Security policy selection method and device based on LSTM terminal adaptive optimization, and medium
The invention discloses a security policy selection method and device based on LSTM (Long Short Term Memory) terminal adaptive optimization, and a medium, and the method comprises the steps: combining a threat type, an occurrence probability, a system vulnerability level, a system security level and...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | HAN JIANFANG YE YANG JIANG SHIBAO DING CHAO DU CUIFENG |
description | The invention discloses a security policy selection method and device based on LSTM (Long Short Term Memory) terminal adaptive optimization, and a medium, and the method comprises the steps: combining a threat type, an occurrence probability, a system vulnerability level, a system security level and time through LSTM, forming the recognition and analysis of an attack intention, and finally generating a maximum possible attack path. And a security policy model is selected based on the attack loss, corresponding cost and security level requirements of the nodes related to the attack path. Therefore, according to the embodiment of the invention, on the basis of pre-judging the attack intention, the terminal access security risk is measured by adopting the maximum possibility attack path, the dynamic change of the terminal risk and the system security requirement can be quickly adapted, and in addition, the resource dynamics is also considered, so that the security risk of the terminal can be effectively reduced. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN116170194A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN116170194A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN116170194A3</originalsourceid><addsrcrecordid>eNqNi70KwkAQBtNYiPoOa6_goSiWEhQLtUn6sN594sL9kVwC8emN4gNYTTEz48wU0G0tqacYrOieGljoJMGTQ3oGQ-wNGXSiQXduYGhQl6K8UkLtxLMlNhyTdKAwwMmLP_viOzoYad00Gz3YNpj9OMnmp2OZn5eIoUITWcMjVflNqa3ardR-c1j_07wBxII-hg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Security policy selection method and device based on LSTM terminal adaptive optimization, and medium</title><source>esp@cenet</source><creator>HAN JIANFANG ; YE YANG ; JIANG SHIBAO ; DING CHAO ; DU CUIFENG</creator><creatorcontrib>HAN JIANFANG ; YE YANG ; JIANG SHIBAO ; DING CHAO ; DU CUIFENG</creatorcontrib><description>The invention discloses a security policy selection method and device based on LSTM (Long Short Term Memory) terminal adaptive optimization, and a medium, and the method comprises the steps: combining a threat type, an occurrence probability, a system vulnerability level, a system security level and time through LSTM, forming the recognition and analysis of an attack intention, and finally generating a maximum possible attack path. And a security policy model is selected based on the attack loss, corresponding cost and security level requirements of the nodes related to the attack path. Therefore, according to the embodiment of the invention, on the basis of pre-judging the attack intention, the terminal access security risk is measured by adopting the maximum possibility attack path, the dynamic change of the terminal risk and the system security requirement can be quickly adapted, and in addition, the resource dynamics is also considered, so that the security risk of the terminal can be effectively reduced.</description><language>chi ; eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20230526&DB=EPODOC&CC=CN&NR=116170194A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76516</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20230526&DB=EPODOC&CC=CN&NR=116170194A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>HAN JIANFANG</creatorcontrib><creatorcontrib>YE YANG</creatorcontrib><creatorcontrib>JIANG SHIBAO</creatorcontrib><creatorcontrib>DING CHAO</creatorcontrib><creatorcontrib>DU CUIFENG</creatorcontrib><title>Security policy selection method and device based on LSTM terminal adaptive optimization, and medium</title><description>The invention discloses a security policy selection method and device based on LSTM (Long Short Term Memory) terminal adaptive optimization, and a medium, and the method comprises the steps: combining a threat type, an occurrence probability, a system vulnerability level, a system security level and time through LSTM, forming the recognition and analysis of an attack intention, and finally generating a maximum possible attack path. And a security policy model is selected based on the attack loss, corresponding cost and security level requirements of the nodes related to the attack path. Therefore, according to the embodiment of the invention, on the basis of pre-judging the attack intention, the terminal access security risk is measured by adopting the maximum possibility attack path, the dynamic change of the terminal risk and the system security requirement can be quickly adapted, and in addition, the resource dynamics is also considered, so that the security risk of the terminal can be effectively reduced.</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNi70KwkAQBtNYiPoOa6_goSiWEhQLtUn6sN594sL9kVwC8emN4gNYTTEz48wU0G0tqacYrOieGljoJMGTQ3oGQ-wNGXSiQXduYGhQl6K8UkLtxLMlNhyTdKAwwMmLP_viOzoYad00Gz3YNpj9OMnmp2OZn5eIoUITWcMjVflNqa3ardR-c1j_07wBxII-hg</recordid><startdate>20230526</startdate><enddate>20230526</enddate><creator>HAN JIANFANG</creator><creator>YE YANG</creator><creator>JIANG SHIBAO</creator><creator>DING CHAO</creator><creator>DU CUIFENG</creator><scope>EVB</scope></search><sort><creationdate>20230526</creationdate><title>Security policy selection method and device based on LSTM terminal adaptive optimization, and medium</title><author>HAN JIANFANG ; YE YANG ; JIANG SHIBAO ; DING CHAO ; DU CUIFENG</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN116170194A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2023</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>HAN JIANFANG</creatorcontrib><creatorcontrib>YE YANG</creatorcontrib><creatorcontrib>JIANG SHIBAO</creatorcontrib><creatorcontrib>DING CHAO</creatorcontrib><creatorcontrib>DU CUIFENG</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>HAN JIANFANG</au><au>YE YANG</au><au>JIANG SHIBAO</au><au>DING CHAO</au><au>DU CUIFENG</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Security policy selection method and device based on LSTM terminal adaptive optimization, and medium</title><date>2023-05-26</date><risdate>2023</risdate><abstract>The invention discloses a security policy selection method and device based on LSTM (Long Short Term Memory) terminal adaptive optimization, and a medium, and the method comprises the steps: combining a threat type, an occurrence probability, a system vulnerability level, a system security level and time through LSTM, forming the recognition and analysis of an attack intention, and finally generating a maximum possible attack path. And a security policy model is selected based on the attack loss, corresponding cost and security level requirements of the nodes related to the attack path. Therefore, according to the embodiment of the invention, on the basis of pre-judging the attack intention, the terminal access security risk is measured by adopting the maximum possibility attack path, the dynamic change of the terminal risk and the system security requirement can be quickly adapted, and in addition, the resource dynamics is also considered, so that the security risk of the terminal can be effectively reduced.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN116170194A |
source | esp@cenet |
subjects | CALCULATING COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Security policy selection method and device based on LSTM terminal adaptive optimization, and medium |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-21T13%3A45%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=HAN%20JIANFANG&rft.date=2023-05-26&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN116170194A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |