Optimal protection policy analysis system and method based on improved ant colony algorithm

A technology of protection strategy and ant colony algorithm, which is applied in transmission systems, digital transmission systems, electrical components, etc., can solve the problems of complex multi-step, huge cost, and difficulty for protection personnel to determine the attacker's attack path and target node, etc., to achieve The effect of reducing cybersecurity risk

Inactive Publication Date: 2017-12-29
NORTHWEST UNIV
View PDF5 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The current difficulty in researching such security incidents lies in the complex multi-step nature of the attack process. One-step attacks in the intrusion process may not be intercepted by firewalls or IDS intrusion detection systems. When security personnel detect the intrusion, the system permissions may have been blocked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Optimal protection policy analysis system and method based on improved ant colony algorithm
  • Optimal protection policy analysis system and method based on improved ant colony algorithm
  • Optimal protection policy analysis system and method based on improved ant colony algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but is not limited thereto.

[0072] The present invention involves knowledge related to graph theory and Bayesian belief network, and explains the relevant content:

[0073] The probabilistic attack graph includes 7 kinds of influencing factors, including attribute node set S, atomic attack node set A, directed edge set E of the attack graph, relationship set ε between a node and its parent node set, conditional probability distribution T, and protection strategy set M , The cost set C of the defense strategy.

[0074] The probabilistic attack graph is a directed acyclic graph, expressed as BPAG=(S, A, E, ε, T, M, C).

[0075] The attribute node set S uses Bernoulli random variables to represent the resources and permissions owned by the intruder during the intrusion process, and the value space is {0, 1}. Attribute nodes are divide...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an optimal protection policy analysis system and method based on an improved ant colony algorithm. The system comprises a network risk assessment subsystem, an attack path prediction subsystem and a security policy management subsystem. The method comprises the following steps: 1) importing a Bayesian probabilistic model to describe the complex relationship between multiple steps of atomic attacks, and constructing an attack diagram by using the Bayesian belief network to evaluate a network security risk; 2) simulating a decision making process of an attacker in combination with the quantitative indexes of the protection cost and the gain, and predicting a possible attack path; and 3) using the improved ant colony algorithm capable of calculating the quasi-optimal solution within a polynomial time to solve the security policy selection problem on the attack path. By adoption of the optimal protection policy analysis system and method, a risk solution can be provided for a network security administrator in time, the attack path prediction and protection strategy selection problems in network security protection are solved, and the security of the whole network under the condition of limited protection resources is effectively protected.

Description

technical field [0001] The invention belongs to the field of computer network security protection, and in particular relates to an optimal protection strategy analysis system and method based on an improved ant colony algorithm. Background technique [0002] With the development of information technology, the connection between the virtual network world and the real world is becoming more and more close. The Internet is widely used in all walks of life. More and more personal information is controlled by Internet companies and even malicious people. The frequency and influence of security incidents are increasing. In this context, the security of network environment becomes more and more important. The essence of security incidents is that there are defects in the design and implementation of hardware, software, and even protocols in the network system. Malicious people take advantage of these flaws to launch attacks and gain permissions in the system, thereby obtaining va...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/142H04L63/1408H04L63/20
Inventor 高岭王帆毛勇张晓孙骞郑杰王海
Owner NORTHWEST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products