Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

APT defense method based on game system

A system and defender technology, applied in the field of network security, can solve problems such as inefficiency

Active Publication Date: 2017-09-08
福建中信网安信息科技有限公司
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Based on the inherent game nature of the network attack and defense parties, the best countermeasures can be obtained according to the Nash equilibrium strategy, which can effectively solve the inefficiency caused by the manual intervention of traditional intrusion detection systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • APT defense method based on game system
  • APT defense method based on game system
  • APT defense method based on game system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Attached below Figure 1-2 , the technical solution of the present invention is described in detail.

[0047] The key idea of ​​the present invention is: in the game system, the goal of the attacker is to find the optimal attack strategy, so as to achieve the purpose of minimizing the cost and maximizing the benefit; while the goal of the defender is also to find the optimal defense strategy, so as to This reduces the attacker's profit. Assume that each attacker is a rational attacker, that is, always make an attack strategy to maximize the revenue, and the game process is a one-time game, that is, after the two parties choose a strategy, they will not change their respective strategies until the game The process is over.

[0048] Such as figure 1As shown, the described APT defense method based on the game system is:

[0049] View the vulnerable points of the network, and obtain all the attack strategies that the attacker may adopt through the network topology;

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an APT defense method based on a game system. The optimal response measure can be obtained according to the Nash equilibrium strategy, and the low efficiency caused by manual intervention on the detection of the traditional invasion system can be effectively solved. The APT defense method provided by the invention comprises the following steps: checking a fragile point of a network, and obtaining all possible attack strategies of an attacker according to a network topology structure; calculating an attacker benefit in the game system according to factors affecting the attacker benefit; calculating a defender benefit according to the factors affecting the attacker benefit; and obtaining the maximum defender benefit under the premise of Nash equilibrium.

Description

technical field [0001] The invention relates to the field of network security, in particular to an APT defense method based on a game system. Background technique [0002] With the continuous expansion of the network scale and the continuous complexity of the network structure, network security issues have attracted global attention, and a large number of network attacks have brought devastating damage to the country's politics and business. Advanced persistent threat (Advanced Persistent Threat, APT) attacks have become a hot topic of network attacks recently. It usually uses a step-by-step infiltration strategy to covertly attack each specific target. [0003] Nowadays, game theory has been widely used in network intrusion detection. In the game process, each decision maker will choose the most beneficial strategy for himself, and his own interests are affected by the strategies of other decision makers. A Nash equilibrium is a combination of strategies such that each dec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441H04L63/145H04L63/1458H04L63/1466
Inventor 何颖沈楚成杨业良吴翠云林锴
Owner 福建中信网安信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products