Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

180 results about "Network defense" patented technology

Network defense strategy selection method and apparatus based on Markov evolutionary game

The invention relates to a network defense strategy selection method and apparatus based on Markov evolutionary game. The method comprises the following steps: constructing a multi-stage Markov attack and defense evolutionary game model according to dynamic attack and defense game in a network attack and defense process, wherein the model contains a plurality of sub game stages; solving and outputting optimal defense strategies of the stages of the attack and defense game by using an optimal defense strategy selection algorithm for the multi-stage Markov attack and defense evolutionary game model. According to the network defense strategy selection method and apparatus provided by the invention, a dynamic evolution process of network attack and defense in view of the multi-stage Markov attack and defense evolutionary game model, the state skip of the evolutionary stages is described as a random process from the angle of attack and defense confrontation, and the multi-stage Markov evolutionary game is constructed on the basis of the Markov process; the total discount gain of the game is used as a target function, a discount factor eta is imported to perform discount processing on the game gains of different stages, a network security analysis method and a defense technology system are researched and searched, and thus the network defense strategy selection method and apparatus have important practical significance.
Owner:THE PLA INFORMATION ENG UNIV

Large-scale DDoS (Distributed Denial of Service) attack defense system and method based on two-level linkage mechanism

The invention discloses large-scale DDoS (Distributed Denial of Service) attack defense system and method based on a two-level linkage mechanism. The method comprises the following steps of: monitoring the flow of a total network by a flow monitoring subsystem in real time, and searching and confirming a DDoS attack behavior; sending an alarm message for triggering a cleaning operation to a flow cleaning subsystem, and guiding the abnormal flow of the DDoS attach behavior to the flow cleaning subsystem; receiving the abnormal flow guided by the flow monitoring subsystem by the flow cleaning subsystem, cleaning the abnormal flow according to the cleaning operation triggered by the alarm message, (wherein the flow cleaning subsystem adopts the two-level architecture of a backbone network plus a local network defense system, and the two levels of cleaning system work cooperatively and clean synchronously), and injecting the cleaned cleaning flow back to a target customer network. The large-scale DDoS attack defense system and method based on the two-level linkage mechanism solve the problems of cleaning capacity, cleaning precision, and the like existing in the traditional DDoS defense technology; and on the basis of reducing the deployment cost of service scale, the large-scale DDoS attach defense capability of the total network is greatly improved, and the cleaning precision ofthe attack flow is increased.
Owner:CHINA TELECOM CORP LTD

Attack and defense differential game-based network security defense decision determination method and device

The present invention relates to an attack and defense differential game-based network security defense decision determination method and a device. The method comprises the steps of constructing a state evolution model NIRM for network nodes according to an SIR model during the network attack and defense process; according to a network node state migration path, acquiring a node state change differential equation set based on the state evolution model NIRM; according to the node state change differential equation set, constructing an attack and defense differential game model ADDG; according to an attack and defense return strategy and a corresponding execution cost, executing a revenue function of the attack party and the defense party during the differential game process; according to the revenue function and the attack and defense differential game model ADDG, solving out a saddle point strategy for the attack party and the defense party through the dynamic planning method, determining an optimal defense strategy and outputting the optimal defense strategy. According to the technical scheme of the invention, the problem that actual requirements cannot be met through the traditional dynamic game analysis method can be solved. Compared with the existing network security defense strategy, the attack and defense process in the continuous and real-time engagement condition is analyzed. The timeliness, the pertinence and the guiding significance of network defense decision results are better.
Owner:THE PLA INFORMATION ENG UNIV

Attack and defense evolutionary game analysis based network defense action decision method

The invention belongs to the technical field of network safety, and particularly to an attack and defense evolutionary game analysis based network defense action decision method. The attack and defense evolutionary game analysis based network defense action decision method comprises the steps of introducing an excitation factor of a same game group strategy dependence relationship to build a network attack and defense evolutionary game model; performing balanced solution on the network attack and defense evolutionary game model to obtain different balance points in an attack and defense evolution process; and determining an optimal defense strategy based on the balance points; and performing stability analysis on the balance points to obtain a correspond game evolutionary trend. Accordingto the method, the excitation factor is introduced, the dynamic evolution process is copied to describe the network attack and defense process, and the network attack and defense evolutionary game model based on an improved evolutionary game theory is built; evolutionary balanced solution is carried out for the circumstances that the attacker and the defender have multiple selectable strategies, the obtained balance points are subjected to the stability analysis, the network attack and defense game model and the application scope are extended, the practicability and accuracy of the model are improved, and important guiding significance is provided for the network safety technology.
Owner:THE PLA INFORMATION ENG UNIV

A vehicle network safety protection method based on Internet of Vehicles and a vehicle network architecture

InactiveCN109729056AImprove securityDefend against cyber attacksTransmissionElectronic controllerNetwork architecture
The invention provides a vehicle network safety protection method based on Internet of Vehicles and a vehicle network architecture. The method comprises the following steps: establishing a plurality of security defense layers for a whole vehicle network, wherein the plurality of security defense layers at least comprise an Internet of Vehicles defense layer, a whole vehicle electronic and electrical architecture defense layer, a vehicle-mounted network defense layer and an automobile electronic controller physical defense layer; For each security defense layer, selecting a preset security defense technology corresponding to the security defense layer to realize network security protection of the whole vehicle, wherein a firewall technology is correspondingly adopted by the Internet of Vehicles defense layer, and a central gateway technology is correspondingly adopted by the whole vehicle electronic and electrical architecture defense layer; Wherein the vehicle-mounted network defense layer correspondingly adopts a network message MAC encryption technology, and the automobile electronic controller physical defense layer correspondingly adopts an EVITA-based security hardware moduletechnology. The network attack can be effectively resisted, and the network security of the whole vehicle is improved.
Owner:CH AUTO TECH CORP CO LTD

Network optimal defense strategy selection method and device based on bounded rational game theory

ActiveCN108833402AObjectively reflect randomnessObjectively reflect diversityTransmissionTheoretical computer scienceArtificial intelligence
The invention belongs to the technical field of network security and particularly relates to a network optimal defense strategy selection method and device based on a bounded rational game theory. Themethod comprises the following steps: constructing an offensive and defensive game model in a bounded rational situation according to the bounded rationality of the actual offensive and defensive sides; a random optimal reaction dynamic differential equation of a participant selection strategy is established by setting a participant rationality degree parameter in combination with an offensive and defensive game strategy set and according to historical data; the two simultaneous offensive and defensive parties are treated as the random optimal reaction dynamic differential equation of the participant; and an optimal defense strategy is determined and output by solving and screening a stable equilibrium point. Compared with the method of only giving an equilibrium solution and not analyzing the Nash equilibrium formation process, the network optimal defense strategy selection method and device based on bounded rational game theory in the present invention analyze the dynamic evolutionprocess of the bounded rational evolution game equilibrium, and the utility and the guiding significance are stronger when being applied to network defense decision; the dynamic analysis efficiency ofstrategy selection can be improved; and the network security performance is further improved.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU +1

Computer network defensive strategy conversion-oriented semantic similarity detection system

InactiveCN101950340AAchieving Semantic Consistency IdentificationSmall amount of calculationPlatform integrity maintainanceCyber-attackSyntax error
The invention discloses a computer network defensive strategy conversion-oriented semantic similarity detection system, which comprises a defensive strategy configuration module, a strategy statement processing module, a node-link configuration module, a lexical and syntax analyzing module, a measure statement processing module, a structural similarity calculating module, a key concept pair matching module, a concept similarity calculating module, a CND strategy and measure body module and a similarity accumulation calculating module. A traditional symbol description-based strategy conversion system can only detect lexical and syntax errors before and after conversion, and hardly detects semantic inconsistency before and after strategy conversion comprehensively and automatically. By employing the semantic similarity processing method, the semantic similarity detection system automatically and effectively measures semantic difference before and after the computer network defensive strategy conversion, provides a basis for accurately deploying network defensive measures for semantics, is mainly applied to a computer network defensive system, deploys defensive measures according to a certain condition based on large-scale network attack, and rapidly and effectively fulfills the aim of large-scale defensive measure deployment.
Owner:BEIHANG UNIV

Automatic intrusion response decision making method based on Q-learning

The invention belongs to the technical field of information security, and particularly relates to an automatic intrusion response decision making method based on Q-learning. The method comprises the following steps: scanning system vulnerability, constructing an attack graph, and establishing a network state layer, an attack pattern matching layer and a response measure layer according to the attack graph; establishing a mapping relationship among the network state layer, the attack pattern matching layer and the response measure layer; receiving an intrusion alarm from a network defense device, and mapping the intrusion alarm to a corresponding network state; selecting a defense action according to the mapping relationship, and notifying the system of the result; performing online learning by using the execution result of the defense action, and updating the mapping relationship between the attack pattern matching layer and the response measure layer; and returning to the step of mapping the intrusion alarm to the corresponding network state, and performing automatic response decision marking and online learning, until a defender terminates the defense. By adoption of the automatic intrusion response decision making method based on Q-learning provided by the invention, evaluation of multiple response purposes of the strategy can be achieved, the demand of multiple response purposes can be met, the instantaneity and accuracy of the intrusion detection are improved, the network resource consumption is reduced, and the overall performance of the system is improved.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Multi-step attack dynamic defense decision selection method and system for network attack and defense

ActiveCN110602047AImprove defenseImprove security governance capabilitiesData switching networksAttack graphAttack strategy
The invention belongs to the technical field of network security, and particularly relates to a multi-step attack dynamic defense decision selection method and system for network attack and defense, and the method comprises the steps: generating a network attribute attack graph through the analysis of network security element information; constructing a network survivability game model based on the attack graph, representing an attack and defense strategy and a path by the model by utilizing an attack and defense strategy matrix, and quantifying attack and defense intensity and network survivability; predicting the next attack behavior of an attacker according to the attack strategy matrix in the model, and selecting the optimal multi-step attack defense strategy according to the attack defense strategy cost. The attack and defense strategy is implemented around the network survivability, the situation pre-judgment and defense strategy can be adjusted according to the dynamically changing attack and defense situation of the network, an easily understood and reasonable defense decision is provided for network security management personnel, the network defense capability is improved,the application prospect is good, and the method has important guiding significance and value for the network security technology.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Collaborative defense method for network protection and system

ActiveCN109587174AGood for in-depth analysisGet the effect of defenseTransmissionCentralized managementProtection system
The invention discloses a collaborative defense method for network protection and system. The system comprises a decision-making and deployment layer and a collaboration and monitoring layer, whereinthe decision-making and deployment layer uses an acquired network security early warning event, a defense intension is formulated according to the defense purpose of the network security and the current situation of the network security, a network defense strategy is later generated by a decision-making engine, and a defense task is deployed according to the defense strategy; the collaboration andmonitoring layer comprises a control center and network security devices, thereby realizing collaborative task deployment between network security devices and real-time monitoring on the network defense condition; the control center is in communication connection with the decision-making and deployment layer and the network security devices for data flow control and logical control; and the control center comprises a collaborative defense strategy analysis module, a collaborative defense strategy subscription module and a collaborative defense strategy distribution module. A collaborative defense solution with security perception, collaborative protection and centralized management as the core can be given, and an active, integrated and comprehensive dynamic security protection system isrealized.
Owner:GUANGDONG POWER GRID CO LTD INFORMATION CENT

Network anti-attack device, system and method, readable medium and storage controller

InactiveCN107241338AAggressive Behavior BlockingTransmissionControl storeAnalysis center
The invention discloses a network anti-attack device, system and method, a readable medium and a storage controller. The network anti-attack device comprises a camouflage behavior processing center, a linkage processing center and a threatening behavior analysis center, wherein the camouflage behavior processing center is used for camouflaging a preset number of false terminals and making the false terminals to transmit analog broadcasts to a network; the linkage processing center is used for intercepting the attack and extracting attack behavior characteristics of the attack when the analog broadcasts are attacked and transmitting the attack behavior characteristics to a defensive system in the network to interrupt the attack through the defensive system; and the threatening behavior analysis center is used for receiving interrupt information transmitted by the defensive system after successfully interrupting the attack, extracting interrupt information characteristics of the interrupt information, packaging the attack behavior characteristics and the interrupt information characteristics to form a characteristic group and transmitting the characteristic group to a database to form a characteristic library. The problem that a passive defense mode falls behind virus transmission is effectively solved, an overall network defense linkage system is formed, and the security of a real terminal is improved.
Owner:BEIJING VRV SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products