Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Information asset protection method based on intrusion tolerance

An intrusion tolerance and asset technology, applied in the field of information security, can solve problems such as the difficulty of identifying legitimate users, the impossibility of controlling and reviewing the system, and the system being attacked and invaded, and achieves sensitive state switching, high reliability, and low space-time overhead. Effect

Inactive Publication Date: 2012-01-04
北京峰盛博远科技股份有限公司
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it is very difficult to identify real and legitimate users in a complex network environment. It is impossible to control and review every detail of the system, and the system still has the possibility of being attacked and invaded.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information asset protection method based on intrusion tolerance
  • Information asset protection method based on intrusion tolerance
  • Information asset protection method based on intrusion tolerance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] combine Figure 4 , the present invention discloses an information asset protection method based on intrusion tolerance. Firstly, the core data and service status are detected and monitored. Make an objective evaluation of the status and upload it to the response and fault handling module of the system in the form of an event, and then start the local fault isolation and system restoration and reconstruction mechanism according to the result of the system status evaluation to ensure the confidentiality of core information assets. The invention introduces intrusion tolerance into the design of a single host, and provides basic self-diagnosis, fault isolation, restoration and reconstruction, and secure communication capabilities for a single system in an environment with limited resources.

[0015] like figure 1 , an information asset protection method based on intrusion tolerance, the specific process is as follows:

[0016] (1) The status detection module adopts a dyn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information asset protection method based on intrusion tolerance. The information asset protection method comprises the following steps: firstly detecting and monitoring core data and service states; by virtue of an evaluation model carried by a state evaluation module and a threshold value which is preset in a configuration file by a user, performing objective evaluation on the system state and uploading the objective evaluation result to a response and fault handling module of a system in the form of events by using the state evaluation module; and then according to the system state evaluation result, starting local fault isolation and system recovery reconstruction mechanisms so as to guarantee the confidentiality of core information assets. The information asset protection method has the beneficial effects that the intrusion tolerance is introduced into an individual host so as to provide basic functions such as auto-diagnosis, fault isolation, recovery reconstruction and safety communication for each system in a resource constraint environment.

Description

technical field [0001] The invention belongs to information asset protection technology related to the field of information security, in particular to an information asset protection method that uses a state transfer algorithm for state control and a multi-factor fuzzy model for comprehensive state evaluation to realize an intrusion tolerance framework. Background technique [0002] With the increasing popularization of informatization, enterprises or institutions have established internal networks. Network erection and information system construction have brought many conveniences to these units, such as resource sharing, office automation, and convenient information transmission, etc., which have greatly improved work efficiency. However, at the same time, the number of leaks reported by the media continued unabated, including the theft of core technologies of enterprises, which led to the development and growth of competing enterprises, resulting in serious economic losse...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 毛捍东缪嘉嘉刘岩陈超鲍爱华冷健陈锋郭磊陈蕊
Owner 北京峰盛博远科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products