Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

AADL-based automatic generation method of attack defense tree

A technology for automatically generating and attacking paths, applied in the field of network security, can solve problems such as inability to form an architecture, difficult to solve, and difficult to model

Pending Publication Date: 2022-02-25
NANJING FORESTRY UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Deng Jiajia, a researcher at Nanjing University of Aeronautics and Astronautics, proposed a real-time verification method based on SysML and AADL to solve the problem that it is difficult to analyze and verify the real-time performance of the brake control system during the system design stage. However, their method of constructing the AADL model based on the SysML module diagram lacks standardization And precise description, unable to form a complete architecture, and for complex systems, it is difficult to model, determine, track and solve problems in risk vulnerabilities in the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • AADL-based automatic generation method of attack defense tree
  • AADL-based automatic generation method of attack defense tree
  • AADL-based automatic generation method of attack defense tree

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts fall within the protection scope of the present invention.

[0022] see figure 1 As shown, the present invention provides a kind of automatic generation method of the attack defense tree based on AADL, and described method comprises the steps:

[0023] Step S10, using the AADL model to model the cyber-physical fusion system.

[0024] Determine all components (software and hardware) of the cyber-physical fusion system and their relationships, and use AADL to model the system architecture. With the development of technology, cyber-physi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an AADL-based automatic generation method of an attack defense tree. The method comprises the following steps: modeling an information physical fusion system by adopting an AADL model; determining vulnerabilities of each component of the cyber-physical fusion system, and tracking and determining an attack path; selecting a final attack target of the system according to the attack path; taking the AADL model and an attack target as input, and obtaining an attack defense tree through a template library; and calculating the attack defense tree to obtain a minimum defense measure, performing quantitative evaluation on an attack probability value and a defense cost by combining a Bayesian network and a CVSS score value, and calculating a risk value of the system. The problems that a complex system is difficult to model, and risk vulnerabilities in the system are difficult to determine, track and solve, including the influence of network attacks on a physical system and an information system, are solved.

Description

technical field [0001] The invention relates to the field of network security, in particular to an automatic generation method of an attack defense tree based on AADL. Background technique [0002] AADL (Architecture Analysis and Design Language) is a modeling language used to describe the architecture of complex cyber-physical fusion systems, and is widely used in the modeling and verification of safety-critical systems. Compared with other modeling languages ​​such as SysML (Systems Modeling Language) and UML (Unified Modeling Language), AADL provides powerful semantics for the classification of standard software and hardware components. Moreover, UML has the disadvantage of not being able to describe the non-functional characteristics of a system, and SysML lacks an explicit basis for rigorous formal analysis. In contrast, AADL provides not only a description of system functionality, but also a description of the interaction between the physical system architecture, embe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L41/14
CPCH04L63/1416H04L63/1433H04L63/1466H04L41/145
Inventor 赵俊杰徐丙凤沈霄梦
Owner NANJING FORESTRY UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products