Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security test generation method based on knowledge graph

A knowledge graph, network security technology, applied in the field of network security test generation, can solve problems such as inefficiency, inefficiency, inability to correlate experience and knowledge, and achieve the effect of improving integrity and efficiency

Pending Publication Date: 2022-03-29
中国人民解放军63891部队
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, traditional security testing largely relies on personal experience and knowledge, and cannot be associated with other existing experience and knowledge.
Due to the limited knowledge utilized in this method, there will be problems such as incomplete testing, low efficiency, and the inability to realize automated intelligent construction.
At the same time, the traditional network security protection scheme is implemented by each organization independently with a vertical protection mechanism, which is becoming more and more inefficient in dealing with these complex network attacks. It is urgent to adopt new technical means to improve the overall network security protection capabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security test generation method based on knowledge graph
  • Network security test generation method based on knowledge graph
  • Network security test generation method based on knowledge graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] like figure 1 , 2 As shown in , 3, a generation method of network security testing based on knowledge graph, firstly, the ontology framework related to asset model, vulnerability point model and attack technology model in the field of security testing is designed; then, the historical data of network security is extracted, A graph database is used to build a network security test knowledge graph; finally, a method for generating a network security test based on a knowledge graph is proposed, which includes the following detailed steps:

[0081] Step 1. Construction of security test knowledge map ontology framework

[0082]The ontology in the field of cyberspace security is the semantic basis of the knowledge graph. It is mainly composed of entities, relationships between entities, and attributes of entities and relationships. It can be used to organize, represent, and share knowledge related to network security. For the field of security testing, build a network secur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of network security testing, and discloses a knowledge graph-based network security testing generation method, which comprises the following steps of: firstly, designing a mutual association ontology framework of a security testing field asset model, a vulnerability model and an attack technology model; secondly, extracting network security historical data, and constructing a network security test knowledge graph by using a graph database; and finally, generating a network security test based on the knowledge graph. According to the method, the penetration test in the security test can be represented by the attack model, attack activities, vulnerabilities, attack stages and the like are associated, historical attack test data can be fully utilized, a security test scheme can be generated through intelligent recommendation, and intelligent retrieval and automatic reasoning association of knowledge are realized. And the integrity and the high efficiency of the network security test are greatly improved.

Description

technical field [0001] The invention belongs to the technical field of network security testing, and in particular relates to a method for generating network security testing based on knowledge graphs. Background technique [0002] With the increasingly intensified game of network attack and defense confrontation, network attack methods and attack methods are characterized by diversity and complexity, network security threats are becoming more and more common and persistent, and it is becoming more and more convenient for attackers to obtain attack tools , leading to a significant reduction in the cost of network attacks, but the difficulty of detecting network attacks is increasing. Security testing mainly uses methods such as network asset identification, vulnerability scanning, and penetration testing to discover potential security risks in network assets in terms of confidentiality, integrity, and availability, and to take targeted preventive measures to prevent network ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40G06F16/36G06F16/901G06F16/951G06F40/295
CPCH04L63/1433H04L63/1441H04L63/30G06F16/367G06F16/9024G06F16/951G06F40/295
Inventor 苗泉强刘迎龙郭荣华袁学军王震吴迪郝亮宋胜利石长安赵亚新
Owner 中国人民解放军63891部队
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products