Attack path parallel prediction method for power system network
A technology of attack path and prediction method, which is applied in the direction of transmission system, digital transmission system, information technology support system, etc., can solve security loopholes, increase system security risks, and attackers are easy to launch attacks, etc., to achieve the effect of strengthening security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment
[0023] A method for parallel prediction of attack paths oriented to power system networks, comprising the following steps: (1) assuming an attack target of an attacker: identifying security vulnerabilities existing in SCADA that the attacker can exploit;
[0024] (2) Identify possible security vulnerabilities in SCADA and construct an attack tree: the root node of the attack tree corresponds to the attacker's final attack target, the child nodes correspond to the sub-targets that need to be achieved before reaching the final target, and the leaf node is the most important target to reach the target. basic matter;
[0025] (3) Evaluate the security status of each leaf node and calculate the attack success probability of each leaf node: Using the attribute point of view, each leaf node is given three attributes: the cost of the attack, the difficulty of the attack, and the possibility of the attack being discovered. sex;
[0026] (4) Calculate the attack success probability of ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 