Security Modeling and Quantification Method for Cyberspace Mimic Defense Based on Vulnerability Consistency Rate

A technology of cyberspace and quantification method, which is applied in the field of security modeling and quantification of cyberspace mimicry defense, which can solve the problems of analysis and solution of attack success rate without attack task, no analysis of system attack success rate, etc.

Active Publication Date: 2021-09-10
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

"Security Analysis of Dynamic Heterogeneous Redundant Systems [J]. Computer Engineering, 2018, 44(10): 42-45,50" provides a security analysis method, in which only one attack The probability of success is analyzed, but the attack success rate of the attack task is not analyzed and solved, that is, an attack task may need to be completed in multiple dynamic transformation cycles, and the system attack success rate at this time is not analyzed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security Modeling and Quantification Method for Cyberspace Mimic Defense Based on Vulnerability Consistency Rate
  • Security Modeling and Quantification Method for Cyberspace Mimic Defense Based on Vulnerability Consistency Rate
  • Security Modeling and Quantification Method for Cyberspace Mimic Defense Based on Vulnerability Consistency Rate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the present invention Examples, not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0041]DHR: Dynamic heterogeneous redundant system architecture; due to the inherent static, deterministic and similarity of information systems, the internal operating environment of the system is perceivable or detectable, and any exploitable and planable network attack is It is only possible to achieve the expected purpose based on such an operating environment. Importing dyna...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security modeling and quantification method for network space mimicry defense based on the vulnerability consistency rate. The method comprises: step 1: determining the defense parameter information that affects the security of the DHR system; step 2: determining the attack parameter information that affects the attacker's ability; step 3: establishing the DHR system about the defense parameter information and the attack parameter information Model; step 4: deriving the DHR system security metrics about the defense parameter information and the attack parameter information, the metrics include: the system attack success rate of an attack and the system attack success rate of the attack task; step 5 : According to the DHR system model, the system attack success rate of an attack and the system attack success rate of an attack task, calculate the system attack success rate of the DHR system for a specific vulnerability and the system attack success rate of the DHR system for a combination of vulnerabilities. A mathematical model is established for the DHR system, and the security of the system is represented by indicators such as output consistency rate and system attack success rate, and the security and anti-attack ability of the DHR system are analyzed by solving the model.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a security modeling and quantification method for network space mimicry defense based on vulnerability consistency rate. Background technique [0002] The problem of vulnerabilities and backdoors is one of the most serious problems in cyber attacks. Vulnerabilities usually refer to defects in the specific implementation of hardware, software or protocols, or system security policies, which make it possible for attackers to access or destroy the system without authorization. Software and hardware backdoors usually refer to malicious codes left in software and hardware systems, aiming to provide methods and means for special users to bypass security control links in special ways to gain access to the system. Due to the low attack threshold and the high cost of network defense due to the network attack using loopholes and backdoors, it seriously threatens the security of n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/145H04L63/1416H04L63/1433H04L63/20
Inventor 王伟李光松广晖杨本朝于刚王磊段明郑群雄王向宇李强张军琪
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products