Moving target defense opportunity selection method and device based on covert confrontation

A technology of moving target defense, timing, applied in the field of network security

Active Publication Date: 2020-07-07
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Game theory is an analysis tool for describing the interaction of decision-making subjects. As a game theory framework for modeling computer security scenarios, time games have been widely used in security attack and defense scenarios such as directional attack modeling, encryption key update, password policy change, and cloud auditing. However, few scholars have applied it to the research on the timing selection of moving target defense.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Moving target defense opportunity selection method and device based on covert confrontation
  • Moving target defense opportunity selection method and device based on covert confrontation
  • Moving target defense opportunity selection method and device based on covert confrontation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work belong to the protection of the present invention. scope.

[0056] With the rapid development of SDN, its security is also facing severe challenges. MTD, as a new active defense strategy that changes the rules of the game, is constantly enriched, but the analysis of MTD timing decision-making based on game theory is still in its infancy, and there are still many limitations in terms of theoretical basis, game mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of network security, and particularly relates to a moving target defense opportunity selection method and a moving target defense opportunity selection device basedon covert confrontation. The moving target defense opportunity selection method comprises the steps of: analyzing an attack process based on a cyber kill chain; constructing an MTD network attack surface state migration model based on a SIRM infectious disease model; constructing an MTD attack and defense opportunity selection model based on time game; and performing game equilibrium solution on the MTD attack and defense opportunity selection model based on the time game, and selecting the optimal opportunity of the MTD. According to the moving target defense opportunity selection method, theoptimal equilibrium point of strategy implementation opportunities of an attacker and a defender is analyzed in a time game theory framework in accordance with a real network attack and defense scene, so that the MTD implementation opportunity is guided for the defender, and the SDN service quality and MTD decision income are balanced.

Description

technical field [0001] The invention belongs to the field of network security, in particular to a method and device for selecting a mobile target defense opportunity based on concealment confrontation. Background technique [0002] With the continuous development of advanced persistent threat (Advanced Persistent Threat, APT) and other network attack methods, Internet security is facing severe challenges. As a next-generation new network system, Software Defined Network (SDN) faces increasingly prominent security threats. Due to the centralized control of SDN, the SDN controller becomes a single-point attack target for attackers. At the same time, the southbound interface between the control layer and the data layer is also vulnerable to network attacks such as scanning detection, denial of service, and fraudulent implantation. , so it is urgent to analyze and predict security attack and defense behaviors in SDN. In order to solve the actual problems and potential threats ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/145H04L63/20H04L41/145
Inventor 张恒巍谭晶磊张红旗张玉臣王晋东胡浩刘小虎程相然胡瑞钦
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products