Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for evaluating risk vulnerability of mobile network

A mobile network and vulnerability technology, applied in the field of risk assessment, which can solve the problems of the separation of subjective and objective factors in assessment methods.

Pending Publication Date: 2021-09-10
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] This application provides a mobile network risk vulnerability assessment method and device, which can be used to solve the problem that the subjective factors and objective factors of the assessment method are completely separated in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for evaluating risk vulnerability of mobile network
  • Method and device for evaluating risk vulnerability of mobile network
  • Method and device for evaluating risk vulnerability of mobile network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0142] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0143] In the prior art, there are various methods for assessing mobile network risk vulnerability, among which the more typical one is to use an intelligent method to assess mobile network risk vulnerability. For example, some scholars construct Bayesian neural network for evaluation, use fuzzy theory to preprocess data, and eliminate the influence of fuzziness to a certain extent; some scholars propose to optimize multi-layer feedforward neural network based on chaotic particle swarm Propagation, BP) network security risk vulnerability assessment method, by using the optimization algorithm based on chaotic particle swarms to obtain the extreme value of the particle process movement, using the BP neural network algorithm to obtai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for evaluating risk vulnerability of mobile network. The method provided by the invention comprises the steps of traversing a to-be-evaluated mobile network, and obtaining basic information data of the to-be-evaluated mobile network; comparing the basic information data with a preset comparison database to obtain initial processing data, wherein the comparison database is established according to historical information data and historical determination results of experts; inputting the initial processing data into a pre-trained first evaluation model to obtain a first evaluation result; inputting the initial processing data into a pre-trained second evaluation model to obtain a second evaluation result, wherein the second evaluation model comprises a corresponding relationship between the initial processing data and the evaluation result; and determining an evaluation result according to the initial processing data, the first evaluation result and the second evaluation result. According to the embodiment of the invention, the comparison database is adopted, and subjective factors are introduced in a mobile network risk assessment process, so that the evaluation process is more targeted.

Description

technical field [0001] The present application relates to the technical field of risk assessment, in particular to a method and device for assessing mobile network risk vulnerability. Background technique [0002] With the rapid development of unmanned mobile technology, the types of unmanned mobile platforms and the number of unmanned mobile platforms in the network continue to increase, and the functions of unmanned mobile platforms are also constantly diversified. Changes in unmanned mobile platforms have gradually increased the network layers of unmanned mobile platforms, and the network architecture has become increasingly complex. A new type of complex network represented by mobile networks has also emerged. Mobile network chips are characterized by high integration and complex space environment. Therefore, information security risks faced by mobile networks are also relatively high, such as hardware failures, software failures, network attacks and other information se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06N3/04G06N3/06G06N3/12
CPCG06F21/552G06N3/061G06N3/126G06N3/045
Inventor 庄毅乔塨哲高枫
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products