Network safety optimum attacking and defending decision method for attacking and defending game

A network security, offensive and defensive game technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as unreasonable defense, and achieve the effect of maximizing, realizing revenue, and simplifying calculation.

Active Publication Date: 2013-06-12
BANK OF BEIJING CONSUMER FINANCE CO
View PDF3 Cites 67 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] An ideal defense system should protect against all vulnerabilities and attacks. However, considering the actual situation such as organizational resource constraints, "at all costs" defense is obviously

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network safety optimum attacking and defending decision method for attacking and defending game
  • Network safety optimum attacking and defending decision method for attacking and defending game
  • Network safety optimum attacking and defending decision method for attacking and defending game

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0030] The present invention will be further described below in conjunction with the drawings and embodiments.

[0031] Such as figure 1 As shown, a network security optimal offensive and defensive decision-making method based on offensive and defensive games, the specific method steps are as follows:

[0032] The first step is to construct a reachable matrix based on the connectivity of all host nodes in the network topology.

[0033] The second step is to use the vulnerability scanning tools Nessus, ISS and SARA to scan each host node in the network to obtain the vulnerability set of each host node.

[0034] The third step is to construct a state attack and defense graph based on the vulnerability set of each host node and the utilization rules of each vulnerability. The state attack and defense diagram is a state transition system diagram ;among them, It is the state node set in the figure, which represents the network security state; It is the edge set in the graph, which repre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network safety attacking and defending method for a state attacking and defending map model, and belongs to the technical field of network safety attacking and defending. The method comprises the following steps of modeling an attacking and defending scene of a network system by a state attacking and defending map, then calculating the cost and income of atomic attacking, further calculating utility matrixes of different attacking and defending strategies adopted by an attacking party and a defending party under different network safety states, and finally solving a Mash balance on the basis of a non-cooperated type non-zero-sum game model, so as to obtain an optimum attacking and defending strategy. The method has the significant advantages that 1, the attacking scene is modeled by the state attacking and defending map, and the attacking and defending strategies of the network system under different network safety states are visually and clearly described; 2, the calculation of the cost and income of the attacking and defending is converted into the calculation of the attacking and defending success probability and the hazard index, and the calculation of the attacking and defending utilities is simplified; and 3, in the attacking and defending process of the network system, the costs and the incomes of the attacking party and the defending party are considered, the rational decision is made for a network management person, and the maximum income is realized for the network management.

Description

technical field [0001] The invention relates to the technical field of network security defense, in particular to an optimal attack and defense decision-making method for network security in an attack and defense game. Background technique [0002] At present, with the rapid development of network technology and the continuous increase of network scale, there are more and more security incidents related to the network, such as attacks and intrusions. In order to ensure the security and robustness of network systems, governments and enterprises around the world have invested a lot of money in building network security defense systems. The existing network security defense system deploys a large number of firewalls, intrusion detection and anti-virus software to detect the vulnerability and weak links of each node in the network system, so as to ensure the security of the network system to the greatest extent. [0003] An ideal defense system should protect against all vulner...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
Inventor 李千目刘刚申明磊姚晓莲戚湧侯君
Owner BANK OF BEIJING CONSUMER FINANCE CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products