Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for selecting defensive opportunities of moving targets based on concealed confrontation

A moving target defense, timing technology, applied in the field of network security

Active Publication Date: 2022-03-01
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Game theory is an analysis tool for describing the interaction of decision-making subjects. As a game theory framework for modeling computer security scenarios, time games have been widely used in security attack and defense scenarios such as directional attack modeling, encryption key update, password policy change, and cloud auditing. However, few scholars have applied it to the research on the timing selection of moving target defense.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for selecting defensive opportunities of moving targets based on concealed confrontation
  • Method and device for selecting defensive opportunities of moving targets based on concealed confrontation
  • Method and device for selecting defensive opportunities of moving targets based on concealed confrontation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work belong to the protection of the present invention. scope.

[0056] With the rapid development of SDN, its security is also facing severe challenges. MTD, as a new active defense strategy that changes the rules of the game, is constantly enriched, but the analysis of MTD timing decision-making based on game theory is still in its infancy, and there are still many limitations in terms of theoretical basis, game mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of network security, and in particular relates to a method and device for selecting a mobile target defense opportunity based on concealment confrontation. The method includes: analyzing the attack process based on the network kill chain; constructing the MTD network attack surface state transition based on the SIRM infectious disease model Model; build a time game-based MTD attack and defense timing selection model; solve the game equilibrium for the time game-based MTD attack and defense timing selection model, and select the optimal MTD timing. The present invention fits the real network attack and defense scenario, and analyzes the optimal equilibrium point of the timing of the attacker and the defender to implement the strategy within the framework of the time game theory, so as to guide the defender to implement the MTD timing, so as to balance the SDN service quality and MTD decision-making benefits question.

Description

technical field [0001] The invention belongs to the field of network security, in particular to a method and device for selecting a mobile target defense opportunity based on concealment confrontation. Background technique [0002] With the continuous development of advanced persistent threat (Advanced Persistent Threat, APT) and other network attack methods, Internet security is facing severe challenges. As a next-generation new network system, Software Defined Network (SDN) faces increasingly prominent security threats. Due to the centralized control of SDN, the SDN controller becomes a single-point attack target for attackers. At the same time, the southbound interface between the control layer and the data layer is also vulnerable to network attacks such as scanning detection, denial of service, and fraudulent implantation. , so it is urgent to analyze and predict security attack and defense behaviors in SDN. In order to solve the actual problems and potential threats ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L41/14
CPCH04L63/145H04L63/20H04L41/145
Inventor 张恒巍谭晶磊张红旗张玉臣王晋东胡浩刘小虎程相然胡瑞钦
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products