Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dos attack and defense simulation method based on random petri net

An attack-defense simulation, attack-side technology, applied in digital transmission systems, secure communication devices, electrical components, etc., can solve the function system repair function defense strategy that does not consider system attack detection at the same time, and fails to show the system defense process well details etc.

Active Publication Date: 2022-02-18
国家电网有限公司客户服务中心
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing system defense model under DOS attack fails to show the system defense process and details well, and does not simultaneously consider the system's function of attack detection, system self-repair function, and system function of identifying attacks and generating corresponding defense strategies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dos attack and defense simulation method based on random petri net
  • Dos attack and defense simulation method based on random petri net
  • Dos attack and defense simulation method based on random petri net

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0062] The DOS attack and defense simulation method based on random Petri nets includes the following process:

[0063] Step 1: Using colored Petri nets, construct a system defense model of colored Petri nets under DOS attacks;

[0064] The coloring Petri net seven-tuple is: {P, T, G, A, F, C, M 0},

[0065] Among them: P is the finite set of places p, indicating the state of the system; T is the finite set of transition t, indicating the action that causes the system state to change; G is the transition guard function, indicating the condition that triggers the transition; A is the arc a set , is a directed arc connecting places and transitions; F is an arc function, indicating the change of tokens in places when the system state changes; C is the color set of tokens, indicating the types of tokens in the system; M 0 is the initial identification, indicating the number of Token distributions in the warehouse in the initial state of the system;

[0066] In a system defense ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a DOS attack and defense simulation method based on random Petri net. Including the following process: Step 1: Utilize the colored Petri net to build a system defense model of the colored Petri net under DOS attack; Step 2: Build the system defense model under DOS attack, this model includes the following modules: attack simulation module, attack detection Module, resource repair module, strategy implementation module; Step 3: calculate the average availability rate of the system; the present invention utilizes the coloring Petri net to carry out the system defense modeling under DOS attack, and the model is divided into attack simulation module, attack detection module, resource repair module 1. The four modules of the policy implementation module have well realized the complete process of system defense under DOS attacks, showing the details of system defense under DOS attacks, and the established model can objectively reflect the availability of the system when the parameters are known.

Description

Technical field: [0001] The invention relates to computer system safety protection technology, in particular to a DOS attack and defense simulation method based on random Petri net. Background technique: [0002] Denial of Service (DoS) is the most common type of network attacks. The attacker sends flood-level data packets to the network or target host in a short period of time, occupying a large amount of network bandwidth and consuming target processing resources. When normal users communicate on the network, abnormal requests or service errors will occur, and the normal communication quality of the network will be threatened. DoS attack is simple and effective, and it has seriously affected the normal operation of the network. It is a research focus in the field of network security. [0003] At present, scholars have used Petri nets to model network attacks. Huang Guangqiu et al. proposed a set of network attack modeling methods based on fuzzy Petri nets. Based on the fu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/1458
Inventor 赵伟唐振营穆松鹤王晨飞李慧琴
Owner 国家电网有限公司客户服务中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products