Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security risk evaluation system based on game theory

A risk assessment system and network security technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve problems such as inappropriate subjectivity

Inactive Publication Date: 2012-05-16
BEIHANG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, people can only determine the possibility of threats from some indirect information, educated guesses, intuition or other subjective factors, thus introducing inappropriate subjectivity; on the other hand, the occurrence of attack threats also reflects the The judgment and will of the attacker cannot be completely obtained through objective analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security risk evaluation system based on game theory
  • Network security risk evaluation system based on game theory
  • Network security risk evaluation system based on game theory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0007] The present invention will be further described in detail with reference to the accompanying drawings.

[0008] See figure 1 As shown, the present invention is a network security risk assessment system based on game theory. The system includes a collection unit 1, a predicate logic reasoning unit 2, a game analysis unit 3, and a risk picking unit 4;

[0009] The collection unit 1 uses the first-order logic description method to express the security status of the network system P ro ;

[0010] Network system security status P ro Contains node configuration information Node, node connection information C on , Permission setting information P ri And IDS detection rule information Detect, the mathematical expression of the security status of the network system is P ro (Node, Con, P ri , Detect).

[0011] Among them, the node configuration information Node contains information including operating system OS, vulnerability V, service S, file F, application A, host name Name, host addr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a network safety risk evaluating system based on game theory. The system firstly collects network property data which comprises information of node address, service, application program, software leak, etc. from an evaluated network, describes with a first-order predicate logic, reasons with an XSB reasoning engine based on the description of first-order predicate logic, and obtaining the leak which is on the evaluated network system and can be used by an attacker, and a corresponding attack threat. Aiming at each attack threat, the system according to the invention establishes a game theoretical attack-defense model GTADM and calculates the game equilibrium point. The obtained attack probability is multiplied to the expected damage value of the attack to the attack target for obtaining the attack risk to the system. Thereby the risk level of nodes in the evaluated system is obtained and the security evaluating to the network is realized.

Description

Technical field [0001] The invention relates to a network security risk assessment system, more particularly, to a network security risk assessment system based on game theory. Background technique [0002] Risk assessment in computer network space is an important part of information security risk assessment. Due to the widespread application of networks, this field has been one of the main hotspots of network security research in recent years. A series of methods and frameworks such as Markov chain and uncertainty reasoning have been proposed, but there is currently no widely accepted general method in this field. One of the most important issues is how to quantify the possibility of threats. On the one hand, people can only determine the possibility of a threat from some indirect information, educated guesses, intuition, or other subjective factors, thereby introducing inappropriate subjectivity; on the other hand, the occurrence of an attack threat also reflects The judgment...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
Inventor 夏春和何巍李肖坚王海泉张成吉毅
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products