A system for predicting industrial control network vulnerabilities based on summary word segmentation features
A vulnerability and industrial control technology, applied in the computer field, can solve the problem of inability to guarantee the security of industrial control network, and achieve the effect of improving accuracy and prediction efficiency, improving security and stability, and improving accuracy and acquisition efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0036] The computer program stored in the storage medium includes a first computer program, and when the processor executes the first computer program, the following steps are implemented:
[0037] Step S101, obtaining the training period T of the training data set 0 =LCM(TP m ), LCM is the least common multiple function.
[0038] Due to different P m and Q n There is a large difference in the update cycle of the model. If the sliding window is directly used to select the training parameters, many parameters will not change within a certain period of time, which wastes computing resources and has little significance for model training. Therefore, in this embodiment, TP is selected. m The LCM is used as the training period port. It should be noted that since the update period of the Internet vulnerability characteristic parameters is much larger than the update period of the industrial control network vulnerability characteristic parameters, only the update period of the In...
Embodiment 2
[0064] It should be noted that there are many Internet vulnerability characteristic parameters, which are easy to obtain. However, in some application scenarios, limited by various factors such as the scale of the industrial control network, it may not be possible to obtain enough characteristic parameters of the industrial control network to train the industrial control network. Vulnerability prediction model. However, since the trend of the outbreak of the same vulnerability in the industrial control network is consistent with the overall trend of the Internet outbreak, there is a correlation. Therefore, based on the correlation between the industrial control network and the Internet vulnerability outbreak, combined with the characteristic parameters of the Internet vulnerability, the probability of the outbreak of the industrial control network vulnerability can be calculated. predict.
[0065] Specifically, the computer program stored in the storage medium includes a secon...
Embodiment 3
[0094] The computer program stored in the storage medium includes a third computer program, and when the processor executes the third computer program, the following steps are implemented:
[0095] Step S300, obtain the text sequence {Str of each sample vulnerability id in the corresponding Summary from the database 1 ,Str 2 ,…}, Str e is the text of the Summary corresponding to the e-th update cycle, and the value of e ranges from 1 to infinity.
[0096] Step S301, when e=1, according to Str e The length of Str is determined e The feature weight w e .
[0097] Through step S301, each Str can be e Set the corresponding initial feature weights.
[0098] Step S302, when e>1, compare Str e-1 and Str e If the text information is completely consistent, then judge z*w e-1 Is it greater than the preset first feature weight threshold w emin , if greater than, set w e =z*w e-1 , where z is the preset weight adjustment coefficient, 0e-1 less than or equal to w emin , then ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com