Space-ground integrated network security state analysis method based on finite state machine

A finite state machine and network security technology, applied to electrical components, transmission systems, etc., can solve problems such as real-time analysis difficulties, and achieve the effect of reducing false positives and false positives

Active Publication Date: 2019-03-01
NAT UNIV OF DEFENSE TECH
View PDF6 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These characteristics make rea

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Space-ground integrated network security state analysis method based on finite state machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The method for analyzing the security state of the space-ground integration network based on the finite state machine of the present invention first constructs the knowledge map of the space-ground integration network before starting the analysis:

[0033] Step 1: Build an ontology in the field of network security,

[0034] Ontology models include: attack, event, gateway, satellite, vulnerability, operating system, application software, process, registry, and file. In the field of network security, ontology refers to the shared concept of network security situational element knowledge. These conceptual attributes and the relationship between concepts are then guided by the principle of ontology to construct a network security knowledge map;

[0035] Step 2: Construct the knowledge graph of the space-earth integration network. The model of the knowledge graph includes concepts, instances, attributes, relationships, and rules. Examples are specific examples of concepts, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims to provide a space-ground integrated network security state analysis method based on a finite state machine. Based on the uniqueness of the space-ground integrated network, the actual deployment situation of a security processing module of the space-ground integrated network, and the actual demand design of a control system, the method effectively analyzes the current attack status corresponding to the data by the collected data and provides disposal suggestions to reduce misinformation and misstatements. The method comprises the following steps: collecting data of the space-ground integrated network; reading and processing the collected data; distinguishing the data sources according to characteristic values of the data, dividing the data into terrestrial network data and satellite network data, calling different finite state machine modules according to the data sources to process the data, matching the data characteristics with the knowledge in a knowledge map inorder, storing the results returned after the matching in the state machine, obtaining a final analysis result by setting a trigger condition, and outputting the status of the current attack and related knowledge corresponding to the analysis result to the control system.

Description

technical field [0001] The invention relates to the technical field of space-ground integrated network security, in particular to a space-ground integrated network security state analysis method based on a finite state machine. Background technique [0002] Cyberspace (Cyberspace) is defined as "an artificial space built on the infrastructure of information and communication technology to support people to carry out various activities related to information and communication technology in this space. At present, cyberspace has gradually developed into a The fifth largest strategic space after land, sea, air, and space, security issues in cyberspace are also coming at any time. The space-ground integrated information network is the first major project launched in the country's major projects for 2030. The space-ground integrated network The "Sky-Net-Ground-Network" architecture is adopted, highlighting space-based networking and space-ground interconnection. It is composed of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/1433H04L63/1491
Inventor 亓玉璐江荣贾焰李爱平周斌韩伟红钟金诚朱争刘海天
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products