Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Majority consistent escape error processing device and method

An error handling and consistent technology, applied in the field of network security, to achieve the effect of improving security performance, improving efficiency and reducing losses

Active Publication Date: 2019-07-12
THE PLA INFORMATION ENG UNIV
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, it is difficult for the mimic defense system to detect and completely block the persistence of such extreme errors in time, so there is an urgent need for a method and device for detecting escape errors in time and allowing the system to quickly return to normal work in the above extreme error situations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Majority consistent escape error processing device and method
  • Majority consistent escape error processing device and method
  • Majority consistent escape error processing device and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] Embodiment one, see figure 1 As shown, a majority consensus escape error processing device based on mimic security defense zero-day attack, a majority consensus escape error processing device based on mimic security defense zero-day attack, including dynamic online execution body set, execution body resource pool, detection module, response module and dynamic decision-making scheduling module, the dynamic online execution body set contains M dynamic online execution heterogeneous execution bodies, the execution body resource pool contains N heterogeneous execution bodies with meta-functional equivalents, and the M dynamic Heterogeneous execution bodies executed online include at least new online execution bodies and online majority consistent execution bodies;

[0033] The detection module is used to detect the operation result of the request received by the input agent according to the heterogeneous execution body in the dynamic online execution body set, including an in...

Embodiment 2

[0037] Embodiment 2 is basically the same as Embodiment 1, except that the response module includes a record analyzer, an attack response unit, and an output alarm unit, wherein the record analyzer feeds back to most consistent escape error checking units. Record and analyze the inconsistent results, and feed back the analysis results to the attack response unit and the output alarm unit; the attack response unit is used to respond to the attacker and establish a zero-day attack related database; the output alarm unit issues an alarm and determines The operation output of the new online executive is the final output, and the majority of the original online consistent executives are abnormal output executives. The multi-mode ruling is suspended, and the executive switching request is sent to the dynamic decision-making scheduling module.

[0038] Preferably, the response module further includes: a vulnerability repair unit, which receives the analysis result of the record analyz...

Embodiment 3

[0040] Embodiment three, see Figure 1~2 As shown, a majority consistent escape error processing method based on mimic security defense zero-day attack is realized based on the majority consistent escape error processing device based on mimic security defense zero-day attack described in Embodiment 1, comprising the following steps:

[0041] Step 1. The heterogeneous executors in the dynamic online executor set independently run the input request of the input agent at the same time;

[0042] Step 2. The independent operation check unit conducts multi-mode judgment on the calculation results of independent operation. If the judgment result meets the consistent requirements, it will output, otherwise, the judgment result will be fed back to the dynamic decision-making scheduling module; at the same time, most of the consistent escape error check units execute according to the new online Compare the operation output of the entity with the operation output of the online majority o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a majority consistent escape error processing device based on mimicry security defense zero-day attack and a method thereof. The method comprises: a heterogeneous executive in a dynamic online executive assembly independently operating an input request; performing multimode adjudication on an operation result, if an adjudication result meets a consistency requirement, outputting the adjudication result, if not, feeding back the adjudication result to a dynamic decision dispatching module; comparing new online executive operation output with online original majority consistent executive operation output, respectively feeding back results to the dynamic decision dispatching module and a responding module; the responding module processing the response according to feedback, and feeding back abnormal output executive to the dynamic decision dispatching module; and the dynamic decision dispatching module selecting new executive to be online from an executive resource pool, and cleaning and resetting offline executives. The method is used to provide means of detection and response when majority of mimicry defense online executives are attacked, and solves security threat a mimicry defense system faces, so as to enhance robustness of the mimicry system.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a majority consensus escape error processing device and method based on mimetic security defense against zero-day attacks. Background technique [0002] At present, the world is increasingly dependent on cyberspace, and cyberspace has become an important support for social functions and social activities today. However, the widespread vulnerability of cyberspace has made countries around the world face unprecedented security threats, and hacker attacks, cybercrime, cyberterrorism, and cyberwar have become increasingly prominent threats to national security. At its root, the important reasons for network threats are the ubiquity of vulnerabilities and the ease of insertion of backdoors, as well as the static, similarity, and certainty of the environment on which attacks based on vulnerabilities and backdoors rely. [0003] One important way to implement explo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55
CPCG06F21/55
Inventor 刘文彦邬江兴扈红超陈福才季新生霍树民程国振梁浩张淼
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products