Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

136 results about "Attack strategy" patented technology

Method for selecting optimized protection strategy for network security

InactiveCN101820413AAccurate and effective strategic performanceData switching networksStatistical analysisAttack strategy
The invention discloses a method for selecting an optimized protection strategy for network security and belongs to the technical field of the network security. The method for selecting the optimized protection strategy for the network security comprises the following steps of: 1) analyzing user configuration information, and acquiring host information, link information, service information, protection system information, economic cost information and property importance information in the attack-defense process; 2) performing statistic analysis and association analysis on the acquired information, and outputting an analysis result; 3) calculating the protection strategy performance and attacking strategy performance according to the analysis result; 4) establishing a static Bayesian game model for the attacking party and the defending party according to the user configuration information and the calculated result in the step 3); and 5) calculating Bayesian Nash equilibrium according to the established static Bayesian game model, and determining the protection strategy during the Bayesian Nash equilibrium as the network security protection strategy. Compared with the prior art, the method for selecting the optimized protection strategy for the network security integrates various factors to provide the optimized protection strategy for a network security manager.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Security policy dynamic acquisition method of process control system based on attack-defense game

ActiveCN106453379ARealize unified scale quantificationExcellent security policyTransmissionProgramme total factory controlControl systemResponse method
The invention discloses a security policy dynamic acquisition method of a process control system based on an attack-defense game. The method comprises an offline process and an online process; the method comprises the following steps: firstly, analyzing the process control system and establishing a Bayesian network; secondly, building a defense strategy model; thirdly, screening a potential attack strategy set and a potential defense strategy set; fourthly, quantizing an attack-defense payoff matrix; and finally, according to the attack-defense payoff matrix, establishing an equation solution and acquiring an optimal security strategy. The method of the invention comprehensively considers various consequences caused by the attack-defense strategy, and performs uniform scale quantization; an idea of an attack-defense game theory is introduced to a solving process of the optimal security strategy, so that the problems that the traditional dynamic strategy decision is excessive responsive, and the response mode of a dynamic decision response method is fixed and easily exploited by attackers are solved; and besides, the Bayesian network and the attack-defense strategy model are used for screening the potential attack-defense strategy, so that the number of alternative attack-defense strategies can be greatly reduced, thereby reducing the computing time of cost-benefit quantification of the attack-defense strategies, and improving the real-time performance of a dynamic decision.
Owner:HUAZHONG UNIV OF SCI & TECH

Adversarial sample defense method based on spoofing attacker

ActiveCN110852363ADefense Gradient AttackEfficient Gradient AttackCharacter and pattern recognitionGeneration processAlgorithm
The invention discloses an adversarial sample defense method based on a spoofing attacker, and belongs to the technical field of computer image processing. According to the technical scheme, a classification system is constructed on the basis that the classification performance of an original classifier is not changed, a buffer is added into the classification system in a parallel mode, and an attacker is well cheated by constructing a classifier 2 poor in generalization performance with the original classifier; an additional detector is arranged in front of an original classifier, single-stepattacks are defended, the difficulty of the attack process is improved, and only the original classifier is adopted to classify images classified into normal labels by the detected device; a comparator or an ensemble learning block is adopted to replace a detector, better classification performance and non-gradient return characteristics are obtained, and the comparator does not bear any specificattack strategy and disturbance mode. The method has the beneficial effects that the generation process of the adversarial sample is hindered by adopting the buffer, the comparator and the like, andthe defensive performance of the classification network on the adversarial sample is improved under the condition that the classification performance of the normal sample is not influenced.
Owner:DALIAN UNIV OF TECH

Method for comprehensively analyzing and processing real-time alarms on basis of attack strategy graphs and intrusion detection system thereof

The invention provides a method for comprehensively analyzing and processing real-time alarms on the basis of attack strategy graphs and an intrusion detection system thereof; splitting of attack scene graphs can be effectively prevented, the complete attack scene graphs can be reconstructed, the subsequent attack can be predicted, attack scenes can be fused with one another, and alarm information capable of being directly utilized can be accurately provided for analysts. The method for comprehensively analyzing and processing the real-time alarm includes steps of (1), constructing the attack strategy graphs; (2), reconstructing attack scene graphs, adding missing alarms or inferences of attack links omitted deliberately by an attacker, utilizing inference results as inference alarms and adding the inference alarms into alarm sets to be associated; (3), predicting subsequent attacks; (4), fusing the attack scene graphs, expressing fused associated records by graphs, and acquiring fresh attack scene graphs. The method and the intrusion detection system have the advantages that splitting of attack scene graphs can be effectively prevented, and analyzing accuracy can be improved. The intrusion detection system is used for analyzing and processing safety events to alarms generated by the system by the analyzing and processing method.
Owner:XIDIAN UNIV

Power network vulnerability evaluation method based on multiple attack strategies

The invention discloses a power system vulnerability evaluation method based on multiple attack strategies. The method comprises the following steps: 1) constructing a power grid model; 2) evaluatingthe importance of nodes in the network from four aspects of node degree, betweenness, local centrality and node fault loss, and completing the formulation of an attack strategy according to the importance of the network nodes; 3) establishing a betweenness virtual flow model to simulate a cascade fault propagation process in a power system; and 4) establishing a vulnerability index based on the betweenness virtual flow model, simulating a network attack by adopting a plurality of attack strategies, and evaluating the vulnerability of the IEEE300 power system network according to the change ofthe vulnerability index. Aiming at the vulnerability of the power network under the condition of various attack strategies, the betweenness virtual flow model and the various attack strategies are established to analyze the performance change of the power grid under the cascade failure. The importance of nodes in a power network can be identified, and decision support is provided for maintenance work of power system managers and power system fault prevention of designers.
Owner:XUZHOU NORMAL UNIVERSITY

Multi-step attack dynamic defense decision selection method and system for network attack and defense

ActiveCN110602047AImprove defenseImprove security governance capabilitiesData switching networksAttack graphAttack strategy
The invention belongs to the technical field of network security, and particularly relates to a multi-step attack dynamic defense decision selection method and system for network attack and defense, and the method comprises the steps: generating a network attribute attack graph through the analysis of network security element information; constructing a network survivability game model based on the attack graph, representing an attack and defense strategy and a path by the model by utilizing an attack and defense strategy matrix, and quantifying attack and defense intensity and network survivability; predicting the next attack behavior of an attacker according to the attack strategy matrix in the model, and selecting the optimal multi-step attack defense strategy according to the attack defense strategy cost. The attack and defense strategy is implemented around the network survivability, the situation pre-judgment and defense strategy can be adjusted according to the dynamically changing attack and defense situation of the network, an easily understood and reasonable defense decision is provided for network security management personnel, the network defense capability is improved,the application prospect is good, and the method has important guiding significance and value for the network security technology.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Multi-target air-to-ground semi-supervised machine adaption independent decision-making real-time attack method

The invention discloses a multi-target air-to-ground semi-supervised machine adaption independent decision-making real-time attack method. The method comprises the steps that the target attack necessity is calculated by adopting the six main indexes, namely, the number nh of fire units, the reliability K, the survivability S, the search capability F, the damage capacity H and the antijamming capability G; the target attack necessity is calculated through an analytic hierarchy process; a semi-supervised machine adaption decision-making system carries out air-to-ground attack decision making on multiple targets; a semi-supervised machine self-adaption system is constructed, and the target attack necessity is automatically sorted through the constructed semi-supervised machine self-adaption system; the attack effectiveness of an unmanned aerial vehicle is analyzed through an information balance weight algorithm; the comprehensive weight is calculated through the information balance weight algorithm, and a decision matrix is constructed; the multi-target unmanned aerial vehicle attack strategy is comprehensively considered, independent decision-making is carried out on the attack sequence of the unmanned aerial vehicle, and the unmanned aerial vehicle is dispatched to attack. The method has the advantage that multi-batch precise attacks are carried out according to the sequence of the target attack necessity.
Owner:LANZHOU JIAOTONG UNIV

Task reliability analysis method and system based on unmanned aerial vehicle swarm system

PendingCN110795823AImprove accuracyAccurate and effective quantitative basisDesign optimisation/simulationProbabilistic CADSimulationUncrewed vehicle
The invention discloses a task reliability analysis method and system based on an unmanned aerial vehicle swarm system. The analysis method comprises the steps of obtaining an attack strategy according to a to-be-analyzed unmanned aerial vehicle swarm system; attacking the multi-layer network of the unmanned aerial vehicle swarm system according to the attack strategy; determining the critical probability of the current attack based on the seepage model; judging whether the node number of the task network layer after the current attack is greater than 0 or not, and if so, carrying out the nextattack according to an attack strategy; if not, ending the attack; taking the critical probability corresponding to each attack as a task vulnerability index, and determining a task reliability indexof the unmanned aerial vehicle swarm system corresponding to each attack; wherein the task reliability index corresponding to each attack is inversely proportional to the task vulnerability index, and the higher the task reliability index is, the higher the reliability of task execution of the unmanned aerial vehicle swarm system is. The method can be well applied to an unmanned aerial vehicle swarm system, and the accuracy of a reliability analysis result is improved.
Owner:BEIHANG UNIV

Industrial control network-oriented Quantitative evaluation method and system for influence of multi-mode attack mode on state of industrial control system

ActiveCN113486352ASolve problems that are difficult to accurately assessConsensus assessment resultsPlatform integrity maintainanceEvaluation resultData set
The invention relates to an industrial control network-oriented quantitative evaluation method and system for influence of a multi-mode attack mode on a state of an industrial control system, and the method comprises the following steps: (1) carrying out the preliminary description and extraction of a state feature, i.e., a state data set of the industrial control system, and obtaining a state data segmentation point; (2) clustering the state features; (3) constructing a state transition probability graph; and (4) carrying out quantitative evaluation on the influence of the system state based on the abnormal characteristics and the damage degree index. According to the method and system, for various industrial control network attack strategies, the state abnormal characteristics are taken as main indexes, the actual state change of the system in the attack proceeding stage and the attack ending stage is quantitatively evaluated, and the problem that the influence of various attack strategies on the system state is difficult to accurately evaluate is solved. According to the method and system, a formula for evaluating the influence of the attack strategy on the system state is provided, state abnormal characteristics and threat damage degrees are associated, evaluated and analyzed, and an evaluation result consistent with the actual state influence is obtained.
Owner:SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN

Defense strategy generation method based on three-party dynamic game

The invention discloses a defense strategy generation method based on a three-party dynamic game, and belongs to the field of network security. According to the method, internal and external threats are comprehensively considered, and the internal threats are instantiated in the strategy generation process. In the node value measurement process of the initialization stage, the influence of multiple targets on the node is balanced so as to reduce the bias problem in node value calculation. In the sequential game process, the defense party uses a heuristic method to obtain the path with the maximum threat in the plurality of attack paths for blocking; a user side models a strategy of a user by using a mixed strategy game model, so the coupling of a stealth attack and an internal threat is improved; for attackers, uncertainty of behavior modes of the attackers is increased, three attack strategies are used for simulating attack behaviors of different attackers respectively, and finally, defense strategies in each time period are combined to generate a final protection strategy set. According to the invention, through dynamic analysis of three-party behaviors, decision suggestions withhigher risk prevention capability are provided for an administrator.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

Power network vulnerability evaluation method based on multiple attack strategies

The invention discloses a power system vulnerability evaluation method based on multiple attack strategies. The method comprises the following steps: 1) constructing a power grid model; 2) evaluatingthe importance of nodes in the network from four aspects of node degree, betweenness, local centrality and node fault loss, and completing the formulation of an attack strategy according to the importance of the network nodes. 3) establishing a betweenness virtual flow model to simulate a cascade fault propagation process in the power system. and 4) establishing a vulnerability index based on thebetweenness virtual flow model, simulating a network attack by adopting a plurality of attack strategies, and evaluating the vulnerability of the IEEE300 power system network according to the change of the vulnerability index. Aiming at the vulnerability of the power network under the condition of various attack strategies, the betweenness virtual flow model and the various attack strategies are established to analyze the performance change of the power grid under the cascade failure. The importance of nodes in a power network can be identified, and decision support is provided for maintenancework of power system managers and power system fault prevention of designers.
Owner:XUZHOU NORMAL UNIVERSITY

Decision method for dynamic network transformation under full information conditions and system thereof

InactiveCN109379322AEfficient analysisAccurately describe the offensive and defensive confrontation processData switching networksAttack strategyData mining
The invention belongs to the technical field of network safety and specifically relates to a decision method for dynamic network transformation under full information conditions and a system thereof.The decision method comprises the following steps: obtaining state transition probability according to the network state, an attack strategy and a defense strategy; using a game theory to describe gains of both sides of the offensive and defensive game during moving target defense; constructing a moving target defense model based on a Markov game in combination with the state transition probability; transforming the solution of the moving target defense model into an equivalent of a target function and obtaining an optimal moving target defense strategy. According to the method and the systemin the invention, the moving target defense model based on the Markov game is constructed according to the state transition probability and both the sides of the offensive and defensive game; furthermore, the optimal moving target defense strategy is obtained by solving so as to realize balance of network performance overheads and moving target defense gains and solve the technical problem of howto select the optimal defense strategy based on limited network resources.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products