Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for generating attack scenario in mobile cloud computing scene

A scenario generation and mobile cloud technology, applied in the field of dynamically generating attribute attack scenarios, can solve the problems of attack graph state explosion, error-prone, cumbersome, etc., and achieve the effect of improving accuracy and high applicability

Active Publication Date: 2022-02-25
BEIHANG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] When generating attack scenarios in large-scale and complex mobile cloud computing scenarios, it is cumbersome and error-prone to manually analyze and design attack plans to write attack scenarios. There are problems in the method, such as: high learning cost due to the need to learn non-mainstream scripts or software, cannot be applied to large-scale networks due to the state explosion problem caused by the use of state attack graphs, cannot deal with redundant paths in attack graphs and ring problem, the present invention proposes a method for attack scenario generation in mobile cloud computing scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating attack scenario in mobile cloud computing scene
  • Method for generating attack scenario in mobile cloud computing scene
  • Method for generating attack scenario in mobile cloud computing scene

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0116] Mobile cloud platform computer scenarios such as figure 2 As shown, there are database servers (DBS, Datebase Server), website servers (WS, Web Server), and file servers (FS, FileServer) in the isolated area (DMZ, Demilitarized Zone). The first host PM 1 (PM, Parasitifer Machine) is divided into 4 virtual machines (VM, VirtualMachine), respectively running network controller (NC, Network Control), Nessus vulnerability scanner, MulVAL attack graph generation tool and intrusion detection system (IDS, Intrusion Detection System). The Nessus is a vulnerability scanning and analysis software. The translation of the MulVAL (Multistage Vulnerability Analysis) is multi-host multi-stage vulnerability analysis. The second host PM 2 It is divided into several virtual machines (VM, Virtual Machine), used as VMs used by cloud tenants, and the VMs are connected by a programmable open virtualization software switch (OVS, open vSwitch). OVS only completes the data forwarding func...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for generating an attack scenario in a mobile cloud computing scene, and relates to the field of network security. According to the method, firstly, a MulVAL tool is used for generating an attribute attack graph for the state of a target network, a CVSS is used for evaluating the utilization success rate of a single vulnerability, then a loop removal and redundant path algorithm is used for constructing a Bayesian network attack graph, and an improved node probability calculation algorithm is used for evaluating the cumulative success probability of each node of the attribute attack graph; and finally, an optimal attack path is generated by using a dynamic attack path generation algorithm, and then the attack path is described by using a network attack scenario description language to obtain an attack scenario script. According to the method, the process of obtaining the attack scenario in the mobile cloud computing scene is automated and dynamic, and the improved node probability calculation algorithm is used for processing the condition that a ring appears, so that the calculation of the accumulated success probability of each node on the attack graph is more vivid and accurate.

Description

technical field [0001] The present invention relates to a method for generating an attack graph in network security, and more particularly refers to a method for dynamically generating attribute attack scenarios for vulnerabilities in mobile cloud computing scenarios based on an improved Bayesian attack graph probability algorithm. Background technique [0002] As a typical representative of PCE (Personal Computing Environment, personal computing environment), mobile cloud computing has broad prospects in application fields such as cloud storage, cloud games and healthcare. The problem of mobile cloud computing security is particularly prominent. [0003] Network security drills are an important means of strengthening security awareness and training information assurance capabilities. Attack scenarios are assumptions and assumptions about the attack drill process, and their design and formulation are one of the key parts of organizing and implementing network security drills...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/122H04L9/40
CPCH04W12/122H04L63/1433
Inventor 夏春和王天博王智慷
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products