A Network Deception Efficiency Evaluation Method Based on Dynamic Bayesian Attack Graph
A dynamic Bayesian and effectiveness evaluation technology, applied in the field of cyberspace security, can solve problems such as lack of, deception defense effectiveness evaluation method, single defense level, etc., to achieve the effect of ensuring usability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] The present invention will be further described below with reference to the embodiments and accompanying drawings.
[0030] Step 1: Before evaluating network spoofing, we first need to model the attack graph of the target network.
[0031] Use the general vulnerability scoring system CVSS to perform threat analysis on the vulnerabilities existing in the network;
[0032] For example, according to the calculation formula of the probability of successful exploitation of the vulnerability, the probability of successful exploitation of the vulnerability number CVE-2009-0180 is: P s = 0.5, where the exploit method AV is Network, the access complexity AC is Low, and no attacker authentication is required, that is, AU is None.
[0033] After determining the network topology, node connectivity and other elements, traverse the complete node state and attack path to realize the construction of the Bayesian attack graph.
[0034] Step 2: Verify the consistency of the nodes invol...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


