Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Mimic Routing Decision Method for Multiple Instance Routing Units

A decision-making method and multi-instance technology, applied in electrical components, digital transmission systems, transmission systems, etc., can solve problems such as severe cyberspace security requirements

Active Publication Date: 2018-02-06
SHANGHAI REDNEURONS +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention overcomes the problem of severe security requirements in network space in the prior art, and provides a mimic routing decision-making method of a multi-instance routing unit with a high ability to resist risks in the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Mimic Routing Decision Method for Multiple Instance Routing Units
  • A Mimic Routing Decision Method for Multiple Instance Routing Units
  • A Mimic Routing Decision Method for Multiple Instance Routing Units

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Below in conjunction with accompanying drawing and specific implementation mode, the mimic routing decision-making method of multi-instance routing unit of the present invention is further explained: described method is the routing decision-making method of mimic routing switching system control plane, and its implementation is as follows:

[0035] In step (1), the routing decision-making module maintains the routing table item issued by it for each routing instance; the format of the routing table item is as attached figure 2 shown.

[0036] Step (2), for each routing table item, compare it with all other routing table items maintained by the routing decision-making module, and obtain the number of routing table items that are exactly the same as the content of the routing table item, according to the same number of routing table items and the credibility of the routing instance to which it belongs to calculate the credibility of each routing entry;

[0037] Step (3)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a pseudo-routing decision-making method of a multi-instance routing unit, which overcomes the problem in the prior art that the security requirements of network space are very severe. It contains step (1) the routing decision-making module maintains the issued routing table items for each routing instance; step (2) for each routing table item, calculate according to the same number of routing table items and the credibility of the routing instance it belongs to The credibility of each routing table item; step (3) taking the routing table item with the highest reliability of the same destination address as the final routing table item obtained by the decision, converting it into a forwarding table item and sending it to the forwarding unit; Step (4) For the operation of deleting routing table items issued by the routing instance, the routing decision module first performs the corresponding deletion operation; step (5) if a problem occurs in a routing instance, then go to step (4) to delete the corresponding route All routing entries delivered by the instance. The technology has a high ability to resist network risks.

Description

technical field [0001] The invention relates to a cyberspace security mimic defense method, in particular to a mimic routing decision-making method of a multi-instance routing unit. Background technique [0002] Mimic security defense is mainly proposed for the severe asymmetry of attack cost and defense cost in cyberspace, and the severity of my country's information field core technology and industrial foundation seriously lagging behind national security requirements under the current conditions. Its goal is to utilize structural dynamics at the system level. Technologies such as transformation and dynamic diversification of the operating environment block or disrupt the staticity, similarity, and certainty that the attack chain relies on to achieve the controllable requirements of system security risks. Contents of the invention [0003] The invention overcomes the severe security requirement of network space in the prior art, and provides a pseudo-routing decision-maki...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/741H04L12/751H04L45/74H04L45/02
CPCH04L45/02H04L45/54
Inventor 于婧邬江兴陈鸿昶伊鹏张风雨张霞袁征黄万伟陆志威
Owner SHANGHAI REDNEURONS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products