CN103368976A - Network security evaluation device based on attack graph adjacent matrix - Google Patents
Network security evaluation device based on attack graph adjacent matrix Download PDFInfo
- Publication number
- CN103368976A CN103368976A CN2013103290961A CN201310329096A CN103368976A CN 103368976 A CN103368976 A CN 103368976A CN 2013103290961 A CN2013103290961 A CN 2013103290961A CN 201310329096 A CN201310329096 A CN 201310329096A CN 103368976 A CN103368976 A CN 103368976A
- Authority
- CN
- China
- Prior art keywords
- network
- main frame
- matrix
- attack graph
- attack
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Computer And Data Communications (AREA)
Abstract
Description
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310329096.1A CN103368976B (en) | 2013-07-31 | 2013-07-31 | Network security evaluation device based on attack graph adjacent matrix |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310329096.1A CN103368976B (en) | 2013-07-31 | 2013-07-31 | Network security evaluation device based on attack graph adjacent matrix |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103368976A true CN103368976A (en) | 2013-10-23 |
CN103368976B CN103368976B (en) | 2015-03-04 |
Family
ID=49369513
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310329096.1A Active CN103368976B (en) | 2013-07-31 | 2013-07-31 | Network security evaluation device based on attack graph adjacent matrix |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103368976B (en) |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105704093A (en) * | 2014-11-25 | 2016-06-22 | ***通信集团设计院有限公司 | Firewall access control strategy debugging method, device and system |
CN105991521A (en) * | 2015-01-30 | 2016-10-05 | 阿里巴巴集团控股有限公司 | Network risk assessment method and network risk assessment device |
CN106657144A (en) * | 2017-01-20 | 2017-05-10 | 北京理工大学 | Dynamic protection path planning method based on reinforcement learning |
CN106850607A (en) * | 2017-01-20 | 2017-06-13 | 北京理工大学 | The quantitative estimation method of the network safety situation based on attack graph |
CN107135221A (en) * | 2017-05-10 | 2017-09-05 | 上海海事大学 | A kind of method of gradual solution K maximum probability attack paths |
CN107332802A (en) * | 2016-04-28 | 2017-11-07 | ***通信集团江西有限公司 | A kind of firewall policy monitoring method and device |
CN107566376A (en) * | 2017-09-11 | 2018-01-09 | 中国信息安全测评中心 | One kind threatens information generation method, apparatus and system |
CN108270774A (en) * | 2017-12-22 | 2018-07-10 | 杭州安恒信息技术有限公司 | A kind of attack detection and means of defence based on attack graph |
CN108959931A (en) * | 2017-05-24 | 2018-12-07 | 阿里巴巴集团控股有限公司 | Leak detection method and device, information interacting method and equipment |
CN109977680A (en) * | 2019-03-13 | 2019-07-05 | 北京国舜科技股份有限公司 | A kind of business datum security risk recognition methods and system |
CN110289995A (en) * | 2019-06-11 | 2019-09-27 | 同济大学 | Based on the social networks behavior monitoring method and device using attribute attack graph |
CN110401626A (en) * | 2019-03-14 | 2019-11-01 | 腾讯科技(深圳)有限公司 | A kind of hacker attack hierarchical detection method and device |
CN110460481A (en) * | 2019-09-12 | 2019-11-15 | 南京经纬信安科技有限公司 | A kind of recognition methods of network key assets |
CN110557393A (en) * | 2019-09-05 | 2019-12-10 | 腾讯科技(深圳)有限公司 | network risk assessment method and device, electronic equipment and storage medium |
CN110572409A (en) * | 2019-09-16 | 2019-12-13 | 国家计算机网络与信息安全管理中心 | Industrial Internet security risk prediction method, device, equipment and storage medium |
CN110781453A (en) * | 2019-09-23 | 2020-02-11 | 太原理工大学 | Complex theory battle network fragile edge identification method |
CN111193617A (en) * | 2019-12-17 | 2020-05-22 | 中移(杭州)信息技术有限公司 | Webpage tampering identification method and device, electronic equipment and storage medium |
CN112003864A (en) * | 2020-08-25 | 2020-11-27 | 上海聚水潭网络科技有限公司 | Website security detection system and method based on full flow |
CN112114579A (en) * | 2020-09-28 | 2020-12-22 | 哈尔滨工业大学(威海) | Industrial control system safety measurement method based on attack graph |
CN112819336A (en) * | 2021-02-03 | 2021-05-18 | 国家电网有限公司 | Power monitoring system network threat-based quantification method and system |
CN112904817A (en) * | 2021-01-19 | 2021-06-04 | 哈尔滨工业大学(威海) | Global safety detection system for intelligent manufacturing production line and working method thereof |
CN113051575A (en) * | 2021-03-25 | 2021-06-29 | 深圳市联软科技股份有限公司 | Method and system for generating red and blue attack resisting exercise scheme based on graph database |
US11187797B2 (en) | 2018-10-31 | 2021-11-30 | Institute Of Electronics, Chinese Academy Of Sciences | Method for range ambiguity suppression based on multi-degree-of-freedom frequency modulation signal |
CN113779591A (en) * | 2021-09-16 | 2021-12-10 | 中国民航大学 | Network host node security risk assessment method based on host importance |
CN113949570A (en) * | 2021-10-18 | 2022-01-18 | 北京航空航天大学 | Penetration test attack path selection method and system based on attack graph |
CN114143109A (en) * | 2021-12-08 | 2022-03-04 | 安天科技集团股份有限公司 | Visual processing method, interaction method and device for attack data |
CN114301716A (en) * | 2022-02-22 | 2022-04-08 | 绿盟科技集团股份有限公司 | Network security assessment method and device, network security equipment and storage medium |
CN115296896A (en) * | 2022-08-03 | 2022-11-04 | 中国电子科技集团公司信息科学研究院 | Attack path dynamic generation method and device and electronic equipment |
CN117579398A (en) * | 2024-01-17 | 2024-02-20 | 国网浙江省电力有限公司 | Attack path prediction method and device based on distributed energy system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101162993A (en) * | 2007-11-29 | 2008-04-16 | 哈尔滨工程大学 | Network risk analysis method |
CN102098306A (en) * | 2011-01-27 | 2011-06-15 | 北京信安天元科技有限公司 | Network attack path analysis method based on incidence matrixes |
-
2013
- 2013-07-31 CN CN201310329096.1A patent/CN103368976B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101162993A (en) * | 2007-11-29 | 2008-04-16 | 哈尔滨工程大学 | Network risk analysis method |
CN102098306A (en) * | 2011-01-27 | 2011-06-15 | 北京信安天元科技有限公司 | Network attack path analysis method based on incidence matrixes |
Non-Patent Citations (2)
Title |
---|
王如义: "基于关联分析的漏洞检测和安全评估技术研究", 《中国优秀硕士学位论文全文数据库》, 10 July 2012 (2012-07-10) * |
钟尚勤: "基于主机攻击图的网络安全性研究", 《中国博士学位论文全文数据库》, 26 November 2012 (2012-11-26) * |
Cited By (51)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105704093A (en) * | 2014-11-25 | 2016-06-22 | ***通信集团设计院有限公司 | Firewall access control strategy debugging method, device and system |
CN105704093B (en) * | 2014-11-25 | 2018-06-12 | ***通信集团设计院有限公司 | A kind of firewall access control policy error-checking method, apparatus and system |
CN105991521B (en) * | 2015-01-30 | 2019-06-21 | 阿里巴巴集团控股有限公司 | Network risk assessment method and device |
CN105991521A (en) * | 2015-01-30 | 2016-10-05 | 阿里巴巴集团控股有限公司 | Network risk assessment method and network risk assessment device |
CN107332802A (en) * | 2016-04-28 | 2017-11-07 | ***通信集团江西有限公司 | A kind of firewall policy monitoring method and device |
CN107332802B (en) * | 2016-04-28 | 2020-08-07 | ***通信集团江西有限公司 | Firewall policy monitoring method and device |
CN106657144A (en) * | 2017-01-20 | 2017-05-10 | 北京理工大学 | Dynamic protection path planning method based on reinforcement learning |
CN106850607A (en) * | 2017-01-20 | 2017-06-13 | 北京理工大学 | The quantitative estimation method of the network safety situation based on attack graph |
CN106850607B (en) * | 2017-01-20 | 2019-09-20 | 北京理工大学 | The quantitative estimation method of network safety situation based on attack graph |
CN106657144B (en) * | 2017-01-20 | 2019-06-28 | 北京理工大学 | A kind of dynamic protection paths planning method based on enhancing study |
CN107135221B (en) * | 2017-05-10 | 2020-05-05 | 上海海事大学 | Method for progressively solving K maximum probability attack path |
CN107135221A (en) * | 2017-05-10 | 2017-09-05 | 上海海事大学 | A kind of method of gradual solution K maximum probability attack paths |
CN108959931A (en) * | 2017-05-24 | 2018-12-07 | 阿里巴巴集团控股有限公司 | Leak detection method and device, information interacting method and equipment |
CN108959931B (en) * | 2017-05-24 | 2022-03-01 | 阿里巴巴集团控股有限公司 | Vulnerability detection method and device, information interaction method and equipment |
CN107566376B (en) * | 2017-09-11 | 2020-05-05 | 中国信息安全测评中心 | Threat information generation method, device and system |
CN107566376A (en) * | 2017-09-11 | 2018-01-09 | 中国信息安全测评中心 | One kind threatens information generation method, apparatus and system |
CN108270774A (en) * | 2017-12-22 | 2018-07-10 | 杭州安恒信息技术有限公司 | A kind of attack detection and means of defence based on attack graph |
US11187797B2 (en) | 2018-10-31 | 2021-11-30 | Institute Of Electronics, Chinese Academy Of Sciences | Method for range ambiguity suppression based on multi-degree-of-freedom frequency modulation signal |
CN109977680A (en) * | 2019-03-13 | 2019-07-05 | 北京国舜科技股份有限公司 | A kind of business datum security risk recognition methods and system |
CN110401626B (en) * | 2019-03-14 | 2022-02-18 | 腾讯科技(深圳)有限公司 | Hacker attack grading detection method and device |
CN110401626A (en) * | 2019-03-14 | 2019-11-01 | 腾讯科技(深圳)有限公司 | A kind of hacker attack hierarchical detection method and device |
CN110289995A (en) * | 2019-06-11 | 2019-09-27 | 同济大学 | Based on the social networks behavior monitoring method and device using attribute attack graph |
CN110289995B (en) * | 2019-06-11 | 2021-02-02 | 同济大学 | Social network behavior monitoring method and device based on attribute attack graph |
CN110557393A (en) * | 2019-09-05 | 2019-12-10 | 腾讯科技(深圳)有限公司 | network risk assessment method and device, electronic equipment and storage medium |
CN110460481B (en) * | 2019-09-12 | 2022-02-25 | 南京经纬信安科技有限公司 | Identification method of network key assets |
CN110460481A (en) * | 2019-09-12 | 2019-11-15 | 南京经纬信安科技有限公司 | A kind of recognition methods of network key assets |
CN110572409A (en) * | 2019-09-16 | 2019-12-13 | 国家计算机网络与信息安全管理中心 | Industrial Internet security risk prediction method, device, equipment and storage medium |
CN110572409B (en) * | 2019-09-16 | 2021-10-12 | 国家计算机网络与信息安全管理中心 | Industrial Internet security risk prediction method, device, equipment and storage medium |
CN110781453A (en) * | 2019-09-23 | 2020-02-11 | 太原理工大学 | Complex theory battle network fragile edge identification method |
CN110781453B (en) * | 2019-09-23 | 2023-11-24 | 太原理工大学 | Network fragile edge recognition method based on complex theory |
CN111193617B (en) * | 2019-12-17 | 2022-10-18 | 中移(杭州)信息技术有限公司 | Webpage tampering identification method and device, electronic equipment and storage medium |
CN111193617A (en) * | 2019-12-17 | 2020-05-22 | 中移(杭州)信息技术有限公司 | Webpage tampering identification method and device, electronic equipment and storage medium |
CN112003864A (en) * | 2020-08-25 | 2020-11-27 | 上海聚水潭网络科技有限公司 | Website security detection system and method based on full flow |
CN112003864B (en) * | 2020-08-25 | 2022-01-14 | 上海聚水潭网络科技有限公司 | Website security detection system and method based on full flow |
CN112114579A (en) * | 2020-09-28 | 2020-12-22 | 哈尔滨工业大学(威海) | Industrial control system safety measurement method based on attack graph |
CN112904817B (en) * | 2021-01-19 | 2022-08-12 | 哈尔滨工业大学(威海) | Global safety detection system for intelligent manufacturing production line and working method thereof |
CN112904817A (en) * | 2021-01-19 | 2021-06-04 | 哈尔滨工业大学(威海) | Global safety detection system for intelligent manufacturing production line and working method thereof |
CN112819336A (en) * | 2021-02-03 | 2021-05-18 | 国家电网有限公司 | Power monitoring system network threat-based quantification method and system |
CN112819336B (en) * | 2021-02-03 | 2023-12-15 | 国家电网有限公司 | Quantification method and system based on network threat of power monitoring system |
CN113051575A (en) * | 2021-03-25 | 2021-06-29 | 深圳市联软科技股份有限公司 | Method and system for generating red and blue attack resisting exercise scheme based on graph database |
CN113779591A (en) * | 2021-09-16 | 2021-12-10 | 中国民航大学 | Network host node security risk assessment method based on host importance |
CN113779591B (en) * | 2021-09-16 | 2023-11-03 | 中国民航大学 | Network host node security risk assessment method based on host importance |
CN113949570A (en) * | 2021-10-18 | 2022-01-18 | 北京航空航天大学 | Penetration test attack path selection method and system based on attack graph |
CN114143109A (en) * | 2021-12-08 | 2022-03-04 | 安天科技集团股份有限公司 | Visual processing method, interaction method and device for attack data |
CN114143109B (en) * | 2021-12-08 | 2023-11-10 | 安天科技集团股份有限公司 | Visual processing method, interaction method and device for attack data |
CN114301716B (en) * | 2022-02-22 | 2023-05-26 | 绿盟科技集团股份有限公司 | Network security assessment method and device, network security equipment and storage medium |
CN114301716A (en) * | 2022-02-22 | 2022-04-08 | 绿盟科技集团股份有限公司 | Network security assessment method and device, network security equipment and storage medium |
CN115296896A (en) * | 2022-08-03 | 2022-11-04 | 中国电子科技集团公司信息科学研究院 | Attack path dynamic generation method and device and electronic equipment |
CN115296896B (en) * | 2022-08-03 | 2023-07-18 | 中国电子科技集团公司信息科学研究院 | Attack path dynamic generation method and device and electronic equipment |
CN117579398A (en) * | 2024-01-17 | 2024-02-20 | 国网浙江省电力有限公司 | Attack path prediction method and device based on distributed energy system |
CN117579398B (en) * | 2024-01-17 | 2024-04-02 | 国网浙江省电力有限公司 | Attack path prediction method and device based on distributed energy system |
Also Published As
Publication number | Publication date |
---|---|
CN103368976B (en) | 2015-03-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103368976B (en) | Network security evaluation device based on attack graph adjacent matrix | |
CN112738015B (en) | Multi-step attack detection method based on interpretable convolutional neural network CNN and graph detection | |
CN110620759B (en) | Multi-dimensional association-based network security event hazard index evaluation method and system | |
CN105871882B (en) | Network security risk analysis method based on network node fragility and attack information | |
CN115296924B (en) | Network attack prediction method and device based on knowledge graph | |
CN107277039A (en) | A kind of network attack data analysis and intelligent processing method | |
CN107241352A (en) | A kind of net security accident classificaiton and Forecasting Methodology and system | |
CN104539626A (en) | Network attack scene generating method based on multi-source alarm logs | |
CN103368979A (en) | Network security verifying device based on improved K-means algorithm | |
CN104125217A (en) | Cloud data center real-time risk assessment method based on mainframe log analysis | |
CN104348652A (en) | Method and device for evaluating system security based on correlation analysis | |
CN102137115A (en) | Method for evaluating malicious code attack effect of communication network | |
CN116366376B (en) | APT attack traceability graph analysis method | |
CN114021040A (en) | Method and system for alarming and protecting malicious event based on service access | |
CN115225384B (en) | Network threat degree evaluation method and device, electronic equipment and storage medium | |
CN115021997A (en) | Network intrusion detection system based on machine learning | |
CN110298170B (en) | Power SCADA system security assessment method considering blind attack factors | |
CN115795330A (en) | Medical information anomaly detection method and system based on AI algorithm | |
CN116996286A (en) | Network attack and security vulnerability management framework platform based on big data analysis | |
CN106101071A (en) | The method that defence link drain type CC that a kind of Behavior-based control triggers is attacked | |
CN117235600A (en) | User abnormal behavior detection method and system | |
CN111191230A (en) | Fast network attack backtracking mining method based on convolutional neural network and application | |
CN102611714B (en) | Based on the network intrusions Forecasting Methodology of contact discovery technique | |
Zhang et al. | An active defense model and framework of insider threats detection and sense | |
CN113489709B (en) | Flow detection method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C53 | Correction of patent of invention or patent application | ||
CB03 | Change of inventor or designer information |
Inventor after: Chen Ting Inventor after: Zhang Xiaosong Inventor after: Niu Weina Inventor after: Chen Ruidong Inventor after: Wang Dong Inventor after: Zhang Jiansong Inventor after: Jiang Wei Inventor after: Li Jianbin Inventor before: Zhang Xiaosong Inventor before: Niu Weina Inventor before: Chen Ruidong Inventor before: Wang Dong Inventor before: Zhang Jiansong Inventor before: Li Jianbin |
|
COR | Change of bibliographic data |
Free format text: CORRECT: INVENTOR; FROM: ZHANG XIAOSONG NIU WEINA CHEN RUIDONG WANG DONG ZHANG JIANSONG LI JIANBIN TO: CHEN TING ZHANG XIAOSONG NIU WEINA CHEN RUIDONG WANG DONG ZHANG JIANSONG JIANG WEI LI JIANBIN |
|
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Zhang Xiaosong Inventor after: Niu Weina Inventor after: Chen Ruidong Inventor after: Wang Dong Inventor after: Chen Ting Inventor after: Zhang Jiansong Inventor after: Jiang Wei Inventor after: Li Jianbin Inventor before: Chen Ting Inventor before: Zhang Xiaosong Inventor before: Niu Weina Inventor before: Chen Ruidong Inventor before: Wang Dong Inventor before: Zhang Jiansong Inventor before: Jiang Wei Inventor before: Li Jianbin |
|
CB03 | Change of inventor or designer information | ||
COR | Change of bibliographic data |
Free format text: CORRECT: INVENTOR; FROM: CHEN TING ZHANG XIAOSONG NIU WEINA CHEN RUIDONG WANG DONG ZHANG JIANSONG JIANG WEI LI JIANBIN TO: ZHANG XIAOSONG NIU WEINA CHEN RUIDONG WANG DONG CHEN TING ZHANG JIANSONG JIANG WEI LI JIANBIN |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |