Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Network security policy AI autonomous defense method and system based on security ontology modeling

A strategy and security technology, applied in the field of network information security, can solve the problems of inefficient early warning, difficult to guarantee the effectiveness of security defense, difficult to adapt to the rapid evolution of attack methods and behaviors, etc., to achieve the effect of improving network security.

Active Publication Date: 2022-04-26
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional network security system is usually built simultaneously with the network information system, and it is difficult to adapt to the rapid evolution of attack methods and behaviors. When dealing with highly automated and intelligent attacks, the limitations of this relatively static security defense model are particularly obvious
The overall performance is passive defense and inefficient early warning. Under the limited time, cognition and information conditions of network security scenarios, the effectiveness of security defense is difficult to guarantee

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security policy AI autonomous defense method and system based on security ontology modeling
  • Network security policy AI autonomous defense method and system based on security ontology modeling
  • Network security policy AI autonomous defense method and system based on security ontology modeling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the purpose, technical solution and advantages of the present invention more clear and understandable, the present invention will be further described in detail below in conjunction with the accompanying drawings and technical solutions.

[0042] An embodiment of the present invention provides an AI autonomous defense method for network security strategies based on security ontology modeling, see figure 1 As shown, it contains the following content:

[0043] S101. Integrate multi-source heterogeneous knowledge to construct a security ontology for early warning of attacks and selection of defense strategies;

[0044] S102. Collect network data traffic in real time, perform attack warning detection on network data traffic based on the security ontology, and obtain corresponding defense strategies according to the detected security means required for early warning attacks;

[0045] S103. Within the bounded rationality of time, cognition and information, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of network information security, and particularly relates to a network security policy AI autonomous defense method and system based on security ontology modeling, and the method comprises the steps: constructing a security ontology for attack early warning and defense policy selection through integrating multi-source heterogeneous knowledge; collecting network data traffic in real time, performing attack early-warning detection on the network data traffic based on the security ontology, and obtaining a corresponding defense strategy according to a security means required by the detected early-warning attack; in the limited rationality range of time, cognition and information, network security and protection candidate planning schemes are generated according to the defense strategy and by means of the search tree, the optimal planning scheme is selected from the candidate planning schemes, and autonomous defense is achieved through scheme execution. According to the method, under the conditions of high constraint of computing resources and dynamic asset environment, autonomous defense is realized by using bounded rationality and AI planning, and efficient early warning can be provided for active defense at the early stage of attack.

Description

technical field [0001] The invention belongs to the technical field of network information security, and in particular relates to a network security policy AI autonomous defense method and system based on security ontology modeling. Background technique [0002] Attacks in cyberspace pose a great threat to enterprises and organizations. The attack threshold is low, and the attack time is random and short. The key to reducing losses lies in efficient early warning and rapid implementation of targeted security defense measures. The traditional network security system is usually built simultaneously with the network information system, and it is difficult to adapt to the rapid evolution of attack methods and behaviors. When dealing with highly automated and intelligent attacks, the limitations of this relatively static security defense model are particularly obvious. The overall performance is passive defense and inefficient early warning. Under the limited time, cognition and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40G06F16/36
CPCH04L63/1441H04L63/1425H04L63/1416H04L63/20G06F16/367Y02D30/50
Inventor 刘盈泽郭渊博
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products