Network safety evaluation method based on attack-defense utility

A network security evaluation and utility technology, applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problems of lack of evaluation index system, accurate measurement index value, etc.

Active Publication Date: 2017-12-08
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Aiming at the problem that the measurement and evaluation of the current network services and applications is still in a state of rough comparison, lack of evalua

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network safety evaluation method based on attack-defense utility
  • Network safety evaluation method based on attack-defense utility
  • Network safety evaluation method based on attack-defense utility

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] The present invention will be further elaborated below in conjunction with the accompanying drawings and specific embodiments.

[0081] At first the technical terms used in the present invention are explained:

[0082] Network system: If the various objects of the network are set to a non-empty set A, and A satisfies

[0083] (1) A contains at least two different elements;

[0084] (2) The elements in A are related to each other in a certain way;

[0085] Then A is called a network system, and the elements of A are the components of the network system.

[0086] Behavior: Behavior refers to the homeomorphic transformation from one cover to another cover on the scene differential manifold;

[0087] Behavior path: Behavior path refers to a directed curve that connects the start and end points of behavior transformation and is smooth segment by segment.

[0088] Behavior paths have the following properties.

[0089] 1. Parallel movement of points The movement of any po...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Aiming at a problem that measurement and evaluation of network service and application are currently in a rough comparison state and evaluation indicator systems and accurate measurement index values are unavailable, the invention discloses a network safety evaluation method based on attack-defense utility. The method includes steps of 1, determining scene differential manifold; 2, calculating a behavior path; 3, calculating behavior utility; 4, performing network attach-defense evaluation based on behavior utility.

Description

technical field [0001] The invention relates to a network security assessment method based on attack-defense confrontation utility, belonging to the technical field of network assessment. Background technique [0002] To accurately evaluate a system or program, the key is to objectively establish an evaluation index system and accurately measure index values. Utility is a basic measurement index to characterize the performance of a system or program, and is widely used in the evaluation of various systems or programs at all levels. In general physical systems, utility is represented as an "energy" characteristic. Using some basic physical quantities, according to the physical mechanism, it can be accurately combined and calculated. , it is difficult to accurately describe its utility. Generally speaking, the evaluation of such systems can only be carried out on the basis of rough comparative calculations. [0003] The network is a virtual space that supports the execution ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/142H04L63/20
Inventor 胡昌振单纯喻梓峻赵小林刘丽媛
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products