Supercharge Your Innovation With Domain-Expert AI Agents!

Method for generating network authority hoisting route based on data digging technology

A privilege escalation and data mining technology, applied in the field of network security

Inactive Publication Date: 2009-05-27
SHANGHAI JIAO TONG UNIV
View PDF1 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method still requires the assumption of the initial state of the attacker, so the generated attack graph is only a subset of the set of attack paths in the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating network authority hoisting route based on data digging technology
  • Method for generating network authority hoisting route based on data digging technology
  • Method for generating network authority hoisting route based on data digging technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0027] According to the common network application technology architecture, without loss of generality, adopt figure 2 The network shown in is used as an example. In the example, the application server is responsible for providing enterprise application services. It is directly connected to the database server and connected to client 2 and client 1 via a router; client 1 represents access from external customers, and client 2 represents access from internal The customer's access, the security loopholes in it have been marked in the figure respectively, specifically as figure 2 shown;

[0028] 1. Network vulnerability data preprocessing

[0029] The input of this step is the network security vulnerability information, and the network vulnerability data is output as the network vulnerability data in a given format through preprocessing of the network vulnerability data. Specifically, the network security vulnerabilities in this example have been marked on their respective h...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for generating network authority promoting paths based on the data mining technology in the technical field of network security. The method comprises: firstly, preprocessing network security loophole data, processing network security loophole information, and storing the network security loophole information into a database according to a set format; secondly, managing network connectivity data and using a network connectivity matrix to portray the network connectivity; thirdly, processing the network security loophole data and the network connectivity matrix and generating a utilizable frangible set; and fourthly, utilizing the data mining technology and self-connecting processing of the database to further generate network authority promoting path sets. The method is used for finding out all the potential authority promoting path sets in a network at a time, so as to better reinforce network security and realize network security management.

Description

technical field [0001] The invention relates to a method in the technical field of network security, in particular to a method for generating a network authority promotion path based on data mining technology. Background technique [0002] Existing network vulnerability analysis techniques often need to give the location of the attacker or the protected target, and then generate a network attack graph for analysis. In the existing network vulnerability analysis research, the existing generation methods of network privilege escalation are often studied based on the assumption of the attacker or the assumption of the protection target. Based on the method assumed by the attacker, the host and authority set where the attacker is assumed to be located are taken as method input, and the path, host and authority set that it can infiltrate are generated accordingly; the method based on the assumption of the protection target assumes the target host that needs to be protected Or a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24
Inventor 张保稳银鹰李建华
Owner SHANGHAI JIAO TONG UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More