Method for solving K maximum probability attack paths progressively
An attack path and maximum probability technology, which is applied in the field of network security analysis, can solve problems such as inability to guarantee the timeliness of attack paths, inability to calculate, waste of computing resources and computing time, etc., and achieve the effect of solving real-time computation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] In order to make the technical means, creative features and objectives of the present invention easy to understand, the present invention is further described below in conjunction with specific embodiments.
[0041] Network topology diagram such as figure 2 As shown, node H represents the attacker, nodes A, B, C and D represent the nodes in a given network system, and the directed arrows between the nodes represent the access relationship between the nodes. The access relationship is as follows: image 3 As shown, starting from the second line, each line represents a set of nodes that a node can access, "√" means direct access, "X" means no direct access, for example, the second line means that the attacker can directly access Point A, but cannot directly access nodes B, C, and D. The third line indicates that node A can directly access nodes A, B, and C, but cannot directly access node D. Similarly, access between other nodes see relationship image 3 . In this emb...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


