Unlock instant, AI-driven research and patent intelligence for your innovation.

Channel distribution method facing active defense

A channel allocation and active defense technology, applied in the field of network security, can solve problems such as insufficient utilization of resources, no consideration of the security of the target server of the request's own legitimacy, and inability to effectively solve the problem of load balancing, so as to reduce communication overhead, The effect of increasing safety protection capability and reducing burden

Active Publication Date: 2016-06-22
ZHEJIANG UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the traditional allocation method only completes the request forwarding without considering the legitimacy of the request itself and the security of the target server. Therefore, how to accurately evaluate the performance of the virtual server, the workload on the virtual server, the security of the channel content and the security of the virtual server , has become an important problem solving
Traditional methods do not take into account the differences in request tasks, security, and performance and security differences between virtual servers in the web server.
These methods only achieve forwarding, and cannot effectively solve the load balancing problem under the active security protection of the virtual service system, nor can they fully utilize the resources of each virtual server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Channel distribution method facing active defense
  • Channel distribution method facing active defense
  • Channel distribution method facing active defense

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Such as figure 1 and figure 2 As shown, the active defense-oriented access channel distribution method of the present invention comprises the following steps:

[0031] 1. Obtain virtual server attribute information

[0032] (1) Acquire virtual server: V={v i |i=1,2,…,n}, where v i Indicates the i-th virtual server.

[0033] (2) Obtain virtual server environment parameters: Ev i ={Ev ij |j=1,2,…,n}, where Ev ij Indicates the i-th virtual server v i The environment parameters of the jth virtual server of .

[0034] (3) Obtain the safety factor of the virtual server environment: Se={Se i |i=1,2,…,n}, where Se i Indicates the i-th virtual server v i safety factor. Among them, Se is a natural number, the larger the value, the less safe it is;

[0035] (4) Obtain the weight coefficient of the virtual server environment parameter: W i ={w ij |j=1,2,…,n}, where w ij Indicates the i-th virtual server v i The weight coefficient of the jth environmental parameter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a channel distribution method facing active defense. According to the invention, an access request is transmitted to a heterogeneous virtual network server changing dynamically, an independent safety domain and a safety channel is provided for completing active defense, and safety protection is carried out on virtual servers. When the access request occurs, operation states of all current virtual servers are obtained, and an independent interaction channel is constructed by using a dynamic adaptive safety distribution algorithm. Meanwhile, during a channel operation process, behavior features inside the channel are monitored and analyzed; and when an illegal behavior occurs, the channel is destroyed and the access request is refused.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an active defense-oriented access channel allocation method. Background technique [0002] The traditional request allocation method is mainly based on the assumption of Poisson distribution of access requests and exponential distribution of corresponding time. Usually used in round robin, weighted round robin, minimum connection scheduling algorithm and weighted minimum connection scheduling algorithm and so on. With the increase of web server business request types, such as Web pages using dynamic embedded object technology and database query tasks, different business requests have different workloads. There is a difference of 10 times to 100 times in the amount of workload among various business requests. At the same time, each virtual server in the network server has different performance, and the same task request has different response effects in different virtua...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08
CPCH04L67/1008H04L67/1025H04L67/1027H04L67/1029H04L67/1031
Inventor 吴春明陈双喜
Owner ZHEJIANG UNIV