Attack path parallel prediction method for power system network
A technology of attack path and prediction method, which is applied in the direction of transmission system, digital transmission system, information technology support system, etc., can solve security loopholes, increase system security risks, and attackers are easy to launch attacks, etc., to achieve the effect of strengthening security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment
[0023] A method for parallel prediction of attack paths oriented to power system networks, comprising the following steps: (1) assuming an attack target of an attacker: identifying security vulnerabilities existing in SCADA that the attacker can exploit;
[0024] (2) Identify possible security vulnerabilities in SCADA and construct an attack tree: the root node of the attack tree corresponds to the attacker's final attack target, the child nodes correspond to the sub-targets that need to be achieved before reaching the final target, and the leaf node is the most important target to reach the target. basic matter;
[0025] (3) Evaluate the security status of each leaf node and calculate the attack success probability of each leaf node: Using the attribute point of view, each leaf node is given three attributes: the cost of the attack, the difficulty of the attack, and the possibility of the attack being discovered. sex;
[0026] (4) Calculate the attack success probability of ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com