Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network frangibility correlation analysis method based on gradient attack hypotheses

A correlation analysis and vulnerability technology, applied in the field of network security, can solve problems such as difficult problem solving, intricate vulnerability correlations, difficult task division, etc., to break through large-scale application bottlenecks, avoid circuitous correlation paths, and save computing costs Effect

Inactive Publication Date: 2013-06-26
NAT UNIV OF DEFENSE TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Under the assumption of monotonicity, since the attack has no directionality and the defense has no hierarchy, the vulnerability correlations between nodes in the network environment are intricate, and it is difficult to effectively divide tasks and solve them in parallel
[0012] Under the assumption of monotonicity, any two network nodes may be connected due to the relationship between the vulnerable points on the nodes. Any task division method must carefully handle the inextricable connections between the subtasks. , and the processing of these relationships may be more difficult than the solution of the problem itself, resulting in the more complex the problem is divided

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network frangibility correlation analysis method based on gradient attack hypotheses
  • Network frangibility correlation analysis method based on gradient attack hypotheses
  • Network frangibility correlation analysis method based on gradient attack hypotheses

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to illustrate the technical solutions of the present invention more clearly, several embodiments of the present invention will be introduced below in conjunction with the accompanying drawings. Those of ordinary skill in the art can also obtain other drawings or implementations based on these drawings without creative work, such as obtaining a simplified network scene gradient method and a reverse vulnerability correlation analysis method .

[0040] The following relevant definitions are used in the embodiments of the present invention:

[0041] Definition. The security gradient represents the scale of the security protection hierarchy of the network environment. Network nodes with higher gradients are more important, and network defenders pay more attention to them, and the consequences after being attacked are more serious. On the contrary, attackers will try to attack network nodes with high gradients. The security gradient reflects the level of network def...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network frangibility correlation analysis method based on gradient attack hypotheses, which comprises the network environment gradient and frangibility correlation analysis under a gradient network environment. The network environment gradient comprises network environment sub-network recognition and network environment gradient marking. The frangibility correlation analysis under the gradient network environment comprises a pointer initialization device, a transverse direction frangibility correlation analysis device with the same gradient, a longitudinal directionfrangibility correlation analysis device along the gradient direction, and a loop control device. Under the gradient attack hypotheses, facing a large-scale of complex target network, through the network scene gradient, the parallel partitioning of the network frangibility correlation analysis task is turned to be possible, and the foundation is established for the bottleneck of a large-scale application to break through the network frangibility analysis.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network vulnerability correlation analysis method based on a gradient attack assumption. Background technique [0002] At present, with the rapid development of computer network technology, governments, enterprises, schools, individuals, etc. are connected to the Internet in different ways, and people's production and life are increasingly dependent on the Internet; The neglect of the Internet environment has led to increasingly prominent security issues in the Internet environment. In the Internet environment, there are always various attacks, and the technical means of attacks are becoming more and more sophisticated. Among them, targeted and planned multi-step aggregation attacks are becoming more and more common by taking advantage of the vulnerabilities in the network environment. This makes conventional protective measures impossible to detect. Under the threat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 孙永林张怡王勇军钟求喜张博锋黄遵国马俊春宣蕾庞立会胡欣赵凯任展锐
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products