Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

153 results about "Attack model" patented technology

In cryptanalysis, attack models or attack types are a classification of cryptographic attacks specifying the kind of access a cryptanalyst has to a system under attack when attempting to "break" an encrypted message (also known as ciphertext) generated by the system. The greater the access the cryptanalyst has to the system, the more useful information he can get to utilize for breaking the cypher.

Malicious software image format detection model-oriented black box attack defense method and device thereof

A malicious software image format detection model-oriented black box attack defense method comprises the steps of 1) obtaining a data set, and dividing the data set into a training set and a test set;2) converting into a malicious software image format; 3) constructing a black box attack model for generating disturbance based on a deep convolutional generative adversarial network (DCGAN), whereinthe structure of the black box attack model is divided into two parts, namely a generator and a discriminator; 4) through the continuous confrontation process between the generator and the discriminator constructed in the step 3), the generator finally generating a confrontation sample capable of simulating the sample B; 5) optimizing retraining of the malicious software assembly format detectionmodel by using the adversarial sample obtained in the step 4) to obtain a malicious software detection model capable of defending against the adversarial attack; and 6) identifying the malicious software by utilizing the malicious software detection model capable of defending against the attack. The invention further comprises a device for implementing the malicious software image format detection model-oriented black box attack defense method.
Owner:ZHEJIANG UNIV OF TECH

Multiple countermeasure sample attack-based intelligent defense algorithm recommendation method and intelligent defense algorithm recommendation system

The invention discloses a multiple countermeasure sample attack-based intelligent defense algorithm recommendation method. The method comprises the following steps: cleaning an original data set to obtain a training set; training a target recognition model by utilizing the training set, and obtaining a target attack model; selecting different countermeasure sample attack algorithms, and attackingthe target attack model; quantitatively evaluating the attack success rate of each countermeasure sample attack algorithm, and selecting a target attack algorithm according to the attack success rate;aiming at each target attack algorithm, applying a countermeasure attack defense algorithm one by one for defense purpose; and recommending a corresponding countermeasure attack defense algorithm toa user according to the defense result. The invention further discloses an intelligent defense algorithm recommendation system, wherein the system is adopted by the above intelligent defense algorithmrecommendation method. According to a specific target model, the intelligent defense algorithm recommendation system can intelligently recommend an effective defense algorithm, so that the loss caused by the attack of a defense sample case to the target model is reduced.
Owner:ZHEJIANG UNIV

Information security risk assessment method oriented to typical metallurgy process control system

The invention provides an information security risk assessment method oriented to a typical metallurgy process control system and belongs to the technical field of industrial control system information security. The system robustness under different attack modes and policies is analyzed by establishing an attack model under the typical scenes of the metallurgy process, and therefore, the security risk assessment on the typical metallurgy process control system in different attack modes and a failure mode can be realized. Based on the risk theory, the method is used for performing the security risk assessment by use of a random probability algorithm by defining the metallurgy process control system as a physical information fusion system; from the two aspects of the occurrence probability and the influence of attack sources or failure sources, a security assessment method based on risk indexes is developed. Quantitative estimation is performed based on risk indexes; a security incident set is created based on the established physical information fusion model and attack model, and then the security incident set is combined with the calculated robustness assessment indexes for the quantitative estimation, and therefore, the weak security links in the control system can be located conveniently.
Owner:AUTOMATION RES & DESIGN INST OF METALLURGICAL IND

SM2 signature algorithm security verification method based on random number unknown

ActiveCN104836670AComprehensive analysis of security capabilities against attacksGood for error injection experimentsKey distribution for secure communicationUser identity/authority verificationAttack modelValidation methods
The invention discloses an SM2 signature algorithm security verification method based on an random number unknown. The method comprises the following steps: (1) signing N+1 messages M respectively by adopting an SM2 signature algorithm, and injecting an error into every SM2 signing in order that identical errors occur in signing results s of identical set bit parts of a random number k used in every signing; (2) subtracting error signing results s in other N signing respectively from the error signing result of first signing with reference to an equation of the error signing result s of first signing to obtain an equation set, namely, a lattice attack model; and (3) solving the lattice attack model, recovering all bits of the random number k used in every signing, substituting the recovered bits into an equation for calculating corresponding signing results s to obtain a private key dA, and judging that the SM2 signature algorithm is unsafe if the private key dA is a correct private key. Through adoption of the method, the security capability of the SM2 signature algorithm in attack resistance can be analyzed more effectively and comprehensively.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI +2

Real-time malicious behavior detection method and device

InactiveCN108123939AImprove the problem of low detection efficiencyTransmissionAttack modelData stream
The invention provides a real-time malicious behavior detection method and device which are applied to an SDN system, and relates to the technical field of cloud computing. The real-time malicious behavior detection method comprises the steps that a malicious behavior attack feature library in a cloud computing environment is built on the basis of a malicious behavior attack model containing possible attack schemes on a cloud platform; whether or not a malicious behavior exists in a current data flow in a network is detected in real time on the basis of the malicious behavior attack feature library; and if yes, it represents that a network attack exists at present, and the current data flow is intercepted. According to the real-time malicious behavior detection method and device, for solving the problem that an existing malicious behavior detection model cannot effectively deal with the processing efficiency bottleneck brought by the large-scale network traffic and the traffic controldifficulty brought by the network topology complexity, an SDN-based real-time malicious behavior detection model is designed by combining a flexible SDN architecture with a big data processing framework to solve the low detection efficiency problem which exists in research at present and is caused by handling the bottleneck and network traffic control problems.
Owner:HUAZHONG NORMAL UNIV

Guideboard identification confrontation defense method based on genetic algorithm

The invention discloses a guideboard identification confrontation defense method based on a genetic algorithm. The method comprises the following steps: (1) constructing a training set, a test set anda confrontation set; (2) constructing a guideboard classifier, and training the guideboard classifier by using the training set and the test set to obtain a guideboard recognition model; (3) constructing a guideboard attack model according to a genetic algorithm, and generating an adversarial sample by utilizing the guideboard attack model; (4) correcting the adversarial sample, applying the adversarial sample in a physical scene, and collecting a physical image of the adversarial sample; (5) inputting the physical image of the confrontation sample into a guideboard identification model, andscreening to obtain a high-quality confrontation sample; (6) adding high-quality confrontation samples into the training set, and training the guideboard recognition model again by using the trainingset to realize confrontation defense optimization of the guideboard recognition model; and (7) identifying the guideboard image by using the guideboard identification model after confrontation defenseoptimization to realize confrontation defense of guideboard identification.
Owner:ZHEJIANG UNIV OF TECH

A prototype modeling method of network security attack based on industrial control

The invention discloses an industrial control network security method based on industrial network attack prototype modeling, which comprises the following steps: S1, industrial network security modeling and algorithm design; S2, designing an industrial control network security attack prototype; S3, taking an attack model of an attacker in an algorithm of the attack prototype in S1 as an attack source, and converting the network vulnerability information obtained in S4 into an attack set of an attacker according to attack rules to form an attack prototype; S4: Designing penetration test schemebased on attack prototype; 5, establishing a Sniffer network monitoring system; 6, optimizing and filtering that data through the external interface of the target industrial control network; 7, optimizing that topology structure of the intranet of the target industrial control network; S8: Establishing vulnerability risk assessment and modeling; S9: Forming an industrial network security defense solution. The network optimization and safety solution provided by the invention will effectively solve the safety problem of the industrial control of the enterprise, can timely carry out the risk assessment on the system, reduce the risk factors to the maximum extent, and improve the network operation efficiency and the safety reliability of the production management.
Owner:SUZHOU CHIEN SHIUNG INST OF TECH

Multi-machine electric power system wide-area damping control method under elastic event triggering mechanism

The invention discloses a multi-machine electric power system wide-area damping control method under an elastic event triggering mechanism. A multi-machine electric power system is controlled by a wide-area damping control system which consists of a vector data concentrator, an event trigger, a PMU, a generator and a wide-area damping controller, wherein the control method of the wide-area dampingcontrol system comprises the steps of S1, establishing a DoS attack model for simulating real DoS attack; S2, judging whether a control signal is blocked by the DoS attack or not, wherein the wide-area damping controller performs elastic control according to the judging effect to ensure stability of the multi-machine electric power system; S3, enabling the vector data concentrator to transfer thestate signals of the multi-machine electric power system collected in each time to the event trigger to judge whether a trigger algorithm of the event trigger is satisfied or not; and S4, enabling the event trigger to respond the judgment result of the step S3 to determine whether to transfer the control signal to the wide-area damping controller or not, so that occupation of limited bandwidth resource is reduced; and by virtue of the multi-machine electric power system wide-area damping control method, safe and stable operation of the system can be ensured.
Owner:NANJING UNIV OF POSTS & TELECOMM

Federation learning defense method and device, electronic equipment and storage medium

The invention relates to the artificial intelligence technology, and discloses a federated learning defense method comprising the following steps: obtaining local model parameters from each participant of federated learning, constructing attack model parameters according to the local model parameters, obtaining a training data set according to the local model parameters and the attack model parameters, and obtaining a training data set according to the training data set and the attack model parameters; training a pre-constructed discriminator by utilizing the training data set to obtain an attack discriminator, judging a to-be-detected local model by utilizing the attack discriminator to obtain a good local model parameter, and performing aggregation operation on the good local model parameter to obtain a global model parameter; and sending the global model parameters to each participant. In addition, the invention also relates to a blockchain technology, and the global model parameters can be stored in nodes of a blockchain. The invention further provides a federated learning defense device, electronic equipment and a computer readable storage medium. According to the method, theproblem of poor defense effect for a specific attack mode can be solved.
Owner:PING AN TECH (SHENZHEN) CO LTD

Network attack prediction model construction method based on uncertainty perception attack graph

ActiveCN110012037AAttack predictionAlert management is accurateTransmissionAttack modelAlgorithm
The invention discloses a network attack prediction model construction method based on an uncertain perception attack graph, which comprises the following steps: 1, adding an uncertain probability that vulnerabilities are attacked on the attack graph to obtain an uncertain perception attack graph; 2, associating the alarm information generated by the intrusion detection system when the service inthe network system is attacked, generating an alarm association graph, and generating an intrusion response graph by using a response decision corresponding to the alarm information; 3, according to the source host address of the alarm, the destination host address of the alarm, the source port number of the alarm, the destination port number of the alarm, the protocol used for alarm transmissionand the vulnerability number corresponding to the generated alarm, improving the uncertainty probability; 4, improving the uncertainty probability through the incidence relation between the response decisions in the intrusion response graph and the response cost; 5, obtaining the probability that the service is attacked according to the uncertainty probability so as to obtain a prediction attack model; the network attack prediction method can realize accurate and comprehensive prediction of the network attack.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products