Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Maximum likelihood estimation method and system for inferring attack stage based on factor graph

A technology of maximum likelihood estimation and inference attack, which is applied in the field of network security, can solve the problems of low inference efficiency and poor effect in the attack stage, and achieve the effect of avoiding joint probability calculation and speeding up calculation

Active Publication Date: 2021-06-04
XIDIAN UNIV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a maximum likelihood estimation method and system for inferring the attack stage based on a factor graph to quickly and efficiently infer the attack stage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Maximum likelihood estimation method and system for inferring attack stage based on factor graph
  • Maximum likelihood estimation method and system for inferring attack stage based on factor graph
  • Maximum likelihood estimation method and system for inferring attack stage based on factor graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0045] see figure 1 , a factor graph-based inference attack stage maximum likelihood estimation method proposed by the present invention mainly includes the following three stages: training, factor graph construction and factor graph inference. First, APT data preprocessing is collected from sources (public APT datasets, APT data in papers) to normalize the data. Then, train with these normalized data to get the corresponding parameters required by the system. Second, receive the input attack chain, and construct the corresponding factor nodes and factor functions. Finally, the Loopy Belief Propagation algorithm is used to obtain the maximum likelihood estimation of the attack phase.

[0046] In an embodiment of the present invention, a method for inferring attack phase maximum likelihood estimation based on a factor graph includes the following steps:

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a factor graph-based maximum likelihood estimation method and system for inferring an attack stage. The method comprises the following steps: extracting a binary sequence of an attack event-attack stage from an APT data set; training based on the binary sequence of attack event-attack stage to obtain related parameters, and generating a probability transition matrix; receiving an attack chain and constructing a corresponding factor graph, and converting an attack stage of the attack chain into a node and a factor function of the factor graph; and processing the factor graph to obtain the maximum likelihood estimation of the attack stage sequence corresponding to the attack chain. The system comprises a sequence extraction module, a probability transfer matrix generation module, a factor graph construction module and an attack stage inference module. The method has the advantages of being high in accuracy, high in calculation speed and high in expandability.

Description

technical field [0001] The invention belongs to the field of network security, and in particular relates to a method and system for inferring attack stage maximum likelihood estimation based on a factor graph, which realizes the processing of an attack that has occurred and infers the attack stage. Background technique [0002] With the rapid development of Internet digital technology, people's demand for network bandwidth is increasing year by year, and there is a higher demand for the convenience and security of network access. The importance of network security is self-evident. [0003] APT stands for Advanced Persistent Threat, which can sneak into the target system in stages and stay there for a long time without being detected. The targets of these attacks are carefully selected and researched, especially for large enterprise or government networks, and are prone to serious consequences. However, they are difficult to detect or prevent. But these attacks will leave c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06K9/62G06N7/00
CPCH04L63/1416G06N7/01G06F18/2415
Inventor 李腾谢凡仇渝淇温子祺刘鸣宇刘睿涵沈玉龙马建峰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products