Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for establishing attack and defense random game model facing malicious code defense

A game model, malicious code technology, applied in the field of network security

Inactive Publication Date: 2018-11-27
BEIJING INST OF COMP TECH & APPL
View PDF8 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] (1) Malware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for establishing attack and defense random game model facing malicious code defense
  • Method for establishing attack and defense random game model facing malicious code defense
  • Method for establishing attack and defense random game model facing malicious code defense

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with examples.

[0023] The present invention is a method for establishing an attack-defense random game model oriented to malicious code defense, comprising:

[0024] 1. Establish a Markov offensive and defensive random game model, including:

[0025] Definition 1 ADSG-M game model, specifically: ADSG-M={N, S, A d ,A a ,P,R d , R a ,U}, the meanings of each element are as follows:

[0026] N={attacker, defender} is the set of participants in the attack-defense game. This embodiment only considers the situation of N=2, that is, the attacker and the defender. If there are multiple malicious softwares attacking at the same time, these softwares are merged as a single attacker, and the attack behavior is regarded as a distributed coordinated attack;

[0027] S={S ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for establishing an attack and defense random game model facing malicious code defense. The method comprises the steps that the Markov attack and defense random game model is established, the defense income and attack income are calculated, and based on an ADSG-M game model, an attack and defense strategy is selected, and an optimal attack and defense strategy is solved. According to the method for establishing the attack and defense random game model facing malicious code defense, a background is detected according to malicious software. According to the method for establishing the attack and defense random game model facing malicious code defense, the thought of the game theory is applied to attack and defense of the malicious software, and a new method is provided for research of solving the problems of attack and defense contradiction of network security, the optimal attack and defense decision of network security and the like.

Description

technical field [0001] The invention belongs to the technical field of network security, and proposes a method for establishing an attack-defense random game model facing malicious code defense. Background technique [0002] (1) Malware [0003] Malicious software definition: software with one or more dangerous behaviors, through the combination or superposition of these dangerous behaviors, finally achieves the purpose of destroying the system, stealing system user information, and monitoring user actions, such as computer viruses, worms, Trojan horses, spyware, rogues software etc. [0004] Currently common malware behavior analysis methods include static analysis methods and dynamic analysis methods. [0005] (2) Offensive and defensive game [0006] In the network attack and defense environment, attackers hope to use malware to destroy the function or service quality of the target system to obtain maximum benefits; defenders hope to maintain system availability while ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
CPCG06F21/55
Inventor 郭敏石波吴朝雄查尤平于冰温泉
Owner BEIJING INST OF COMP TECH & APPL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products