A high-risk attack path dynamic prediction and repair system and method

An attack path and dynamic prediction technology, applied in the field of information security, can solve the problems of unsatisfactory estimation results of key vulnerable points of attack launch probability, uneven levels, and difficulty in determining key vulnerable points of network systems.

Active Publication Date: 2021-08-10
XIDIAN UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] To sum up, the problems existing in the existing technology are: probability modeling involves the consideration of the angle of the attacker and the angle of attack, while the level of attackers in the real world is uneven, the attack targets are ever-changing, and the development and spread of attack technologies keep pace with the times. progress, it is difficult to determine the launch probability of each attack
Moreover, the network system vulnerability topological structure and software version are various, and it is difficult to determine the key vulnerability points of the network system under different circumstances.
Therefore, the difficulty in solving the above technical problems lies in the fact that the real world situation is changeable, and the estimation results of the attack launch probability and the key vulnerability points of the network system are not satisfactory.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A high-risk attack path dynamic prediction and repair system and method
  • A high-risk attack path dynamic prediction and repair system and method
  • A high-risk attack path dynamic prediction and repair system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0145] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the embodiments described here are only used to explain the present invention, not to limit the present invention.

[0146] see image 3 , the embodiment assumes that the confidence of all safety monitoring points is 0.5, the initial node s0, and the target node s3.

[0147] 1) According to the probability parameter table in Table 1, the cumulative probability of each node is obtained by using the cumulative probability calculation algorithm:

[0148] Table 1 Probability parameter table

[0149] side Probability of use side probability of success (s0, a1) 0.8 (a1, s1) 0.9 (s0, a5) 0.6 (a2, s2) 1.0 (s0, a8) 0.4 (a3, s2) 1.0 (s1, a2) 0.8 (a4, s3) 1.0 (s1, a3) 0.2 (a5, s4) 0.9 (s2, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system and method for dynamic prediction and repair of high-risk attack paths. The high-risk attack path prediction module uses an attack subgraph generation algorithm to generate an attack subgraph according to the attack target, and then uses the improved CVSS scoring strategy and expert knowledge base to estimate the attack launch of each attack node. probability, attack success probability, and confidence of security monitoring points to obtain a probability attack graph, and finally obtain a high-risk attack path through the maximum probability attack path prediction algorithm. The high-risk attack path dynamic correction module uses the system log and security monitoring point alarm information as the data source to establish the Gompertz mathematical model, which dynamically reflects the characteristics of each attack and the utilization probability of the path it is located in over time. The repair strategy module evaluates the objective impact scope of the attack, the objective threat, and the security requirements brought about by the topological position of the attack through the attack comprehensive impact assessment algorithm, and reveals the maximum value repair point. The invention has high prediction accuracy and higher reference degree.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a system and method for dynamic prediction and repair of high-risk attack paths. Background technique [0002] The emergence of the Internet has promoted the rapid development of social productivity and built a new platform for cultural communication and technological innovation. It not only facilitates human work and life, but has now become an indispensable tool. However, due to the complexity and fragility of the network system itself and the malicious use of the network system by malicious users, personal information leakage, malicious tampering of information, malicious occupation of resources and other network security incidents that endanger society and individuals emerge in endlessly. Network system security detection and assessment refers to the inspection of possible high-risk vulnerabilities and attack penetration paths in the network system and the asse...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24G06F17/18
CPCG06F17/18H04L41/145H04L41/147H04L63/1408H04L63/1441
Inventor 李腾龙江山韦薇朱瑞风廖艾王禾张钰洁张岩龚逸儒陈可欣乔伟陈振哲李博洋姬祥李卓钊刘瑞洁江娅叶先志蒋心烛
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products