Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mimicry network topology transformation method

A technology of network topology and topology transformation, applied in the field of computer communication, can solve the problems that it is difficult for attackers to observe and predict changes in the target environment, increase the difficulty and cost of attacks, and achieve the goal of reducing network scale, reducing difficulty, and increasing flexibility Effect

Active Publication Date: 2016-02-03
SHANGHAI REDNEURONS +1
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The basic idea of ​​mimic security defense is to dynamically construct diverse mimic environments such as networks for the purpose of providing dynamic, non-deterministic, heterogeneous, and non-sustainable target environments under the condition of functional equivalence. A controllable way to implement active jumps or rapid migrations between diverse environments, which is difficult for attackers to observe and predict changes in the target environment, thus increasing the difficulty and cost of attacks including unknown exploitable vulnerabilities and backdoors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mimicry network topology transformation method
  • Mimicry network topology transformation method
  • Mimicry network topology transformation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following explains the signs appearing in the description of the drawings: represents a node, Indicates the node function, 20 , 25 , 30 , 35 , 40 , 50 , 60 Indicates link bandwidth.

[0030] The method for the topology transformation of the mimic network of the present invention will be further described below in conjunction with the accompanying drawings and specific implementation methods: based on this method, the network can dynamically construct the network topology under equivalent conditions, thereby providing the dynamics, non-determinism, and Heterogeneity implements active hopping or rapid migration between diverse topology environments in a controllable manner by the network builder, making it difficult for attackers to observe and predict topology changes. The network equivalence mentioned here means that the function, performance and other indicators of the network after the topology transformation are consistent with the network before the tr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mimicry network topology transformation method, which is used for overcoming problems to be solved in dynamical change of a network structure in the prior art. The mimicry network topology transformation method disclosed by the invention comprises the following steps: once equivalent transformation step of a local subnet comprises: A1, determining the local subnet to be performed with topological equivalent transformation; A2, using a network description method to carry out abstract description on the local subnet determined in A1; A3, establishing an equivalent subnet of the local subnet described in A2 based on a constraint condition; and A4, using the established subnet to replace the original subnet. Compared with the prior art, the mimicry network topology transformation method disclosed by the invention has the following advantages: 1. the method is used for achieving an overall network topology transformation effect by carrying out topological equivalent transformation on the local network subnet for multiple times, since the target of the topology transformation is the subnet in the network instead of the entire network, the network scale of the topology transformation is greatly reduced, and the difficulty of the topology transformation is reduced.

Description

technical field [0001] The invention relates to a transformation method in the technical field of computer communication, in particular to a method for topology transformation of a mimic network. Background technique [0002] The basic idea of ​​mimic security defense is to dynamically construct diverse mimic environments such as networks for the purpose of providing dynamic, non-deterministic, heterogeneous, and non-sustainable target environments under the condition of functional equivalence. A controllable way to implement active jumps or rapid migrations between diverse environments, which is difficult for attackers to observe and predict changes in the target environment, thus increasing the difficulty and cost of attacks including unknown exploitable vulnerabilities and backdoors . That is, to fight unknown threats with uncertainty. [0003] The security of the mimic network is reflected by the uncertainty of the network, and the uncertainty of the structure is its i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24
CPCH04L41/12H04L41/145H04L41/147
Inventor 赵靓张校辉马海龙张鹏江逸茗董永吉白冰李艳捷
Owner SHANGHAI REDNEURONS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products