Security analysis method for mimicry defense architecture

An analysis method and security technology, applied in the direction of digital transmission system, data exchange network, electrical components, etc., can solve the problems of lack of security of mimic defense, lack of security of mimic defense model, etc., and achieve reliable analysis results

Active Publication Date: 2020-02-21
NANJING UNIV OF SCI & TECH
View PDF11 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In response to this situation, Academician Wu Jiangxing proposed the cyberspace mimicry defense theory, which reversed the passive situation of network security defenders. However, there is currently no corresponding theory to study the security of mimicry defense, which makes the mimicry defense model lack the theoretical support of security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security analysis method for mimicry defense architecture
  • Security analysis method for mimicry defense architecture
  • Security analysis method for mimicry defense architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0096] combine figure 1 , the present invention is oriented to the security analysis method of mimic defense framework, comprises the following steps:

[0097] Step 1. Define four variables in the security analysis model: the dynamic change cycle of the executive body, the time required for the successful implementation of the attack, the probability of the execution body showing a difference after being attacked, and the probability of the attacker successfully transferring the attack, as follows:

[0098] The main structure of mimic defense is the Input-Processing-Output (IPO) model, such as figure 2 shown. From figure 2 It can be seen that the security of mimic defense is related to the following aspects:

[0099] (1) The professional level and technical means of the attacker determine whether the input in the model is aggressive;

[0100] (2) Input agent, which determines whether the attacker’s input information can be normally distributed to heterogeneous executive ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security analysis method for a mimicry defense architecture. The method comprises the following steps: defining the dynamic transformation period of an executor in a securityanalysis model, the time required for successful attack implementation, the probability that the executor shows difference after being attacked, and the probability that an attacker successfully transfers the attack; analyzing the security of the single redundancy defense architecture; obtaining the probability of invading the input proxy component, the probability that the attack continues to stay in the input agent component, the probability that the attack invades into the heterogeneous execution body set from the input agent component, the probability that the attack continues to stay inthe heterogeneous execution body set, the probability that the attack invades into the voter component from the heterogeneous execution body set and the probability that an attacker successfully invades into the voter component from the input agent component are set; and analyzing the security of the n redundancy defense architecture to obtain general values corresponding to the six probability values. According to the method, different parameters are used for analyzing the security defense effectiveness of the mimicry defense system, and a theoretical analysis basis is provided for the security of the mimicry defense model.

Description

technical field [0001] The invention belongs to the technical field of cyberspace security, in particular to a security analysis method for a mimic defense architecture. Background technique [0002] At present, the existing global Internet space is full of loopholes, and information systems connected to the network are easily invaded by illegal persons. In order to ensure the security of an information system, the system must have confidentiality, integrity and availability, so experts and scholars have proposed a series of methods to ensure the realization of these characteristics of the information system. [0003] Existing defense technologies can only respond effectively on the premise of discovering the attack characteristics of the attacker or the abnormal response of the attack target, and there is no solution for those attack methods that have not been detected yet. The limitations of existing defense methods lead to frequent occurrence of network security incident...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/1416H04L41/145H04L41/142
Inventor 李千目桑笑楠王仕豪蔡俊辉邱天
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products