Satellite network security analysis method, device, system and storage medium

A satellite network and security analysis technology, applied in the field of satellite network security, can solve the problems of satellite destruction, low analysis efficiency, lack of satellite network security standards, regulations and treaties, etc., to improve efficiency and accuracy, improve security performance, achieve The effect of efficient management

Active Publication Date: 2021-12-31
NAT UNIV OF DEFENSE TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, at the current legal level, there is a lack of international cybersecurity standards, regulations and treaties for satellites
At the technical level, there are many weak links in the complex manufacturing and operation and maintenance of satellites, making satellites extremely vulnerable to cyber attacks
From the opponent's point of view, unlike the use of laser anti-satellite weapons, which are easy to detect, cyber-attack anti-satellite weapons are more concealed, and the cost may be lower, which makes the risk of satellite destruction greater
To sum up, in the process of realizing the present invention, the inventor found that in the aforementioned traditional satellite network security technology, there is a technical problem of low analysis efficiency of network security weak links

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Satellite network security analysis method, device, system and storage medium
  • Satellite network security analysis method, device, system and storage medium
  • Satellite network security analysis method, device, system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0033] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field to which this application belongs. The terms used herein in the specification of the application are only for the purpose of describing specific embodiments, and are not intended to limit the application. As used herein, the term "and / or" includes any and all combinations of one or more of the associated listed items.

[0034] In addition, the technical solutions of the various embodiments of the prese...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This application relates to satellite network security analysis methods, devices, systems and storage media. The method includes: obtaining satellite network equipment security data and completing the model construction of satellite network security ontology; according to the four-level model of satellite network security equipment, performing equipment security data After unified processing, the satellite network security hierarchical model and the satellite network security knowledge model are respectively formed; the entity name, attribute and mutual relationship are abstracted from the satellite network security hierarchical model and the satellite network security knowledge model, and are formally expressed by setting description language as The dynamic triples are used to obtain the dynamic graph model; then knowledge reasoning and graph dynamics analysis are carried out based on OWL+SWRL language, and the auxiliary construction of the satellite network equipment security knowledge map is completed; the security problem query statement is obtained and the knowledge reasoning and analysis are carried out through the constructed knowledge map. Query and analyze to obtain information on security weaknesses of the satellite network. The analysis efficiency of weak links in satellite network security has been greatly improved.

Description

technical field [0001] The present application relates to the technical field of satellite network security, in particular to a satellite network security analysis method, device, system and storage medium. Background technique [0002] With the development of satellite technology, satellite networks play a key role in almost every field, so the importance of satellite network security is particularly prominent, and even directly related to national security and social stability. Therefore, for units and departments that value satellite network security, how to identify and deal with space network weapon threats and further in-depth analysis and processing of satellite equipment security issues are problems that need to be solved urgently. Due to the current multi-source and heterogeneous information on satellite network security incidents and the loose organizational structure, it is difficult to efficiently use the information. Moreover, the current satellite network atta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/20H04L41/145
Inventor 刘斌赵润豪赖远坤陆敏梁伟朱席席朱先强丁兆云
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products