Computer immune system design method and realization

A computer system, computer technology, applied in computer security devices, computing, instruments, etc., can solve the problems of lack of immunity, inability to system security protection, inability to fully protect computer system security, etc., to achieve the effect of improving security

Inactive Publication Date: 2015-09-23
沈军
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the development of computer technology, network attacks have become more complex and automated. The passivity of traditional security measures and the inherent defects of the system itself are not enough to cope with the increasing computer security threats and cannot fully protect the security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer immune system design method and realization
  • Computer immune system design method and realization
  • Computer immune system design method and realization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The specific implementation process of the present invention will be described in detail below in conjunction with the embodiments.

[0036] Similar to the human immune system, computer immunity is a new calculation model of active immunity that coexists with calculation and protection. It can identify "self" and "non-self" components in time, thereby destroying and repelling harmful substances entering the body. Such as figure 1 Shown is a schematic diagram of the overall architecture of the immune system of the present invention.

[0037] The overall architecture of the computer immune system is composed of multiple immune nodes 100 , a trusted network 200 and an immune service center 300 . Multiple immunization nodes 100 and the immunization service center 300 are connected to each other through the trusted network 200 . The immune node 100 is a terminal after computer immune modification. The immunization service center 300 can provide each immunization node 100 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer immune system design method and realization. The method includes the steps that 1, an active measuring method based on a TPCM is used for actively measuring a preset object currently operating in a computer and generating an immune report according to the measuring result; 2, according to the immune report, a corresponding immune strategy is matched in a preset immune strategy set; 3, the corresponding immune strategy is executed. By executing the active measuring method based on the TPCM, active defense of a computer system is achieved, immune recognition is achieved before the preset object completely operates, immune control is carried out on any suspicious program according to the set immune strategy, and therefore the safety of the computer is improved.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a computer immune control method and system. Background technique [0002] With the continuous deepening of national informatization construction, information security issues have gradually become one of the main obstacles restricting the development of national informatization. With the development of computer technology, network attacks have become more complex and automated. The passivity of traditional security measures and the inherent defects of the system itself are not enough to cope with the increasing computer security threats and cannot fully protect the security of computer systems. [0003] An important reason for this situation is that traditional security measures such as firewalls, anti-virus software, and intrusion detection mainly use passive defense mechanisms, which cannot actively protect the system, and thus do not have the characteristics of immunity. [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55G06F21/56G06F21/53G06F21/51
CPCG06F21/552G06F21/51G06F21/53G06F21/568G06F2221/2125G06F2221/2141
Inventor 沈军
Owner 沈军
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products