Unlock instant, AI-driven research and patent intelligence for your innovation.

A Method for Analyzing Security State of Space-Ground Integrated Network Based on Finite State Machine

A finite state machine, network security technology, applied in transmission systems, electrical components, etc., can solve problems such as real-time analysis difficulties, and achieve the effect of reducing false positives and false positives

Active Publication Date: 2021-03-05
NAT UNIV OF DEFENSE TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These characteristics make real-time analysis quite difficult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method for Analyzing Security State of Space-Ground Integrated Network Based on Finite State Machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The method for analyzing the security state of the integrated sky-earth network based on the finite state machine of the present invention, before starting the analysis, firstly constructs a knowledge map of the integrated sky-earth network:

[0033] Step 1: Build an ontology in the field of network security,

[0034] The models of ontology include: attacks, events, gateways, satellites, vulnerabilities, operating systems, application software, processes, registry and files. The relationship between these conceptual attributes and concepts, and then guide the construction of a network security knowledge graph according to the principles of ontology;

[0035] Step 2: Build a knowledge graph of the world-earth integration network. The model of the knowledge graph includes concepts, instances, attributes, relationships, and rules. An instance is a specific example of a concept, an attribute is an attribute of an instance, and a relationship is the relationship between inst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention aims to provide a method for analyzing the security status of space-ground integrated network based on finite state machine, which is based on the uniqueness of space-ground integrated network, the actual deployment of space-ground integrated network security processing module and the actual demand design of the management and control system , through the collected data, effectively analyze the current attack status corresponding to the data and provide disposal suggestions to reduce false positives and false positives, including the following steps: collecting data from the space-ground integrated network; reading and processing the collected data; according to The eigenvalues ​​of the data distinguish the data source, divide the data into ground network data and satellite network data, call different finite state machine modules to process the data according to the data source, match the data features with the knowledge in the knowledge map in turn, and match the returned The results are stored in the state machine, and the final analysis results are obtained by setting trigger conditions, and the current attack status and related knowledge corresponding to the analysis results are output to the management and control system.

Description

technical field [0001] The invention relates to the technical field of space-ground integration network security, in particular to a space-ground integration network security state analysis method based on a finite state machine. Background technique [0002] Cyberspace is defined as "an artificial space built on the infrastructure of information and communication technology to support people to carry out various activities related to information and communication technology in this space. At present, cyberspace has gradually developed into a continuous The fifth largest strategic space after land, sea, air, and sky, cyberspace security issues also come at any time. The integrated information network of space and earth is the first major project to be launched among the major national projects facing 2030. The integrated network of space and earth It adopts the "sky-net-ground-net" architecture, which highlights the space-based networking and the interconnection between the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/1433H04L63/1491
Inventor 亓玉璐江荣贾焰李爱平周斌韩伟红钟金诚朱争刘海天
Owner NAT UNIV OF DEFENSE TECH