Attack studying and judging method and system for network attack and defense test platform and medium

A test platform and network attack technology, applied in the field of network security, to achieve the effect of improving accuracy

Active Publication Date: 2020-10-02
NAT UNIV OF DEFENSE TECH
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is very little current research on an...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack studying and judging method and system for network attack and defense test platform and medium
  • Attack studying and judging method and system for network attack and defense test platform and medium
  • Attack studying and judging method and system for network attack and defense test platform and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] see figure 1 , 2. The attack research and judgment method oriented to the network attack and defense test platform of the present invention at least includes the following steps:

[0050] Step 1: Construct a security ontology model of the security knowledge graph, construct and expand the security knowledge graph based on the rule-based reasoning method;

[0051] Step 2: Simulate network attacks on the network attack and defense test platform, and construct a scene knowledge graph based on the simulated network attack information;

[0052] Step 3: Build an attack rule base according to the general laws of compound attacks;

[0053] Step 4: Perform data collection and detection of simulated cyber attacks, extract corresponding threat elements, match the threat elements with the security knowledge map, and return the corresponding single-step attack if the matching is successful;

[0054] Step 5: Filter single-step attacks through the scene knowledge graph, remove invalid single-st...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an attack studying and judging method and system for a network attack and defense test platform and a medium, which can effectively improve the accuracy of studying and judgingcomposite attacks, and the method comprises the following steps: constructing a security ontology model of a security knowledge graph, and constructing and expanding the security knowledge graph basedon a rule reasoning method; simulating network attacks on the network attack and defense test platform, and constructing a scene knowledge graph according to information of the simulated network attacks; constructing an attack rule base according to the general rule of the composite attack; performing data acquisition and detection on the simulated network attack, extracting corresponding a threat element, matching the threat element with the security knowledge graph, and returning the corresponding single-step attack if the matching succeeds; filtering single-step attacks through the scene knowledge graph, removing invalid single-step attacks, and reserving effective single-step attacks; and matching the effective single-step attack with an attack rule base, and outputting an attack chain of the corresponding network attack through the constraint of the space-time attribute.

Description

Technical field [0001] The invention relates to the technical field of network security, in particular to an attack research and judgment method, system and medium for a network attack and defense test platform. Background technique [0002] Cyber ​​attacks first started with computer viruses and have now developed into complex attacks with advanced persistent threats. Correspondingly, the consequences of cyber attacks have become more and more serious. At present, the problem of cyber security is not only in academic circles. His research topics are more related to the country’s political, economic, military and social stability. [0003] The problem of network security mainly includes two aspects: offense and defense. In order to achieve the best defense effect, you must understand the principles and methods of attack. In view of the actual situation, it is impossible to launch real attacks on real networks for research. Therefore, the current research on network attacks is don...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F16/36
CPCG06F16/367H04L63/1416H04L63/1433H04L63/145
Inventor 亓玉璐贾焰周斌李爱平江荣涂宏魁喻承
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products