Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Method and System for Maximum Likelihood Estimation in Inference Attack Stage Based on Factor Graph

A technique of maximum likelihood estimation and inferring attacks, applied in the field of network security, it can solve the problems of low inference efficiency and poor effect in the attack stage, and achieve the effect of avoiding joint probability calculation and speeding up calculation.

Active Publication Date: 2022-04-05
XIDIAN UNIV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a maximum likelihood estimation method and system for inferring the attack stage based on a factor graph to quickly and efficiently infer the attack stage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method and System for Maximum Likelihood Estimation in Inference Attack Stage Based on Factor Graph
  • A Method and System for Maximum Likelihood Estimation in Inference Attack Stage Based on Factor Graph
  • A Method and System for Maximum Likelihood Estimation in Inference Attack Stage Based on Factor Graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0045] see figure 1 , a factor graph-based inference attack stage maximum likelihood estimation method proposed by the present invention mainly includes the following three stages: training, factor graph construction and factor graph inference. First, APT data preprocessing is collected from sources (public APT datasets, APT data in papers) to normalize the data. Then, train with these normalized data to get the corresponding parameters required by the system. Second, receive the input attack chain, and construct the corresponding factor nodes and factor functions. Finally, the Loopy Belief Propagation algorithm is used to obtain the maximum likelihood estimation of the attack phase.

[0046] In an embodiment of the present invention, a method for inferring attack phase maximum likelihood estimation based on a factor graph includes the following steps:

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system for inferring attack phase maximum likelihood estimation based on a factor graph, the method comprising the following steps: extracting the binary sequence of the attack event-attack phase from the APT data set; training based on the binary sequence of the attack event-attack phase, Get the relevant parameters and generate a probability transition matrix; receive the attack chain and construct the corresponding factor graph, transform the attack stage of the attack chain into the node and factor function of the factor graph; process the factor graph to obtain the sequence of attack stages corresponding to the attack chain The maximum likelihood estimate of . The system includes sequence extraction module, probability transition matrix generation module, factor graph construction module and attack stage inference module. The invention has the advantages of high accuracy rate, fast calculation speed and strong expansibility.

Description

technical field [0001] The invention belongs to the field of network security, and in particular relates to a method and system for inferring attack stage maximum likelihood estimation based on a factor graph, which realizes the processing of an attack that has occurred and infers the attack stage. Background technique [0002] With the rapid development of Internet digital technology, people's demand for network bandwidth is increasing year by year, and there is a higher demand for the convenience and security of network access. The importance of network security is self-evident. [0003] APT stands for Advanced Persistent Threat, which can sneak into the target system in stages and stay there for a long time without being detected. The targets of these attacks are carefully selected and researched, especially for large enterprise or government networks, and are prone to serious consequences. However, they are difficult to detect or prevent. But these attacks will leave c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06K9/62G06N7/00
CPCH04L63/1416G06N7/01G06F18/2415
Inventor 李腾谢凡仇渝淇温子祺刘鸣宇刘睿涵沈玉龙马建峰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products