Security risk assessment method for assets in network based on game theory

A technology of security risk and game theory, applied in the field of security risk assessment of assets in the network

Active Publication Date: 2019-09-24
XIAN UNIV OF POSTS & TELECOMM
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In addition, the size of the security risk is determined by two factors, one is the possibility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security risk assessment method for assets in network based on game theory
  • Security risk assessment method for assets in network based on game theory
  • Security risk assessment method for assets in network based on game theory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0190] This embodiment illustrates the method of the present invention through an embodiment.

[0191] In this embodiment, there is a host computer equipped with necessary and commonly used software, including operating system, word processing software, web browser and instant messaging software, and 10 vulnerabilities are found by manual and vulnerability scanning tools, as shown in Figure 5 .

[0192] 3 vulnerabilities were found in the operating system, 3 vulnerabilities were found in the word processing software, 2 vulnerabilities were found in the web browser, and 2 vulnerabilities were found in the instant messaging software. The cost of a vulnerability is a real number in the interval (0, 1), the loss of a successful attack is the product of a real number in the interval (1, 2) and the cost of the concerned vulnerability, and the profit of a successful attack is in the interval (1, 2) The product of the real number between and the cost of attacking the vulnerability, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security risk assessment method for assets in a network based on the game theory. An evaluation model of gaming on each vulnerability by a system administrator and an attacker is constructed through the game theory. A system administrator carries out concerned and ignored selection on the vulnerabilities. The attacker carries out attack or non-attack selection on the vulnerability. Income conditions of the two parties are analyzed. A system administrator and an attacker cannot select one action to ensure that games are balanced, so that the two parties need to use a mixed strategy to maximize income, the strategy of the system administrator and the attacker when the games are balanced is deduced according to a game model, and then the risk degree of assets is obtained. The method has the advantages that the risk of the assets in the network can be analyzed by combining the vulnerability library information, and support can be provided for overall network security risk assessment.

Description

technical field [0001] The invention belongs to the technical field of computer network security, and in particular relates to a method for assessing security risks of assets in a network based on game theory. Background technique [0002] The rapid development of information technology has brought convenience and development momentum to the society, among which the network is an important infrastructure for the widespread application of information technology and plays a very important role. In particular, the popularity of the mobile Internet has made the Internet an indispensable part of people's lives. At the same time, the risks of various security threats to the network cannot be ignored. In addition to using biometric identification, firewall, intrusion detection and other technologies to deal with specific security issues, information security practitioners will also use information security risk assessment technology to conduct comprehensive security analysis of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1433
Inventor 刘意先浩明魏雅娟于海燕王俊烺
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products