Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Virus attack defense method based on time probability attack graph

An attack graph and probability technology, applied to instruments, digital data processing, platform integrity maintenance, etc., can solve the problems of different sequence, difficulty, and harm of exploiting vulnerabilities

Pending Publication Date: 2021-06-08
AIR FORCE UNIV PLA
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, during the attack process, the exploitation of vulnerabilities is often not isolated. Under different networks and different attack modes, the order and difficulty of exploiting vulnerabilities are different, and the harm that the same vulnerability may cause is also different.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virus attack defense method based on time probability attack graph
  • Virus attack defense method based on time probability attack graph
  • Virus attack defense method based on time probability attack graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.

[0035] Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus repeated descriptions thereof will be omitted. Some of the block diagrams shown in the drawings are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a virus attack defense method based on a time probability attack graph. The method comprises the following steps: constructing a time probability attack model; obtaining potential attack paths according to the time probability attack graph, and calculating the maximum attack success probability of each attack path; calculating a defense income result of each attack path; and in combination with the maximum attack success probability of each attack path and the defense income result, analyzing and evaluating a network security situation, and deploying a defense system to regularly scan and detect attack behaviors. According to the virus attack defense method provided by the invention, the network security situation is analyzed and evaluated, so that the deployment position of the defense system can be deployed in a targeted manner according to the path and the node which need to be protected, and the deployment accuracy of the defense system is further improved.

Description

technical field [0001] The present disclosure relates to the technical field of computer network information security, in particular to a virus attack defense method based on a time probability attack graph. Background technique [0002] With the intensification of network offensive and defensive confrontation, Advanced Persistent Threat (APT) attacks targeting important enterprise-level networks such as important work departments and scientific research units are also gradually increasing. However, considering factors such as time, cost, and differences in control levels, it is difficult to patch all vulnerabilities or backdoors that may be exploited by the attacker to be foolproof. Reasonable qualitative and quantitative evaluation of network security performance can provide theoretical support for network risk management and control, provide reference for the deployment of defense technologies, and have important theoretical and practical significance for ensuring cybersp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06F21/57
CPCG06F21/566G06F21/562G06F21/577
Inventor 王刚周义建仇铭阳严丽娜姬正洲
Owner AIR FORCE UNIV PLA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products