DOS attack and defense simulation method based on random Petri network

An attack-defense simulation and attack-side technology, applied to electrical components, transmission systems, etc., can solve the problems of not considering the function of system attack detection at the same time, the system repair function defense strategy, and the failure to show the details of the system defense process well.

Active Publication Date: 2020-02-28
国家电网有限公司客户服务中心
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing system defense model under DOS attack fails to show the system defense process and details well, and does not simultaneously consider the system's attack detection function, system self-repair function, and system ability to identify attacks and generate corresponding defense strategies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DOS attack and defense simulation method based on random Petri network
  • DOS attack and defense simulation method based on random Petri network
  • DOS attack and defense simulation method based on random Petri network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0062] The DOS attack and defense simulation method based on random Petri nets includes the following process:

[0063] Step 1: Using colored Petri nets, construct a system defense model of colored Petri nets under DOS attacks;

[0064] The coloring Petri net seven-tuple is: {P, T, G, A, F, C, M 0},

[0065] Among them: P is the finite set of places p, indicating the state of the system; T is the finite set of transition t, indicating the action that causes the system state to change; G is the transition guard function, indicating the condition that triggers the system transition; A is the arc a Set is a directed arc connecting places and transitions; F is an arc function, indicating the change of Tokens in places when the system state changes; C is the color set of Tokens, indicating the types of Tokens in the system; M 0 is the initial identification, indicating the number of Token distributions in the warehouse in the initial state of the system;

[0066] In a system def...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a DOS attack and defense simulation method based on a random Petri network. The method comprises the following steps of 1, constructing a system defense model of a colored Petri network under DOS attack by using the colored Petri network; 2, constructing a system defense model under the DOS attack, wherein the model comprises the following modules of an attack simulation module, an attack detection module, a resource restoration module and a strategy implementation module; 3, calculating the average availability of the system. According to the invention, the system defense modeling under DOS attack is carried out by using the colored Petri network, and the modules are divided into the attack simulation module, the attack detection module, the resource restoration module and the strategy implementation module, so that the complete defense process of the system under the DOS attack is well achieved, the defense details of the system under the DOS attack are displayed, and the established model can objectively reflect the availability of the system under the known parameters.

Description

Technical field: [0001] The invention relates to computer system safety protection technology, in particular to a DOS attack and defense simulation method based on random Petri net. Background technique: [0002] Denial of Service (DoS) is the most common type of network attacks. The attacker sends flood-level data packets to the network or target host in a short period of time, occupying a large amount of network bandwidth and consuming target processing resources. When normal users communicate on the network, abnormal requests or service errors will occur, and the normal communication quality of the network will be threatened. DoS attack is simple and effective, and it has seriously affected the normal operation of the network. It is a research focus in the field of network security. [0003] At present, scholars have used Petri nets to model network attacks. Huang Guangqiu et al. proposed a set of network attack modeling methods based on fuzzy Petri nets. Based on the fu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1458
Inventor 赵伟唐振营穆松鹤王晨飞李慧琴
Owner 国家电网有限公司客户服务中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products