Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability mining method based on improved generative adversarial network framework

A vulnerability mining and network framework technology, applied in biological neural network models, neural learning methods, neural architectures, etc., can solve problems such as low vulnerability mining rate and low reception rate

Pending Publication Date: 2022-01-18
BEIJING UNIV OF TECH
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In recent years, there has been some progress in the research of vulnerability mining technology at home and abroad, but the problems of low acceptance rate and low vulnerability mining rate have appeared in the process of applying the test case construction method of industrial control protocol to the vulnerability mining experiment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability mining method based on improved generative adversarial network framework
  • Vulnerability mining method based on improved generative adversarial network framework
  • Vulnerability mining method based on improved generative adversarial network framework

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] specific implementation plan

[0021] The present invention will be described in detail below in conjunction with specific embodiments shown in the accompanying drawings.

[0022] figure 1 It is a schematic diagram of the overall research idea of ​​the vulnerability mining method in the present invention, which is divided into two stages: test case generation and exception monitoring and capture.

[0023] In the test case generation stage, the training data sets required by the model are firstly captured, which is realized by building a simulated Modbus-TCP protocol communication environment in the present invention, and then these original flow data sets are preprocessed. Then, aiming at the problem of mode collapse in the GAN model itself, an improved GAN framework is proposed; then, for the problem of insufficient feedback information obtained by the discriminator model, a dynamic feedback optimization method is proposed to achieve The goal of efficiently generatin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a vulnerability mining method based on an improved generative adversarial network framework, provides an improved generative adversarial network model framework, and solves the problems of poor target function training effect in a test case generation process and mode collapse in a model training process, too slow convergence speed and not high enough quality of the generated test case due to the fact that feedback information obtained by the generator network from the discriminator network is insufficient in the training process. The method enables the model to achieve faster convergence and obtain higher quality test cases. and finally, a vulnerability mining system is designed and realized based on a Modbus-TCP protocol, and a fuzzy test is performed in a simulation environment and a real industrial environment . According to the method, the receiving rate of the test case is improved, various abnormities of the tested target can be triggered, and vulnerabilities of the Modbus-TCP protocol can be found, so that the problems of low receiving rate and low vulnerability mining capability in a traditional vulnerability mining method are solved.

Description

technical field [0001] The invention relates to the network security field of an industrial control system, in particular to a test case generation method based on an improved generation confrontation network framework and a vulnerability mining method based on the Modbus-TCP protocol. Background technique [0002] Industrial control systems are widely used in infrastructure industries that affect people's lives, such as electric power, petroleum, steel, and rail transit. They are promoting industrial upgrading in traditional industries, accelerating transformation, and rapidly improving social productivity. The production and operation process of the manufacturing industry will be controlled by information technology. At the same time of automatic control, it also forces itself to interact more frequently with the outside world, which gradually increases the "exposure" of the originally relatively closed environment, resulting in a greatly increased security risk. [0003] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06K9/62G06N3/04G06N3/08
CPCG06F21/577G06N3/08G06F2221/034G06N3/045G06N3/044G06F18/241
Inventor 赖英旭叶腾飞
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products