Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protocol vulnerability evaluation method and device and storage medium

An evaluation method and vulnerability technology, applied in the field of computer communication, which can solve the problems of difficult automatic detection and identification, lax analysis process, and stuck protocol deduction.

Pending Publication Date: 2022-05-27
CHINA ELECTRONICS CORP 6TH RES INST
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Although the formal analysis method is based on the axiom system and reasoning rules, its analysis process is not strict. At present, some methods have successfully found many security protocol design loopholes, but the existing formal tools are still difficult to realize the vulnerability of the protocol. Automatic detection and identification, most tools require human participation, especially for complex protocols
[0006] In order to solve these problems, ProVerif formal verification tools and AVISPA formal verification tools have abstracted the protocol to a certain extent, so as to support more wireless sessions. In the process, the protocol messages and protocol steps described in the protocol specification 1. The details of the relationship between protocol entities are simplified, causing the protocol deduction to stay at a relatively abstract level, and these details are very important for analyzing the security attributes of the protocol. The lack of detailed description of the protocol specification affects the accuracy of the protocol analysis method Second, because targeted searches cannot be performed, for protocols with complex interactions, the formalized path increases exponentially with the increase in the number of branches, and the coverage rate increases slowly, so the state space explosion problem cannot be avoided

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protocol vulnerability evaluation method and device and storage medium
  • Protocol vulnerability evaluation method and device and storage medium
  • Protocol vulnerability evaluation method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are only It is an embodiment of a part of the application, not an embodiment. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments of the present application, all other embodiments obtained by those skilled in the art without ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a protocol vulnerability evaluation method and device and a storage medium, and is applied to the technical field of computer communication, and the method comprises the steps: constructing a protocol interactive simulation environment according to a data message and an identity authentication mechanism in a target protocol identity authentication process; setting a fuzzy strategy of a fuzzy body by using an attacker model; protocol entity state information generated in the target protocol identity authentication process and a fuzzy strategy of a preset fuzzy body are input into a reinforcement learning model for model training, and an optimized reinforcement learning model is obtained; calculating an average reward value of the optimized reinforcement learning model in different training rounds and a winning probability value of a fuzzy body according to a reward function; and evaluating and analyzing the protocol interaction vulnerability according to the calculated average reward value and the winning probability value. The method has the advantages that the optimized reinforcement learning model is used, the vulnerability of the related protocol of the target identity authentication mechanism can be intelligently recognized, and the method is beneficial to exploring deeper novel protocol vulnerabilities.

Description

technical field [0001] The present application relates to the technical field of computer communication, in particular, to a protocol vulnerability evaluation method, device and storage medium. Background technique [0002] As an important part of the country's key infrastructure, the industrial control system is currently accelerating the development of new technology applications, and the continuous advancement of industrial reforms has led to continuous breakthroughs in industrial Internet technology. Reduced, the current industrial control process and control software mainly focus on functional safety, and based on the relative isolation of IT and OT technologies, in order to meet the real-time and high reliability requirements of industrial control systems, security functions such as identity authentication, transmission encryption, and authorized access It is greatly weakened or even discarded, causing the industrial control system to face great control security risks....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L43/18G06N7/02G06N20/00
CPCH04L43/18G06N7/02G06N20/00H04L63/1433H04L63/08H04L63/1408H04L63/20H04L63/083H04L63/0428
Inventor 董伟冯志吕乐乐李致成赵云飞张雅勤李仕奇兰培霖孟贵民蒋彦钊赵云泽付笑夏泽虹
Owner CHINA ELECTRONICS CORP 6TH RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products