (1,2) The product of the real number between and the cost of attacking the vulnerability, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The security risk assessment method of assets in the network based on game theory builds an assessment model in which the system administrator and the attacker play games on each vulnerability through game theory. The system administrator has the choice of paying attention to or ignoring the vulnerability, while the attack The attacker has the choice of attacking or not attacking the vulnerability. From the analysis of the income of both parties, neither the system administrator nor the attacker can ensure that the game reaches a balance by choosing an action. Therefore, both parties need to use a mixed strategy to make the income Maximum, according to the game model, the strategy of the system administrator and the attacker when the game reaches a balance is deduced, and then the risk degree of the asset is obtained; the advantage of the present invention is that it can combine the information of the vulnerability library to analyze the risk of the asset in the network, And can provide support for the overall network security risk assessment.

Description

technical field [0001] The invention belongs to the technical field of computer network security, and in particular relates to a method for assessing security risks of assets in a network based on game theory. Background technique [0002] The rapid development of information technology has brought convenience and development momentum to the society, among which the network is an important infrastructure for the widespread application of information technology and plays a very important role. In particular, the popularity of the mobile Internet has made the Internet an indispensable part of people's lives. At the same time, the risks of various security threats to the network cannot be ignored. In addition to using biometric identification, firewall, intrusion detection and other technologies to deal with specific security issues, information security practitioners will also use information security risk assessment technology to conduct comprehensive security analysis of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1433
Inventor 刘意先浩明魏雅娟于海燕王俊烺
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products