In the information extraction, information sources can be screened according to the characteristics of the target network at the present stage, and the knowledge graph generated thereby can play a role in assisting the security analysis of the general network or power grid control network, mobile Internet and other special networks. In the method proposed in this paper, knowledge reasoning is mainly based on the attack conditions and attack methods to reason about the success rate and return of the attack. Through the obtained quality information, map construction information extraction and reasoning are performed to realize the correlation analysis of the information, and the information processing results are stored in the graphic structure. When analyzing the alerts generated by IDS, it is necessary to solve the multi-source alarm format generated by various devices produced by different suppliers. The attack diagram constructs the attack mode to guide the defense side to take targeted defense measures, and the attack success rate is used to judge the defense priority of all network nodes. After completing the construction of the graph, the attack graph is generated for the specific network environment under the guidance of the knowledge graph. In the process of attack graph generation, attack method and attack condition of attack instance can be used to guide the match of pre-condition and post-condition, so as to find the attack path. Attack success rate and attack profit attribute can be used to assist subsequent risk analysis. After simulation tests, the timeliness and availability of the system are verified, and this makes a contribution to the grid network management.
This paper analyzes the current real-time monitoring system based on grey-related IoT security sensors for the detection of risk factors in the production environment of the Internet of Things and proposes a design plan for the Internet of Things environment monitoring based on the grey-related Internet of Things security sensor network, and according to the reliability guarantee mechanism of the system, a three-dimensional uniform IoT node deployment method suitable for IoT security monitoring is proposed. Based on the grey correlation analysis, it can provide a quantitative measurement analysis for the development and change state of a system, which is very suitable for the analysis of dynamic operating systems. As a real-time dynamic system of the Internet of Things, the use of grey correlation method to analyze its network security status has good operability and practical value. According to the multisource information processing technology, the monitoring data are preprocessed by dynamic limiting filtering, and then the data are fused at the data level with the optimal weighting algorithm. Through the use of grey correlation analysis to quantify the relative impact of cyberattacks on the network within a certain period of time, the quantitative assessment of the security environment and status of the entire network is realized. Finally, the characteristics of grey relational analysis and rough set theory attribute reduction are used to form the basis of grey correlation decision-level fusion algorithm, to achieve effective processing of the data of the Internet of Things security monitoring system.
In order to solve the security problems caused by network vulnerabilities, a web application vulnerability detection method based on machine learning is proposed to effectively prevent cross site scripting attacks of web applications and reduce the occurrence of network security incidents. Through the in-depth study of the existing security vulnerability detection technology, combined with the development process of machine learning security vulnerability detection technology, the requirements of security vulnerability detection model are analyzed in detail, and a cross site scripting security vulnerability detection model for web application is designed and implemented. Based on the existing network vulnerability detection technology and tools, the verification code identification function is added, which solves the problem that the data can be submitted to the server only by inputting the verification code. According to the server filtering rules, the network code bypassing the server filtering is constructed. Experimental results show that the model has a low rate of missed detection and false alarm, and the improved model is more efficient.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.