Network security risk evaluation system based on game theory

A risk assessment system and network security technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve problems such as inappropriate subjectivity

Inactive Publication Date: 2009-04-29
BEIHANG UNIV
View PDF0 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, people can only determine the possibility of threats from some indirect information, educated guesses, intuition or other subjective factors, thus introducing inappropriate subjectivity; on the other hand, the occurrence of attack threats also reflects the The judgment and will of the attacker cannot be completely obtained through objective analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security risk evaluation system based on game theory
  • Network security risk evaluation system based on game theory
  • Network security risk evaluation system based on game theory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0007] The present invention will be further described in detail below in conjunction with the accompanying drawings.

[0008] Referring to shown in Fig. 1, the present invention is a kind of network security risk assessment system based on game theory, and this system includes acquisition unit 1, predicate logic reasoning unit 2, game analysis unit 3, risk picking unit 4;

[0009] The acquisition unit 1 expresses the network system security status P by using the method of first-order word logic description to collect the network information ro ;

[0010] Network system security status P ro Contains node configuration information Node, node connection information C on , permission setting information P ri and IDS detection rule information Detect, the mathematical expression of the network system security status is P ro (Node, Con, P ri , Detect).

[0011] Among them, the node configuration information Node contains information such as operating system OS, vulnerability ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a network safety risk evaluating system based on game theory. The system firstly collects network property data which comprises information of node address, service, application program, software leak, etc. from an evaluated network, describes with a first-order predicate logic, reasons with an XSB reasoning engine based on the description of first-order predicate logic, and obtaining the leak which is on the evaluated network system and can be used by an attacker, and a corresponding attack threat. Aiming at each attack threat, the system according to the invention establishes a game theoretical attack-defense model GTADM and calculates the game equilibrium point. The obtained attack probability is multiplied to the expected damage value of the attack to the attack target for obtaining the attack risk to the system. Thereby the risk level of nodes in the evaluated system is obtained and the security evaluating to the network is realized.

Description

technical field [0001] The present invention relates to a network security risk assessment system, more particularly, a network security risk assessment system based on game theory. Background technique [0002] Risk assessment in computer network space is an important part of information security risk assessment. Due to the widespread application of network, this field has been one of the main hotspots in network security research in recent years. A series of methods and frameworks such as Markov chain and uncertainty reasoning have been proposed, but there is no widely accepted general method in this field. One of the most important issues is how to quantify the likelihood of a threat occurring. On the one hand, people can only determine the possibility of a threat from some indirect information, educated guesses, intuition or other subjective factors, thus introducing inappropriate subjectivity; on the other hand, the occurrence of attack threats also reflects the The j...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
Inventor 夏春和何巍李肖坚王海泉张成吉毅
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products