Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security decision-making method and device for game attack and defense graph and storage medium

A technology of network security and decision-making method, applied in the field of network security decision-making method of device and storage medium, game attack and defense graph, can solve the problem of large error in security strategy, inability to effectively distinguish the real hazard status of vulnerable points, and inability to reflect the complexity and complexity of vulnerable points. Diversity and other issues to achieve the effect of network management

Inactive Publication Date: 2019-11-01
WUYI UNIV
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In addition, before formulating a security policy, it is necessary to evaluate the security vulnerabilities of each host node, but the vulnerability assessment methods in the prior art, such as the CVSS scoring mechanism, cannot effectively distinguish the real hazard status of each vulnerability, and cannot reflect the vulnerability. The complexity and diversity of points may lead to large errors in the subsequent formulation of security policies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security decision-making method and device for game attack and defense graph and storage medium
  • Network security decision-making method and device for game attack and defense graph and storage medium
  • Network security decision-making method and device for game attack and defense graph and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention provides a network security decision-making method, device and storage medium of a game attack-defense graph, which can perform more reliable high-diversity evaluation on vulnerable points of the network, and establish a game attack-defense graph for vulnerable points with high-diversity characteristics , and finally get the optimal defense strategy of network security.

[0033] The embodiments of the present invention will be further described below in conjunction with the accompanying drawings.

[0034] refer to figure 1 , an embodiment of the present invention provides a network security decision-making method of a game attack-defense graph, comprising the following steps:

[0035] Step S100: Evaluate the vulnerability points of each host node by using the optimal vulnerability evaluation weight combination search algorithm and the optimal vulnerability point scoring weight combination selection algorithm to obtain a high diversity score for ea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security decision-making method and device for a game attack and defense graph and a storage medium, and the method comprises the following steps: employing an optimal vulnerability evaluation weight combination search algorithm and an optimal vulnerability point evaluation weight combination selection algorithm to evaluate vulnerability points of all host nodes,and obtaining high-diversity scores of the vulnerability points; constructing a state attack and defense graph; calculating the success probability and hazard index of attack accumulation in the stateattack and defense graph in combination with the high diversity score of the vulnerability; establishing a game model according to the state attack and defense graph; solving the game model to obtainan optimal attack and defense strategy. An optimal vulnerability evaluation weight combination search algorithm and an optimal vulnerability point evaluation weight combination selection algorithm are adopted to evaluate vulnerability points in a target network, the actual harm condition of each fragile point can be effectively distinguished, so that a more reliable game attack and defense graphis established, the optimal security strategy of the network is obtained by solving the game attack and defense graph, and the network management of the maximum income is realized.

Description

technical field [0001] The invention relates to the field of network security, in particular to a network security decision-making method, device and storage medium of a game attack-defense graph. Background technique [0002] There are many kinds of network security protection systems in the industrial Internet. The essence of network security attack and defense is the attack and defense confrontation between the attacker and the defender. The two conflicting goals of attack and defense are opposite, and the goal of the attacker is to destroy The target network function or service quality is to maximize the profit of the attack, while the goal of the defense is to do its best to protect the network from attacks and minimize the loss of the network. Therefore, a reasonable prevention system should ideally protect the security loopholes and all attacks in the network, but the actual situation is that it is necessary to strike a balance between information security and risk in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/14H04L41/142H04L41/145H04L63/20
Inventor 李千目董潇龙华秋
Owner WUYI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products