Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Optimal Allocation of Network Defense Resources Against Advanced Persistent Threats

An optimal allocation and continuous technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve the problems of discrete mathematical models, only consider internal infection, and cannot characterize the interaction of internal nodes in the network, and achieve small losses. , The effect of defending against APT attacks

Active Publication Date: 2021-12-14
UNIV OF SCI & TECH OF CHINA
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing research, the mathematical model established for one-time network attack is static, and the mathematical model for the defense process of repetitive network attack is discrete, which cannot represent the interaction between the internal nodes of the network under different states. Therefore, in the existing research Mathematical models proposed for one-time or repeated cyber attacks are often not suitable for APT attacks
Secondly, the existing research mainly focuses on systems such as the spread of epidemics and malware propagation. The modeling process only considers the problem of internal infection, or assumes that the attacker is inside the network, and does not consider the impact of external attacks (such as APT attacks) on the system. to influence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Optimal Allocation of Network Defense Resources Against Advanced Persistent Threats
  • Optimal Allocation of Network Defense Resources Against Advanced Persistent Threats
  • Optimal Allocation of Network Defense Resources Against Advanced Persistent Threats

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0015] Embodiments of the present invention provide a method for optimally allocating network defense resources for advanced persistent threats, such as figure 1 As shown, it mainly includes:

[0016] 1. Using time-varying dynamic system theory to model the network attack and defense process of advanced persistent threats.

[0017] The model of the network attack and defense process under advanced persistent threats is a continuous time Markov cha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an optimal allocation method of network defense resources for advanced persistent threats, including: using time-varying dynamic system theory to model the network attack and defense process of advanced persistent threats; using the modeling results and combining geometric programming The method calculates the number of prevention resources and recovery resources that each network node needs to allocate, so as to maximize the utility of defense resources. Through this method, when the network system suffers from APT attacks, the optimal network defense resource allocation scheme can be adopted to defend against APT attacks as soon as possible given certain defense resources, so that the losses caused by APT attacks can be minimized, thereby realizing network system The purpose of defending against APT attacks.

Description

technical field [0001] The invention relates to the field of network security dynamic systems, in particular to a method for optimal allocation of network defense resources aimed at advanced persistent threats. Background technique [0002] The rapid development of network information technology has brought huge changes to the productivity of today's society. More and more institutions, organizations, companies and governments are accelerating the development of their own network applications and service technologies. Today, as computer networks and software systems become increasingly complex, there are more and more corresponding vulnerabilities. Cybercriminals use these vulnerabilities to carry out cyber attacks on personal computers and even organizations to achieve political, economic and military goals. With the development of network technology, network attack methods are increasingly diversified, organized and persistent, and the attack surface is gradually extended ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/1441H04L63/145H04L41/145H04L41/142
Inventor 江锦英姜晓枫张琦杨坚谢海永刘弋锋
Owner UNIV OF SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products