Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attack surface modeling method and device for redundant information system

A technology of redundant information and modeling methods, applied in the field of network security, can solve the problems of being unable to fully and effectively adapt to redundant complex structural systems, and unable to effectively measure the security of redundant complex structural systems.

Active Publication Date: 2018-11-23
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU +2
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the current attack surface model is only suitable for the security measurement of single-redundancy information systems, and cannot effectively measure the security of redundant complex structural systems.
Although Manadhata once proposed the concept of attack surface transfer for moving target defense technology, it still cannot fully and effectively adapt to redundant complex structural systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack surface modeling method and device for redundant information system
  • Attack surface modeling method and device for redundant information system
  • Attack surface modeling method and device for redundant information system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0038] The embodiment of the present application is applied to the attack surface modeling of the Web application information system using the dissimilarity redundancy technology. The Web application provides the function of uploading files, and the name of the uploaded file will be encrypted and stored in the database. There are PHP file upload vulnerabilities and SQL injection vulnerabilities in the application. In the embodiment of this application, the attack surface modeling of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attack surface modeling method and device for a redundant information system, which is applied to the redundant information system. The redundant information system consistsof multiple sub-systems with equivalent functions. The method comprises the steps of identifying an attack surface resource of each sub-system in the redundant information system, performing attack surface modeling on each sub-system, determining attack cost-effective ratio of each attack surface resource according to security threat degree and use difficulty of each attack surface resource, analyzing a behavior operation of an attack surface of sub-systems in the redundant information system according to a structure characteristic of the redundant information system, executing the attack surface behavior operation in the redundant information system, then determining the overall attack surface of the redundant information system, and delivering a corresponding measurement result according to attack cost-effective ratio of each attack surface resource and the overall attack surface of the redundant information system. Through adoption of the method, security of the redundant information system with complex structure can be measured, and the information system is safer.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to an attack surface modeling method and device suitable for redundant information systems. Background technique [0002] With the improvement of the degree of social informatization, the impact of cyberspace security issues on economy, politics and people's livelihood is becoming more and more serious. In particular, in recent years, major cyberspace security incidents caused by information leakage have occurred frequently, making how to ensure the security of information systems has become a hot issue in cyberspace that needs to be resolved urgently. Effective evaluation of information system security is a direct way to measure, enhance or improve information system security. Therefore, the evaluation of information system security is of great significance for improving the ecological environment of cyberspace. [0003] As an important indicator to measure sys...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1433H04L63/20
Inventor 张铮王立群邬江兴王晓梅李卫超
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products