Unlock instant, AI-driven research and patent intelligence for your innovation.

Information system security risk assessment method

An information system, security risk technology, applied in transmission systems, digital transmission systems, security communication devices, etc., can solve problems such as failure to meet security risk assessment scenarios

Active Publication Date: 2022-01-28
江苏安泰信息科技发展有限公司
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Due to the uncertainty of information between attackers and defenders in information systems, traditional complete information static game models cannot meet more complex security risk assessment scenarios in information systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information system security risk assessment method
  • Information system security risk assessment method
  • Information system security risk assessment method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0094] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0095] S1: Build a dynamic security game model.

[0096] In the S1 step, the dynamic security game model of the information system is constructed, including:

[0097] Establish a dynamic security game model (S,A,P,ε,V) under the information system environment;

[0098] S represents the set of states in the information system, each state is the state that the network node may exist in the information system, and the state is the privileged state of the network entity in the information system, divided into no privilege, remote access privilege, local user Privileges and root privileges;

[0099] A represents the action set of the attacker and the defender in the information system, the attacker's action is the weakness information existing in the information system network, and the defender's action is the defense ac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information security, and discloses an information system security risk assessment method, which comprises the following steps: constructing a dynamic security game model; based on the dynamic security game model, solving to obtain an optimal attack strategy; taking the optimal attack strategy and the state of the information system as input, taking the security risk level of the information system as output, and constructing a neural network model for training to obtain optimal model parameters; and generating an optimal attack strategy of the information system by using the dynamic security game model, inputting the optimal attack strategy and the state of the information system as a neural network model, and outputting a value obtained by the neural network model as the security level of the information system. According to the method, the dynamic security game model is constructed to realize the information security game under the dynamic attack and defense environment, the dynamic security game model is utilized to generate the optimal attack strategy of the information system, the neural network model is utilized to generate the security level of the information system in real time, and the real-time assessment of the security risk of the information system is realized.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an information system security risk assessment method. Background technique [0002] With the continuous development of information technology, the integration of information management system and modern information technology is getting deeper and deeper, the boundary between traditional information management system and the Internet is gradually broken, and it is gradually getting rid of the traditional closed system and transforming into an interconnected system. Therefore, the existence of network attacks is not only limited to the field of network information security, but also gradually spread to the field of information management systems. All kinds of industry information are in danger of being stolen, tampered with, deleted, etc., and serious information management system attack accidents occur from time to time. [0003] Due to the uncertainty of i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/71G06K9/62G06N3/04G06N3/08H04L9/40
CPCG06F21/577G06F21/71G06N3/08H04L63/1441G06N3/047G06N3/048G06F18/241G06F18/2415
Inventor 周晏平尹俊华国忠
Owner 江苏安泰信息科技发展有限公司