System for predicting industrial control network vulnerabilities based on correction parameters
A technology for correcting parameters and loopholes, applied in the computer field, can solve problems such as the inability to guarantee the security of industrial control networks, and achieve the effect of improving security and stability and making extensive use of value.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] The computer program stored in the storage medium includes a first computer program that implements the following steps when the processor implements the first computer program:
[0036] Step S101, obtain the training cycle T of the training data set 0 = LCM (TP m ), LCM is the least common multiple function.
[0037] Due to different P m Sum n The update cycle difference is large. If you use the sliding window to select the training parameters, it will cause many parameters that do not change in a certain period of time, waste computing resources, and the model training is not significant, so this example is selected TP. m Small common multiple as the training cycle. It should be noted that since the Internet Vulnerability feature parameter update period is much larger than the industrial control network vulnerability feature parameter update period, only the Internet vulnerability feature parameter update period is considered only, which can guarantee each same vulnerabil...
Embodiment 2
[0063] It should be noted that the Internet vulnerability features are more, and it is easy to acquire, but in some application scenarios, it is limited to various factors such as industrial control network, and may not be able to obtain a sufficient amount of industrial control network vulnerability feature parameters to train the industrial control network. Vulnerability prediction model. However, due to the trend of the same loophole in the outbreak of the work control network, it is associated with the overall trend of the Internet, and therefore, the intersection of the industrial control network vulnerability explosion probability can be combined based on the associated relationship of the industrial control network and Internet vulnerability. predict.
[0064] Specifically, the computer program stored in the storage medium includes a second computer program that implements the following steps when the processor implements the second computer program:
[0065] Step S201, obt...
Embodiment 3
[0093] The computer program stored in the storage medium includes a third computer program that implements the following steps when the processor implements the third computer program:
[0094] Step S300, obtain each sample vulnerability ID from the database {STR 1 STR 2 , ...}, STR e The text of the summary corresponding to the E-update cycle, the value of E is 1 to infinity.
[0095] Step S301, when e = 1, according to STR e Length determined STR e Feature weight W e .
[0096] By step S301, it can be for each STR e Set the corresponding initial feature weight.
[0097] Step S302, when e> 1, compare Str e-1 Str e Text information, if it is exactly the same, it is judged z * w e-1 Whether it is greater than the preset first feature weight threshold W emin If it is greater than, set W e = z * w e-1 Where Z is the preset weight adjustment coefficient, 0 e-1 Less than or equal to W emin Set W e = W emin If STR e-1 Str e If the text information is inconsistent, according to STR e Len...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com