Network attack path analysis method based on incidence matrixes

A correlation matrix and path analysis technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems that cannot be applied to large-scale networks and cannot guarantee network security

Inactive Publication Date: 2013-08-28
INFORMATION SECURITY METASOFT BEIJING
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The network vulnerability analysis system based on privilege escalation with the above structure can only analyze the vulnerabilities existing in the target network in isolation, and cannot comprehensively analyze the potential threats generated by the interaction of these vulnerabilities, and cannot guarantee the security of the network, especially cannot Applied to large-scale network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack path analysis method based on incidence matrixes
  • Network attack path analysis method based on incidence matrixes
  • Network attack path analysis method based on incidence matrixes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0048] figure 1 It is an overall flow chart of the correlation matrix-based network attack path analysis method of the present invention.

[0049] pass below figure 1 The network attack path analysis method based on the correlation matrix of the present invention is described in detail.

[0050] Step S101, acquiring network topology information.

[0051] Generate a network topology structure based on automatic topology discovery and manual topology editing, and convert the information of the network topology structure into a data table.

[0052] If there are devices A and B in the network system, their structural information can be expressed as a function C, if A and B are physically related, then C(A, B)=1, otherwise, C(A, B)=0.

[0053] Step S102, detecting and obtaining device security threat information based on a single network device.

[0054] By a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network attack path analysis method based on incidence matrixes, which is characterized in that potential attack paths in a network system are acquired by acquiring network topology information, threat information and vulnerability information of devices and interrelation between the threat and the vulnerability, and building incidence matrix models. The method provided by the invention is utilized to greatly improve comprehensive analysis capacity of network risks and effectively ensure safety of network information systems. The method is applied to large-scale network environments.

Description

technical field [0001] The invention relates to a network attack path analysis method, in particular to an association matrix-based network attack path analysis method. Background technique [0002] With the overall acceleration of the process of national economy and social informatization, national economic and social development is increasingly dependent on basic information networks and important information systems. However, the more advanced the performance of network technology, the more complicated the issue of security and confidentiality; The higher the severity, the more prevalent the infohazard phenomenon will be. The flaws, vulnerabilities and threats of the network and information system itself make the operation of the information system objectively have potential risks, especially with the increasingly common network attacks and sabotage and the gradual diversification of attack tools, network threats You can see it almost everywhere. [0003] The traditiona...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/26
Inventor 王元卓
Owner INFORMATION SECURITY METASOFT BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products