Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intention-driven network defense strategy generation method, system and application

An intent and strategy technology, applied in the field of intent-driven network defense strategy generation, can solve problems such as incapacity, inflexibility, and inability to detect attacks, achieving high flexibility, maintaining network security, and improving network resilience.

Active Publication Date: 2022-07-15
XIDIAN UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (1) The existing detection mechanism cannot detect all attacks; the existing method is to defend according to a pre-arranged strategy, which is not flexible and cannot better ensure network resilience
[0010] (2) The existing ECA-based policy methods cannot flexibly deal with network challenges, and the strategies used need to be formulated in advance, and will appear powerless in the face of increasingly complex network environments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intention-driven network defense strategy generation method, system and application
  • Intention-driven network defense strategy generation method, system and application
  • Intention-driven network defense strategy generation method, system and application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0077] The intent-driven network defense policy generation method provided by the embodiment of the present invention includes:

[0078] Obtain the traffic information of the link;

[0079] According to the traffic information of the link, determine the security status of the link and generate beliefs;

[0080] When it is determined that the security state of the link is abnormal, according to the belief, the desire and intention are generated, and the reasoning of the defense strategy is completed;

[0081] Eliminate the abnormality of the link according to the defense strategy.

[0082] According to the traffic information of the link provided by the embodiment of the present invention, the link security state is determined and the belief is generated, including:

[0083] When the input traffic of the link exceeds a given threshold, determine that the security state of the link is abnormal, and generate a new belief;

[0084] update the belief when the input traffic of th...

Embodiment 2

[0101] The intent-driven network defense policy generation method provided by the embodiment of the present invention is implemented as follows:

[0102] Obtain the traffic information of the link;

[0103] According to the traffic information of the link, determine the security status of the link and generate beliefs;

[0104] When it is determined that the security state of the link is abnormal, according to the belief, the desire and intention are generated, and the reasoning of the defense strategy is completed;

[0105] According to the defense strategy, remove the link abnormality.

[0106] According to the link traffic information provided by the embodiment of the present invention, the link security state is determined, and a belief is generated:

[0107] When it is detected that the input traffic in the link exceeds the given threshold, the link is in an abnormal state at this time, and the belief overUsage(link) is generated, where the belief overUsage(link) indica...

Embodiment 3

[0128] like image 3 As shown, the defense process of the intent-driven network defense policy generation method provided by the embodiment of the present invention includes:

[0129] Step 1: Limit the link rate.

[0130] After it is detected that the security state of the link becomes abnormal, that is, after the belief overUsage(link) is detected, in order to ensure the security of the link before finding out whether it is maliciously attacked, a rate limit is applied to the traffic entering the link. processing to keep the traffic in the link within an acceptable range, that is, generate a desire attackPrevented(link), generate an intent limitLinkRate(link) according to this desire, and after the intent is completed, generate a new belief linkRateLimited(link)( Indicates that the rate of traffic entering the link has been limited), specifically setting a Rate parameter, and then passing the rate limiting ability of the proxy, so that the traffic entering the link is the pe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of network security, and discloses an intention-driven network defense strategy generation method, system and application, and the method comprises the steps: obtaining the flow information of a link; determining a link security state according to the traffic information of the link, and generating a belief; when it is determined that the safety state of the link is abnormal, a wish and an intention are generated according to belief, and reasoning of a defense strategy is completed; and removing the abnormity of the link according to the defense strategy. According to the invention, automation of defense strategy generation can be realized based on intention driving according to the security state of the link when encountering a network attack. According to the method, the defense strategy making process is dynamic through the BDI reasoning capability, that is, the current defense strategy can be adjusted in time according to the change of the link state, and the problems, such as unreasonable threshold setting and the like, occurring in the process of executing the expected behavior can be solved; therefore, when facing complex and changeable network attacks, the method can flexibly and actively cope with the network attacks, and the network elasticity is improved.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to an intention-driven network defense strategy generation method, system and application. Background technique [0002] Currently, network resilience describes the resilience of network functions and structures when network elements fail, and is the key to providing reliable, robust, and efficient network operations. Cyber ​​resilience refers to the ability of a network to maintain an acceptable level of service and recover within an acceptable time frame in the face of challenges such as equipment failure, equipment misconfiguration, or malicious attacks. [0003] At present, network attacks are becoming more and more intense, and they are characterized by complexity, self-adaptation and persistence. It is unrealistic to completely defend against various network attacks. Therefore, how to ensure the smooth completion of tasks when attacked, that is, how to imp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/20H04L63/1425H04L63/1416H04L63/1458
Inventor 杨春刚李鹏程宋延博宋睿涛寇世文李彤
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products