Dynamic Bayesian game-based advanced persistent threat (APT) attack prediction method

A predictive method and dynamic technology, applied in the field of network security, can solve problems such as reducing system security performance, and achieve the effect of ensuring effectiveness and rationality

Active Publication Date: 2017-08-18
福建中信网安信息科技有限公司
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The general security system is a passive defense system, that is, the corresponding defensive measures are taken after the attack o...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic Bayesian game-based advanced persistent threat (APT) attack prediction method
  • Dynamic Bayesian game-based advanced persistent threat (APT) attack prediction method
  • Dynamic Bayesian game-based advanced persistent threat (APT) attack prediction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Attached below Figure 1-2 , the technical solution of the present invention is described in detail.

[0022] The most critical idea of ​​the present invention is: in the dynamic Bayesian game system, each attacker and defender are rational participants, and do not violate the principle of game equilibrium, that is, they are based on the principle of maximizing their own interests. The benefits of attackers and defenders are used to predict the behaviors that attackers and defenders will take in the next game stage. Each game process will include multiple game stages, and each game stage is a one-time game, that is, after the two parties choose a strategy, they will not change their respective strategies until the end of the game stage.

[0023] Such as figure 1 As shown, the described APT attack prevention method based on dynamic Bayesian game is:

[0024] By viewing the vulnerable points of the network, obtain all possible behavior strategies of attackers and defen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a dynamic Bayesian game-based APT attack prediction method. The game two parities predict the to-be-taken behaviors of the opposite party by the currently obtained information, adopt the solutions by taking the self-interest maximization as the objective, and utilize the Bayesian game equalization to guarantee the prediction validity and rationality. The method of the present invention comprises the steps of checking the vulnerability of a network and obtaining all behavior strategies that an attacker and a defender possibly adopt according to a network topology structure; constructing an APT attack prediction model in a dynamic Bayesian game system, and analyzing the model-based composition of earnings of the game two parties; predicting the probability of the attack behaviors that are selected by the rational attacker at the next game stage by analyzing the earnings of the two parties of the attacker and the defender. The dynamic Bayesian game equalization of the present invention guarantees the prediction validity and rationality.

Description

technical field [0001] The invention relates to the field of network security, in particular to an APT attack prediction method based on dynamic Bayesian game. Background technique [0002] Advanced persistent threat (Advanced Persistent Threat, APT) attack has become a popular form of network attack. Due to its high risk, difficulty in detection, long duration and clear attack target, it has attracted widespread attention from all walks of life in the world. Before launching an attack, an APT needs to accurately collect the business process and target system of the attack target. During the collection process, this attack will actively dig out the vulnerabilities of the trusted system and application of the attacked target, use these vulnerabilities to build the network required by the attacker, and use 0day vulnerabilities to attack. [0003] The general security system is a passive defense system, that is, the corresponding defensive measures are taken after the attack o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/142H04L41/145H04L41/147H04L63/1416
Inventor 何颖沈楚成杨业良吴翠云林锴
Owner 福建中信网安信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products