Object-oriented network attack modeling method and device based on incidence matrix

A correlation matrix and network attack technology, applied in the field of network security, can solve problems such as ambiguous meaning and narrow application

Active Publication Date: 2021-03-12
NARI TECH CO LTD +3
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the system state in this model is only a mark, its meaning is not clear, and its application is narrow

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Object-oriented network attack modeling method and device based on incidence matrix
  • Object-oriented network attack modeling method and device based on incidence matrix
  • Object-oriented network attack modeling method and device based on incidence matrix

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0083] The present invention provides an object-oriented network attack modeling method based on an association matrix, comprising:

[0084] Abstract the nodes and communication links in the communication information network; and abstract the network attack behavior;

[0085] According to the topological structure of the communication information network, an association matrix of communication network objects is established based on abstract nodes and communication links. Each element in the association matrix is ​​composed of a state space containing attribute vectors and method vectors of nodes / communication links; and, according to the network The target of the attack behavior and the path of the communication information network through which the attack data packet passes establish an attack behavior object correlation matrix, and each element in the correlation matrix is ​​composed of a state space including the attack behavior attribute vector and method vector;

[0086]...

Embodiment 2

[0130] The present invention also provides an object-oriented network attack modeling device based on an association matrix, including:

[0131] The initialization module is used to abstract the nodes and communication links in the communication information network; and to abstract the network attack behavior;

[0132] The modeling module is used to establish a communication network object association matrix based on abstract nodes and communication links according to the topological structure of the communication information network; and, based on the abstract Network attack behavior establishes an attack behavior object correlation matrix;

[0133] as well as,

[0134] The matching module is used to match the elements in the communication network object correlation matrix and the attack behavior object correlation matrix one by one to obtain the communication information object state matrix after the network attack.

[0135] Further, the initialization module is specifical...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an incidence matrix-based object-oriented network attack modeling method and device, and the method comprises the steps: describing a communication information network structure and a network attack path through employing an incidence matrix method; and describing the modes and processes of network attacks with an object-oriented method. According to the method, the influence of attack behaviors on a single node or link can be analyzed, and potential vulnerabilities of the single node or link can be found; the method and the process of the network attack and the attackpath in the network can be visually reflected, the vulnerability of the system can be conveniently analyzed by the network security personnel, the attack source and the attack path can be found out, and the network security analysis is promoted to be expanded from a local area network or a smaller network to the whole network, so that the management capability of the network is improved.

Description

technical field [0001] The invention belongs to the technical field of network security, and more precisely, the invention relates to an object-oriented network attack modeling method and device based on an association matrix. Background technique [0002] With the construction of the ubiquitous power Internet of Things, the structure of the power grid and communication information network will become increasingly complex, and the coupling will be closer, which brings a new threat to the safe and stable operation of the power system—the security threat of the information communication system. Hackers' attacks on information and communication systems can directly or indirectly affect the measurement and control of the power system, and further affect the safe and stable operation of the power system, and even lead to large-scale power outages. In the face of endless network attack cases, it is necessary to model the attack process from the overall situation of the network, pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/1408H04L63/1416H04L63/1433H04L63/1441H04L41/145Y04S40/20
Inventor 童和钦倪明赵丽莉李满礼陈永华司庆华徐军赵彦丽张倩陈珏高鹤文李悦岑张迎星
Owner NARI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products