Supercharge Your Innovation With Domain-Expert AI Agents!

Network attack sequence generation method, device, device and storage medium

A network attack and sequence generation technology, applied in the field of network security, can solve problems such as low efficiency

Active Publication Date: 2022-08-02
安徽华云安科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditionally, network attack sequences can be obtained through manual analysis, but this method is inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack sequence generation method, device, device and storage medium
  • Network attack sequence generation method, device, device and storage medium
  • Network attack sequence generation method, device, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments These are some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0049] In addition, the term "and / or" in this article is only an association relationship to describe the associated objects, indicating that there can be three kinds of relationships, for example, A and / or B, it can mean that A exists alone, A and B exist at the same time, There are three cases of B alone. In addition, the charact...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a method, apparatus, device and storage medium for generating a network attack sequence. The method includes: acquiring a network attack path, the network attack path is composed of multiple network attack tactics in turn, and each network attack tactic includes one or more network attack strategies; according to the target network attack tool corresponding to each network attack strategy, calculate any The connection weights of the two target network attack tools, and the weight matrix is ​​constructed according to the connection weights of any two target network attack tools; the weight matrix and the Q-Learning algorithm are used to generate and train the Q table to obtain the target Q table; according to the target Q table , determine the target network attack tool used by each network attack tactic, and quickly generate a network attack sequence with outstanding attack effect according to the target network attack tool used by each network attack tactic.

Description

technical field [0001] The present invention relates to the field of network security, and in particular, to a method, apparatus, device and storage medium for generating a network attack sequence. Background technique [0002] In recent years, network attacks have occurred frequently, and Trojan horses, worms, and ransomware attacks on the Internet have emerged one after another, which poses a serious threat to network security. Therefore, it is necessary to conduct attack and defense tests on the network to test the protection capability of the network. [0003] Under normal circumstances, attackers have various network attack tactics, and each tactic has different attack strategies to choose from. Traditionally, the network attack sequence can be obtained through manual analysis, but this method is inefficient. Therefore, how to quickly obtain network attack sequences with outstanding attack effects has become an urgent problem to be solved in network attack and defense...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/1458
Inventor 郝伟马维士沈传宝
Owner 安徽华云安科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More