Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Core network security penetration test method, system and equipment based on ontology rule

A technology of penetration testing and core network, applied in the field of 5G network security, it can solve the problems of penetration testing dependence and lack of establishing a vulnerability attack and defense rule base.

Pending Publication Date: 2022-04-15
中科南京信息高铁研究院
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is also no unified vulnerability attack and defense rule base, resulting in the output of penetration testing often relying on the personal experience and prior knowledge of penetration testing engineers and their teams

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Core network security penetration test method, system and equipment based on ontology rule
  • Core network security penetration test method, system and equipment based on ontology rule
  • Core network security penetration test method, system and equipment based on ontology rule

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] An embodiment of the present invention is a core network security penetration testing method based on ontology rules. The architecture of core network security penetration testing system based on ontology rules is as follows: Figure 4 As shown, it consists of three subsystems, which are domain modeling subsystem, security detection rule subsystem and penetration testing subsystem. in,

[0079] The domain modeling subsystem, including the domain model construction subsystem, is used to complete the construction of the domain model that reflects the semantics of the core network in the core network security penetration test, so as to complete the analysis of attackers, attack methods, attack techniques, damage targets and damage consequences knowledge structure. The domain modeling subsystem also provides a user interface to operate the security penetration testing system based on ontology rules. Furthermore, users can also customize domain models that meet specific n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of 5G network security, and discloses a core network security penetration test method, system and device based on an ontology rule. The method comprises the following steps of: constructing a model for reflecting semantics of a core network; constructing a security detection rule for a specific attack; the security detection rule and the domain model are put into an inference engine, and vulnerabilities, attack chains and / or corresponding defense chains which may occur in the service execution process are inferred; and executing a penetration test. Aiming at the current situation that a penetration test system for reflecting core network semantics is lacked at present, an ontology-based representation method is adopted to establish an ontology model of a core network; constructing a security detection rule for the key network element according to the semantic model to realize discovery of vulnerabilities and attack chains; and completing defense chain construction according to a discovery result of the attack chain.

Description

technical field [0001] The invention belongs to the technical field of 5G network security, and in particular relates to a core network security penetration testing method, system and equipment based on ontology rules. Background technique [0002] At present, the 5G security requirements defined by the International Standardization Organization 3GPP are mainly applicable to three application scenarios, namely enhanced mobile broadband (eMBB, Enhanced Mobile Broadband), massive machine type communication (mMTC, massive Machine Type Communication), and ultra-reliable low-latency communication ( uRLLC, ultra-Reliable Low Latency Communication). In addition to carrying traditional voice and data services, a large number of vertical industry applications, such as the Internet of Things, Internet of Vehicles, remote data services, virtual reality, and augmented reality applications, will also be realized and popularized through 5G networks. In order to improve the flexibility an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/121H04L9/40G06F21/55
Inventor 孟梦孙茜田霖
Owner 中科南京信息高铁研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products