Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 3. Отображено 3.
11-08-2023 дата публикации

Attack path prediction model generation method and device based on network attack graph

Номер: CN116582349A
Принадлежит:

The invention discloses an attack path prediction model generation method and device based on a network attack graph, and relates to the technical field of industrial control security. Network vulnerability information of a whole industrial control network is generated by obtaining industrial control network data and vulnerability data of a national vulnerability database; generating a network attack graph of each area of the industrial control network according to the network vulnerability information, extracting information required by attack and defense party game adversarial training from the network attack graph, carrying out adversarial training to obtain an attack path selection probability, quantifying a weight of a directed edge of the network attack graph according to the attack path selection probability, and obtaining an attack path selection probability; the vulnerability availability is calculated according to the network attack graph and the network vulnerability information ...

Подробнее
15-08-2023 дата публикации

Industrial control security event identification response method and system based on vulnerability utilization network

Номер: CN116599726A
Принадлежит:

The invention provides an industrial control security event identification response method and system based on a vulnerability utilization network, the system comprises a knowledge graph construction part and a security event identification response part, and the method comprises the following steps: extracting knowledge base data and converting the knowledge base data into nodes in a knowledge graph; establishing connection between the nodes by using a mode based on a pre-training machine learning model; matching the state of the industrial control system by using the key identification features of the equipment and the attack mode node and mapping the state to the vulnerability node; connecting the matched vulnerability nodes to form a vulnerability utilization network; and corresponding response information is given according to different forms of the vulnerability utilization network. Compared with a traditional industrial control security detection and response method, the method has ...

Подробнее
28-07-2023 дата публикации

Industrial control anomaly detection method and system based on distributed environment

Номер: CN116501022A
Принадлежит:

The invention provides an industrial control anomaly detection method based on a distributed environment. The method comprises the following steps: acquiring a network data packet; analyzing and preprocessing the acquired data, converting the data into an adjacent matrix form, and constructing a directed graph; dividing the graph into a plurality of sub-graphs, and inputting the sub-graphs into a plurality of servers for training; and after model training is completed, inputting actual industrial control network data into the model, and judging whether the actual industrial control network data is abnormal or not. According to the invention, a distributed architecture is adopted, so that the performance and time overhead required by the host during training are greatly reduced. The invention further provides an industrial control anomaly detection system based on the distributed environment.

Подробнее