Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

54 results about "Moving target defense" patented technology

A two-layer defense method against spurious data injection attack in power system

The invention discloses a two-layer defense method for false data injection attack in a power system, comprising a two-layer defense strategy. The first layer adopts moving target defense to defend the false data injection attack from the source, and the second layer adopts Kalman filter state estimation method to eliminate the false data injection attack after moving target defense. The inventionadopts a double-layer defense strategy, which makes up for the deficiency of using only the moving target defense, so as to maintain the normal operation of the electric power system.
Owner:GUANGDONG UNIV OF TECH

Active defense method based on path and IP address hopping in SDN network

The invention discloses an active defense method based on path and address hopping in an SDN network, and belongs to the field of mobile target defense. The method comprises the following steps: S1, asource host sending a data packet to a first switch; S2, judging whether the data packet is successfully matched with the flow table item or not, if yes, forwarding the data packet to a next hop switch, and entering a step S5; otherwise, the switch sending the Packet-In message to the controller, and executing the step S3; S3, the controller selecting a data packet transmission path and a virtualIP at the same time; S4, the controller generating a flow table rule according to the selected transmission path and the virtual IP, and issuing a flow table and a reverse flow table to each switch;and S5, judging whether the switch is a final switch or not, if yes, sending the data packet to a target host, and otherwise, entering the step S2. By utilizing the separation characteristic of the SDN network data layer and the control layer and the idea of active operation change in the MTD, the IP and the transmission path of the data packet are changed on the premise of not influencing the normal communication of the network, and the difficulty of an attacker in acquiring information is increased, so that the active defense capability of the system is improved.
Owner:HUAZHONG UNIV OF SCI & TECH +1

Unknown threat-oriented dynamic network change decision method and system

The invention relates to the technical field of network security, and in particular relates to an unknown threat-oriented dynamic network change decision method and system. The method comprises the steps of: constructing the type space of a player according to the current network state; judging the type of the opposite side by the player according to the prior belief, and obtaining a selectable offensive and defensive strategy set according to the type; obtaining the system state transition probability according to the network state and the offensive and defensive strategy set; obtaining earnings of both offensive and defensive game sides for the selected offensive and defensive strategy, and, in combination with the system state transition probability, constructing a moving target defencemodel based on an incomplete information Markov game; and equivalently converting the solution of the moving target defence model into a target function, so that the optimal moving target defence strategy is obtained. By means of the unknown threat-oriented dynamic network change decision method and system in the invention, the unknown threat-oriented optimal defence strategy can be selected based on limited network resources; and thus, the technical effect that the network performance overhead and MTD defence earnings are balanced can be realized.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Mobile target defense decision selection method, device and system based on Markov time game

The invention belongs to the technical field of network security, and particularly relates to a moving target defense decision selection method, device and system based on a Markov time game, and themethod comprises the steps: building a moving target attack and defense strategy set; analyzing a moving target defense process based on the Markov time game, and constructing a Markov time game moving target defense model; and carrying out equilibrium solution on the Markov time game moving target defense model, and determining an optimal strategy in the confrontation process of the Markov time game moving target defense model. On the basis of analyzing a moving target attack and defense process, a Markov time game model is constructed, a target criterion function of a moving target defense game is designed based on discount total revenue, and multi-stage attack and defense game quantitative analysis is realized; designing a multi-stage optimal defense strategy selection algorithm based on nonlinear programming multi-stage game equilibrium calculation; further, experimental research results show that the confrontation process can be effectively described, the optimal strategy can be correctly selected, the implementation accuracy of moving target defense can be ensured, and network security management personnel can be helped to make a better decision.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Moving Target Defense for Distributed Systems

InactiveUS20180332073A1Maximizing costMinimizing probability of successfulProgram initiation/switchingTransmissionOperational systemRobin Sequence
An apparatus and method defends against computer attacks by destroying virtual machines on a schedule of destruction in which virtual machines are destroyed in either a random sequence or a round-robin sequence with wait times between the destruction of the virtual machines. Also, each virtual machine is assigned a lifetime and is destroyed at the end of its lifetime, if not earlier destroyed. Destroyed virtual machines are reincarnated by providing a substitute virtual machine and, if needed, transferring the state to the substitute virtual machine. User applications are migrated from the destroyed machine to the replacement machine. All virtual machines are monitored for an attack at a hypervisor level of cloud software using Virtual Machine Introspection, and if an attack is detected, the attacked virtual machine is destroyed and reincarnated ahead of schedule to create a new replacement machine on a different hardware platform using a different operating system.
Owner:GOVERNMENT OF THE UNITED STATES AS REPRESENTED BY THE SEC OF THE AIR FORCE

Decision method for dynamic network transformation under full information conditions and system thereof

InactiveCN109379322AEfficient analysisAccurately describe the offensive and defensive confrontation processData switching networksAttack strategyData mining
The invention belongs to the technical field of network safety and specifically relates to a decision method for dynamic network transformation under full information conditions and a system thereof.The decision method comprises the following steps: obtaining state transition probability according to the network state, an attack strategy and a defense strategy; using a game theory to describe gains of both sides of the offensive and defensive game during moving target defense; constructing a moving target defense model based on a Markov game in combination with the state transition probability; transforming the solution of the moving target defense model into an equivalent of a target function and obtaining an optimal moving target defense strategy. According to the method and the systemin the invention, the moving target defense model based on the Markov game is constructed according to the state transition probability and both the sides of the offensive and defensive game; furthermore, the optimal moving target defense strategy is obtained by solving so as to realize balance of network performance overheads and moving target defense gains and solve the technical problem of howto select the optimal defense strategy based on limited network resources.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

SCIT-based mobile target defensive system

The invention belongs to the technical field of internets, and discloses a SCIT-based mobile target defensive system. The system comprises a back-end server group, a data distribution module, a central control module, a cleaning module, an auditing module and an information sharing module; the central control module controls the data distribution module to forward an access request of a user to a server in the running state in the back-end server group to process, after a period of time, the central processor selects a clean server from the server group in a ready state according to a scheduling algorithm when the switching time arrives, the state of the clean server is switched to the running state, and the central processor notifies the data distribution module to forward the request from the user to the new server in the running state, and the primary server enters an offline cleaning state. The technical scheme disclosed by the invention is based on the switching and cleaning of the server, the critical infrastructure servers are mechanized to improve the security through the introduction of the diversity of the software and the randomness and the unpredictability of the system.
Owner:ANHUI XINHUA UNIV

Moving target defense response method guided by economic and security requirements

The invention discloses a moving target defense response method guided by economic and security requirements. The method is characterized in that the method comprises the steps of S01 collecting maindata of a system; S02 preprocessing the acquired data; S03 detecting the required action quantity; S04 periodically working; S05 carrying out an initial action strategy; S06 checking a detection strategy; S07 detecting attack quantity; S08 carrying out a safety plan; S09 generating a defense strategy; S10 carrying out power grid operation constraint detection; S11 implementing a strategy; and S12carrying out attack quantity detection. According to the method, the security requirement is added into periodic power flow adjustment of the D-FACTS equipment due to the economic requirement of thepower grid; under the condition that the operation state of the power grid is not influenced, line parameters related to fragile nodes are properly changed to detect bad data; when abnormal data are detected, the D-FACTS equipment is enabled to enter a more comprehensive and larger-amplitude response state according to the safety plan; and whether FDI attacks exist in the system can be rapidly andeffectively judged on the premise of ensuring economy.
Owner:STATE GRID SHAANXI ELECTRIC POWER RES INST +2

Method for selecting moving target defense optimal strategy based on DS evidence reasoning

ActiveCN110166437AReasonable defense success rateDefense success rate increasedData switching networksEvidence reasoningDecision table
The invention discloses a method for selecting a moving target defense optimal strategy based on DS evidence reasoning. The method comprises the following steps: establishing an attack and defense game model; enabling an attacker to select an attack strategy; enabling a defender to observe the attack strategy, and enabling the attacker and the defender to calculate benefits; refining Bayesian equilibrium solution to obtain an optimal defense strategy; and enabling the defender to correct the type posterior probability of the attacker through DS evidence reasoning. The establishment of the attack and defense game model comprises the steps of defining the attack and defense game model; defining attack and defense revenue quantification. The income calculation step of the attacker and the defender comprises the steps that the defender calculates a posterior probability according to an observed attack strategy; the attacking and defending parties calculate respective revenues; an attack type reasoning decision table is formed according to the characteristic attributes of the previous attack records; and a basic probability assignment of the attack evidence is determined according to the decision table. According to the method, the defect of the prior probability in the existing model is overcome, the profit of the defense strategy is more reasonable, and the defense success rate ofthe early stage of the system is improved.
Owner:HANGZHOU DIANZI UNIV

Moving target defense dynamic response strategy generation method based on abnormal traffic

ActiveCN111162531ALittle impact on operationTroubleshoot Dynamic Response StrategiesAc network circuit arrangementsData acquisitionPower grid
The invention provides a moving target defense dynamic response strategy generation method based on abnormal flow, and the method is specifically characterized in that the method comprises the steps:S01, data collection; S02, data processing; S03, node state estimation; S04, abnormal node detection; S05, inputting abnormal node data; S06, calculation of the adjustment capability of each line fordifferent nodes; S07, generation of a defense strategy; S08, checking of the defense strategy for the first time; S09, secondary inspection on the defense strategy; and S10, defense strategy output. For FDI attack, the detection capability of each line on abnormal data of different nodes is analyzed after deploying flexible alternating current transmission equipment (D-FACTS) equipment, accordingto the method, the real-time abnormal condition of the node flow is taken as the configuration weight of the detection capability, the dynamic configuration strategy which has the strongest detectioncapability on the current abnormal flow node data and has the minimum FACTS adjustment on the power grid operation is constructed, and the problem of the dynamic response strategy when the MTD technology is used for detecting the FDI attack is solved.
Owner:STATE GRID SHAANXI ELECTRIC POWER RES INST +2

Communication method, device and equipment and storage medium

One or more embodiments of the invention provide a communication method, device and equipment, and a storage medium. The method comprises the steps of receiving an online broadcast packet sent by a newly online first flying autumn user in a local area network; wherein the local area network is a local area network based on mobile target defense; establishing connection between the first flying autumn user and a second flying autumn user logged in the local area network based on the online broadcast packet and a preset broadcast packet forwarding rule; and forwarding the communication message between the first flying autumn user and the second flying autumn user to realize communication between the first flying autumn user and the second flying autumn user; according to broadcast packets forwarding rules, sending the online broadcast packet of the first flying autumn user to other logged-in flying autumn users in the local area network to establish connection between the flying autumn users in the local area network based on the mobile target defense, and finally realizing communication between the flying autumn users, so that the local area network based on the mobile target defense can be compatible with local area network communication software.
Owner:BEIJING UNIV OF POSTS & TELECOMM +1

Network security dynamic defense decision-making method based on space-time game

ActiveCN112003854AImprove targetingImprove continuous decision-making abilityMachine learningTransmissionSimulationNetwork attack
The invention belongs to the technical field of network security, and relates to a network security dynamic defense decision-making method based on space-time game. The network security dynamic defense decision-making method comprises the steps of: constructing a multi-dimensional transformation moving target defense model according to network attack and defense dynamic space-time confrontation characteristics, wherein an attack party and a defense party in the multi-dimensional transformation moving target defense model are jointly determined by a detection surface, an attack surface and a detection surface through a network surface for implementing attack and defense strategy control; according to the multi-dimensional transformation moving target defense model, analyzing an attack and defense game process and describing a moving target defense security state evolution process; analyzing a continuous network attack and defense process by utilizing differential game, and constructinga moving target defense space-time decision-making model; and for the moving target defense space-time decision-making model, determining an optimal space-time defense strategy by quantifying attack and defense benefits and solving a saddle point equalization strategy. Based on the game model, the defense decision considering a space strategy and a time strategy is realized, the pertinence and timeliness of the network security defense decision are enhanced, and the network security defense efficiency is improved.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products