Unlock instant, AI-driven research and patent intelligence for your innovation.

Permeation path planning method and device, computer and storage medium

A path planning, computer program technology, applied in the computer field, can solve problems such as the inability to assess the security status of the target network from a global perspective

Pending Publication Date: 2022-04-26
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a penetration path planning method, device, computer and storage medium to solve the problem that the existing technology cannot evaluate the security status of the target network from a global perspective

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permeation path planning method and device, computer and storage medium
  • Permeation path planning method and device, computer and storage medium
  • Permeation path planning method and device, computer and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0059] Before introducing the embodiment of the application, at first the background technology of the application is explained:

[0060] Penetration testing has become one of the important methods for evaluating network security. In order to ensure the normal operation of computer networks, it is necessary to fundamentally eliminate security risks such as vulnerability and weakness of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a penetration path planning method and device, a computer and a storage medium, in the method, identifiers of multiple nodes and multiple pieces of vulnerability information corresponding to the multiple nodes are acquired, and according to the identifiers of the multiple nodes and the multiple pieces of vulnerability information corresponding to the multiple nodes, the penetration path is planned; determining at least one attack path, a correlation score of the at least one attack path and a danger coefficient of the at least one attack path, and then determining a path threat degree of the at least one attack path according to the danger coefficient of the at least one attack path and the correlation score of the at least one attack path, and finally, according to the path threat degree of the at least one attack path, a target attack path is determined, and the target attack path is the attack path with the maximum path threat degree in the at least one attack path. According to the method, the optimal attack path is determined from the path threat degree of the attack path, so that the security condition of the target network is evaluated from the global perspective.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a permeation path planning method, device, computer and storage medium. Background technique [0002] With the continuous development of network technology, there are more and more security risks in the network, and eliminating the security risks such as vulnerability and weakness of computer networks has become an urgent technical problem to be solved. Fixing all known vulnerabilities and weaknesses in the network is almost impossible. To eliminate these security risks that threaten the computer network, it is first necessary to discover the source of the threat, and the common method for finding the source of the threat is penetration testing. [0003] In the prior art, most assessment methods based on penetration testing are that testers evaluate the risk of a single vulnerability to determine the possible penetration path of a single vulnerability. [0004] Howe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F16/36G06F21/56
CPCG06F21/577G06F21/56G06F16/367
Inventor 周婧莹曾楚轩黎宇薛松荃林兵张晓东杨世标苏轶张志安黄仪松肖嘉晔
Owner CHINA UNITED NETWORK COMM GRP CO LTD