Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for generating network attack graph

A network attack and attack graph technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve the problems of low expansion performance, large system resource consumption, and high complexity, reducing redundant information and improving generation efficiency. , the effect of reducing system resource consumption

Inactive Publication Date: 2019-01-15
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, a variety of attack graph construction methods have emerged. Through the summary and analysis of the existing methods, it is found that there are two deficiencies in the following two aspects when using the existing methods to construct the attack graph: First, in practical applications, network security managers not only It is necessary to know from which paths the attacker may intrude into the target host, and which hosts in the network the attacker can intrude, but most of the existing attack graph construction methods can only be used to analyze the security of a single attack target
Second, the attack graph construction process has problems such as high complexity, low scalability, and state explosion, which lead to a large consumption of system resources when generating the attack graph, making it difficult to apply to large-scale complex network systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for generating network attack graph
  • Method and system for generating network attack graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The specific embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0043] The present invention provides a method for generating a network attack graph, the flow of the method is as follows figure 1 shown, including:

[0044] Generate multiple subtasks according to the subnet reachability relationship of the power information network;

[0045] Assign multiple sub-tasks to multiple processors for processing, and generate multiple sub-attack graphs;

[0046] According to multiple sub-attack graphs, the initial permissions of the actual attacker, and the permissions obtained during the attack, determine the attack path in which the permission premise of the sub-attack graph is established;

[0047] All attack paths constitute a network attack graph.

[0048] Wherein, the attack path where the authority prerequisite is established refers to a path that matches the attack pattern of the attack rule ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and system for generating a network attack graph. The method includes: generating a plurality of subtasks according to a subnet reachable relationship of a power information network; allocating the plurality of subtasks to multiple processors for processing, and generating a plurality of sub attack graphs; according to the plurality of sub attack graphs, theinitial authority of an actual attacker, and the authority of the actual attacker obtained during an attack process, determining tenable authority premise attack paths in the sub attack graphs; and constituting the network attack graph by all attack paths. Compared with the prior art, the method can express all reachable network states and their corresponding attack paths, decomposes an attack graph generation process into the plurality of subtasks by distributed processing technology, improves attack graph generation efficiency, reduces attack graph redundancy information, reduces system resource consumption when the attack graph is generated, and can be used for evaluating the overall security of a large-scale complex network system.

Description

technical field [0001] The invention belongs to the field of power system network security, and in particular relates to a method and system for generating a network attack graph. Background technique [0002] Since the network is composed of a large number of hosts connected to each other, in network security analysis, there are certain limitations in analyzing the vulnerability of a host in isolation. Only by analyzing the vulnerabilities in the network together can we better discover Potential attacks that may exist on the network. The attack graph technology can correlate the vulnerabilities of each host in the network for in-depth analysis, so as to obtain potential security threats in the network, and display the attack paths that threaten network security in a graph, so that security managers can Intuitively grasp the relationship between the vulnerability of the network. By analyzing all attack paths in the attack graph, security managers can choose the method with...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/14H04L63/1441H04L63/20
Inventor 张涛陈春霖刘莹马媛媛管小娟费稼轩华晔陈璐黄秀丽李尼格李伟伟张明扬周晟傅慧斌汪晨李千目倪震
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More