Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network defense resource optimal allocation method for advanced persistent threats

An optimal allocation and continuous technology, applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problems of discrete mathematical models, only consider internal infection, mathematical models are not suitable for APT attacks, etc., to achieve small losses, The effect of defending against APT attacks

Active Publication Date: 2019-10-22
UNIV OF SCI & TECH OF CHINA
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing research, the mathematical model established for one-time network attack is static, and the mathematical model for the defense process of repetitive network attack is discrete, which cannot represent the interaction between the internal nodes of the network under different states. Therefore, in the existing research Mathematical models proposed for one-time or repeated cyber attacks are often not suitable for APT attacks
Secondly, the existing research mainly focuses on systems such as the spread of epidemics and malware propagation. The modeling process only considers the problem of internal infection, or assumes that the attacker is inside the network, and does not consider the impact of external attacks (such as APT attacks) on the system. to influence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network defense resource optimal allocation method for advanced persistent threats
  • Network defense resource optimal allocation method for advanced persistent threats
  • Network defense resource optimal allocation method for advanced persistent threats

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0015] Embodiments of the present invention provide a method for optimally allocating network defense resources for advanced persistent threats, such as figure 1 As shown, it mainly includes:

[0016] 1. Using time-varying dynamic system theory to model the network attack and defense process of advanced persistent threats.

[0017] The model of the network attack and defense process under advanced persistent threats is a continuous time Markov cha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network defense resource optimal allocation method for advanced persistent threats. The method comprises the following steps: modeling a network attack and defense process ofthe advanced persistent threats by using a time-varying dynamic system theory; and calculating the number of prevention resources and recovery resources needing to be allocated to each network node by utilizing a modeling result and combining a geometric programming method, so that the effectiveness of the defense resources is maximized. According to the method, when the network system is subjected to the APT attack, the optimal network defense resource allocation scheme can be adopted to defend the APT attack as soon as possible under the condition of giving a certain defense resource, so that the loss generated by the APT attack is minimized, and the aim of defending the APT attack by the network system is fulfilled.

Description

technical field [0001] The invention relates to the field of network security dynamic systems, in particular to a method for optimal allocation of network defense resources aimed at advanced persistent threats. Background technique [0002] The rapid development of network information technology has brought huge changes to the productivity of today's society. More and more institutions, organizations, companies and governments are accelerating the development of their own network applications and service technologies. Today, as computer networks and software systems become increasingly complex, there are more and more corresponding vulnerabilities. Cybercriminals use these vulnerabilities to carry out cyber attacks on personal computers and even organizations to achieve political, economic and military goals. With the development of network technology, network attack methods are increasingly diversified, organized and persistent, and the attack surface is gradually extending...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/1441H04L63/145H04L41/145H04L41/142
Inventor 江锦英姜晓枫张琦杨坚谢海永刘弋锋
Owner UNIV OF SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products