Attack tree-based intelligent network connection vehicle information security event occurrence probability evaluation method and system

A technology for the occurrence of probability and security events, applied in computer security devices, instruments, electrical digital data processing, etc.

Inactive Publication Date: 2019-01-01
BEIHANG UNIV
View PDF1 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the problems in the existing evaluation methods, the present invention provides...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack tree-based intelligent network connection vehicle information security event occurrence probability evaluation method and system
  • Attack tree-based intelligent network connection vehicle information security event occurrence probability evaluation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0039] Such as figure 1 As shown, the embodiment of the present invention provides an attack tree-based method for evaluating the probability of occurrence of information security incidents of intelligent networked vehicles. In this method, the attack tree analysis method is used to calculate the probability of occurrence of information system security incidents for the service cases of intelligent networked vehicles. , analyze the attack sequence of the attack tree, and use the multi-attribute utility theory to calculate the probability of the root node and each attack sequence being subjected to information attack risks, reveal the most risky attack path in the system attack tree, and determine the most risky attack path when formulating protection measures for the system. Attacks that should be prevented. The steps to assess the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intelligent network connection vehicle information security event occurrence probability evaluation method based on attack tree, in this method, the attack tree analysis method is used to calculate the probability of security events in the intelligent network vehicle information system, the attack sequence of attack tree is analyzed, and the probability of the root nodeand each attack sequence being attacked by information is calculated by using multi-attribute utility theory, which reveals the most risky attack path in the attack tree, so as to determine the attackmode that should be most prevented when the protective measures are made for the system. The method for evaluating the occurrence probability of the information security event adopted by the invention is suitable for evaluating the occurrence probability of the security event of the vehicle service case of the intelligent network connection.

Description

technical field [0001] The invention relates to a method and system for evaluating the probability of occurrence of security events, in particular to a method and system for evaluating the probability of occurrence of security events based on attack trees in an intelligent networked vehicle business use case. Background technique [0002] In the field of information security risk management, due to the complex characteristics of information security events such as uncertainty and dynamics, it is difficult to evaluate the probability of occurrence. There are many research contents in this area, but risk matrix method, fuzzy evaluation method, analytic hierarchy process, and evaluation methods based on relevant information security evaluation standards are mostly qualitative evaluations with strong subjective factors; expert system evaluation methods require Relying on a large amount of historical data, the investment period is long, and the system portability is not good; the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/034
Inventor 秦洪懋王颖会王云鹏李宏刚于海洋高哈尔·达吾力
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products