Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System reloading based mimicry safety implementation system and method

A technology for implementing systems and methods, applied in computer security devices, instruments, calculations, etc., can solve problems such as hacker breakthroughs and severe problems, and achieve the effects of improving security and reliability, increasing the difficulty and cost of hacking attacks

Inactive Publication Date: 2015-03-11
大连梯耐德网络技术有限公司
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of the Internet, the network is becoming more and more popular, and the corresponding network technology development is becoming more and more high-end, but the network security problem is becoming more and more severe. Backdoors or loopholes, hackers often use the backdoors and loopholes of software and hardware to carry out attacks
The main reason why the current network equipment cannot resist external attacks is that the current network equipment or system adopts a fixed hardware architecture or software system, which is easy to be broken by hackers, and the defense of the current network equipment or system against external attacks The form is only the use of known backdoors and vulnerabilities for defense or vulnerability patches, which can be called passive defense, but passive defense often brings opportunities for hackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System reloading based mimicry safety implementation system and method
  • System reloading based mimicry safety implementation system and method
  • System reloading based mimicry safety implementation system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0028] In view of the fact that most of the existing network devices or systems are a single fixed operating system, the methods or technologies used to defend against external attacks are all defenses or vulnerability patches for known backdoors or vulnerabilities, and there is a certain degree of lag, inactivity or It is called passive defense. In order to effectively solve the problems in the above-mentioned passive defense form, the present invention proposes a system and method for implementing system overloading based on the principle of irregular and non-deterministic replacement of various operating systems.

[0029] The present invention actively defends against unknown backdoors and loopholes through mimic security. Mimicry is the phenomenon in which one...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system reloading based mimicry safety implementation system and method. The system comprises a storage module, a starting guide module and a reloading selection and operation control module. The storage module is used for storing different types of operation systems in different storage media of network equipment or different addresses of the same storage medium. The starting guide module presets CPU run programs loading the operation systems and is used for selecting the operation systems in the storage module according to user instructions and starting the CPU run programs to load the operations systems to the network equipment according to the selected operation systems. The reloading selection and operation control module is used for achieving selection of the next starting operation system and starting time to facilitate operation system reloading on the same network equipment. By means of the system and the method, the network equipment operation systems and operation software are changed constantly from the system software level, and accordingly, active, changing and random defense capabilities are provided for the network equipment, and the network safety reliability is improved.

Description

technical field [0001] The invention relates to a system and method for realizing mimic security based on system overload. Background technique [0002] With the development of the Internet, the network is becoming more and more popular, and the corresponding network technology development is becoming more and more high-end, but the network security problem is becoming more and more severe. Hackers often use the backdoors and vulnerabilities of software and hardware to carry out attacks. The main reason why the current network equipment cannot resist external attacks is that the current network equipment or system adopts a fixed hardware architecture or software system, which is easy to be broken by hackers, and the defense of the current network equipment or system against external attacks The form is only the use of known backdoors and vulnerabilities for defense or vulnerability patching, which can be called passive defense, but passive defense often brings opportunities...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
CPCG06F21/575
Inventor 奚东志袁林魏长城张晓雷栾慎亭张宇路婧
Owner 大连梯耐德网络技术有限公司
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More