Security assessment method based on alarm information
A technology for alarm information and security assessment, applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problems of high false alarm rate, low accuracy rate, and chaotic attack scene reconstruction in intrusion detection systems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] 1. Use an acyclic directed graph to represent the reconstructed attack scenario. The generation of the attack scene graph is divided into three steps.
[0043] 1) Generate a set of initial attack scenario graphs based on the premise set and consequence set of the super-alarm type.
[0044] 2) For each attack scenario graph in the initial attack scenario graph, calculate the evidence support of each node (attack step) in it to eliminate possible false alarms.
[0045] 2. Elimination of false positive nodes in attack scenario graph G
[0046] 1) Calculate the alarm credibility C for each node in the attack scenario graph G r , Consider all C r ≤ε (ε is a minimum value set by the administrator, indicating that an alarm with an alarm credibility less than or equal to ε can be regarded as a false alarm, the same below).
[0047] 2) Eliminate no forward node and alarm credibility C r Nodes ≤ε
[0048] 3) Eliminate no backward nodes and alarm credibility C r Nodes ≤ε
[0049] 4) For the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 