Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for generating attack path and attack graph based on multiple dimensions

An attack path and attack graph technology, applied in the field of network security, can solve the problems of inability to accurately analyze the key vulnerability factors of the attack graph and low generation efficiency

Active Publication Date: 2021-02-02
JILIN PROVINCE ELECTRIC POWER RES INST OF JILIN ELECTRIC POWER CO LTD +5
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003]Previous methods for attack path generation are often too large in scale, contain a lot of redundant information, have low generation efficiency and cannot accurately analyze key vulnerable factors in attack graphs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating attack path and attack graph based on multiple dimensions
  • Method for generating attack path and attack graph based on multiple dimensions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The technical solution of the present invention will be further described below in conjunction with the accompanying drawings.

[0018] The overall process of multi-dimensional attack path and attack graph generation is as follows: figure 1 As shown, it mainly includes two steps of system knowledge base construction and attack graph construction.

[0019] In the process of system knowledge base construction, the core step is attack pattern extraction.

[0020] An attack pattern represents the set of preconditions and corresponding attack consequences that an attacker needs to satisfy in order to successfully exploit a vulnerability to launch an attack. It is the inference rule of the attack graph construction algorithm. The present invention defines the attack mode as a 3-tuple . Among them, precondition is the prerequisite to exploit this vulnerability, which is divided into two metrics: (1) The reachability of the attack source and target host, which is divided into...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for generating an attack path and an attack graph based on multiple dimensions, and belongs to the technical field of network security. According to the method, vulnerability entry samples are collected, a vulnerability knowledge base is established, and a front permission and a rear permission are marked for each vulnerability entry sample; features, including vulnerability description text features and CVSS index features, of each vulnerability entry sample in the vulnerability knowledge base are extracted; text preprocessing is performed on the vulnerabilitydescription text features; an attack mode is defined by using a triple < the prepositive authority, the postpositive authority and the vulnerability entry >; an attack mode knowledge base is constructed; for the target industrial control network, an attack graph is generated by adopting a breadth-first forward attack graph generation algorithm based on an attack graph optimization strategy. The multi-dimensional attack paths and the high-dimensional attack graphs corresponding to various attack modes are generated by analyzing the environment attributes of different terminals, the attack graph generation process is optimized, and the attack graph generation efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of network security, and is a generation method based on multi-dimensional attack paths and attack graphs. Background technique [0002] The attack graph is a technology that predicts the way and process of an attacker launching an attack on a target network, guides the defender to take targeted defense measures against nodes in the network, and improves network security. The attack graph can be used to obtain potential security threats in the network, so that security managers can intuitively grasp the relationship between network risks. Security managers can choose the method with the least cost to monitor network security by analyzing all attack paths in the attack graph. maintain. [0003] Previous methods for attack path generation are often too large in scale, contain a lot of redundant information, have low generation efficiency, and cannot accurately analyze the key vulnerability factors in the atta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1433H04L63/1416H04L63/20
Inventor 马立新刘玉春郭尚民李成钢田春光吕项羽李德鑫王伟朴哲勇周宏伟姜栋潇刘宸王佳蕊张家郡张海锋庄冠群裴文洋来骥徐相森彭柏李硕张实君曾靖
Owner JILIN PROVINCE ELECTRIC POWER RES INST OF JILIN ELECTRIC POWER CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products