System reloading based mimicry safety implementation system and method

A technology for implementing systems and methods, applied in computer security devices, instruments, calculations, etc., can solve problems such as hacker breakthroughs and severe problems, and achieve the effects of improving security and reliability, increasing the difficulty and cost of hacking attacks

Inactive Publication Date: 2015-03-11
大连梯耐德网络技术有限公司
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of the Internet, the network is becoming more and more popular, and the corresponding network technology development is becoming more and more high-end, but the network security problem is becoming more and more severe. Backdoors or loopholes, hackers often use the backdoors and loopholes of software and hardware to carry out attacks
The main reason why the current network equipment cannot resist externa

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System reloading based mimicry safety implementation system and method
  • System reloading based mimicry safety implementation system and method
  • System reloading based mimicry safety implementation system and method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0027] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings.

[0028] Given that the existing network devices or systems are mostly a single fixed operating system, the methods or technologies used to defend against external attacks are all defenses or vulnerability patches against known backdoors or vulnerabilities, and there is a certain lag, inactivity or vulnerability. It is called passive defense. In order to effectively solve the problems existing in the above passive defense forms, the present invention proposes a system and method for implementing system overloading based on the basic principle of irregular and non-deterministic replacement of various operating systems.

[0029] The present invention actively defends against unknown backdoors and loopholes through mimetic security. Mimicry is the phenomenon in whic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system reloading based mimicry safety implementation system and method. The system comprises a storage module, a starting guide module and a reloading selection and operation control module. The storage module is used for storing different types of operation systems in different storage media of network equipment or different addresses of the same storage medium. The starting guide module presets CPU run programs loading the operation systems and is used for selecting the operation systems in the storage module according to user instructions and starting the CPU run programs to load the operations systems to the network equipment according to the selected operation systems. The reloading selection and operation control module is used for achieving selection of the next starting operation system and starting time to facilitate operation system reloading on the same network equipment. By means of the system and the method, the network equipment operation systems and operation software are changed constantly from the system software level, and accordingly, active, changing and random defense capabilities are provided for the network equipment, and the network safety reliability is improved.

Description

technical field [0001] The invention relates to a system and method for realizing mimic security based on system overload. Background technique [0002] With the development of the Internet, the network is becoming more and more popular, and the corresponding network technology development is becoming more and more high-end, but the network security problem is becoming more and more severe. Hackers often use the backdoors and vulnerabilities of software and hardware to carry out attacks. The main reason why the current network equipment cannot resist external attacks is that the current network equipment or system adopts a fixed hardware architecture or software system, which is easy to be broken by hackers, and the defense of the current network equipment or system against external attacks The form is only the use of known backdoors and vulnerabilities for defense or vulnerability patching, which can be called passive defense, but passive defense often brings opportunities...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
CPCG06F21/575
Inventor 奚东志袁林魏长城张晓雷栾慎亭张宇路婧
Owner 大连梯耐德网络技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products