Secure cloud service construction method and device based on mimic defense

A construction method and cloud service technology, applied in the field of security cloud service construction based on mimicry defense, to achieve the effect of improving endogenous security performance, avoiding vendor lock-in, and ensuring reliability and security

Inactive Publication Date: 2017-12-08
THE PLA INFORMATION ENG UNIV
View PDF5 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to overcome the above-mentioned deficiencies, and provide a security cloud service construction method and device based on mimicry defense, to solve th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure cloud service construction method and device based on mimic defense
  • Secure cloud service construction method and device based on mimic defense
  • Secure cloud service construction method and device based on mimic defense

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] Such as figure 1 As shown, a method for constructing a security cloud service based on mimicry defense of the present invention includes the following steps:

[0065] Step S101: Build a cloud service executive resource pool.

[0066] Step S102: Forward the access request to the online cloud service executor, and the online cloud service executor processes the access request and returns a processing result.

[0067] Step S103: Perform a mimetic judgment on the processing result according to the mimetic judgment criterion, and output the result after the mimetic judgment as a final response.

[0068] Step S104: Dynamically schedule the cloud service executor according to the mimetic ruling.

Embodiment 2

[0070] Such as figure 2 As shown, another security cloud service construction method based on mimic defense of the present invention comprises the following steps:

[0071] Step S201: Build a cloud service executive resource pool, including:

[0072] Step S2011: Select several public clouds, such as Alibaba Cloud, Huawei Cloud, Kingsoft Cloud, Tencent Cloud, etc., and apply for cloud hosts from public cloud providers, such as putting forward different requirements according to the degree of heterogeneity, such as applying for cloud hosts with different operating systems etc., so that there is a certain difference between the cloud hosts applied for, and the cloud hosts of different public clouds form a diversified cloud service executive resource pool;

[0073] Step S2012: According to the degree of heterogeneity, install diversified and different versions of service realization software on cloud hosts provided by different cloud providers;

[0074] Step S2013: Perform secu...

Embodiment 3

[0091] Such as image 3 As shown, a security cloud service construction device based on mimicry defense of the present invention includes:

[0092] The building module 301 is used to build a cloud service executive resource pool.

[0093] The forwarding processing module 302 is configured to forward the access request to the online cloud service executor, and the online cloud service executor processes the access request and returns a processing result.

[0094] The adjudication response module 303 is configured to perform a mimetic adjudication on the processing result according to the mimetic adjudication criterion, and output the result after the mimetic adjudication as a final response.

[0095] The dynamic scheduling module 304 is configured to dynamically schedule the cloud service executor according to the mimetic ruling.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network space security, and especially relates to a secure cloud service construction method and device based on mimic defense. The secure cloud service construction method based on mimic defense includes the following steps: a cloud service executor resource pool is built; an access request is forwarded to online cloud service executors, and the online cloud service executors process the access request and return processing results; the processing results are decided in a mimic way according to the mimic decision criterion, and the results after mimic decision are output as final response; and the cloud service executors are scheduled dynamically according to the mimic decision condition. A secure cloud service construction device based on mimic defense includes a building module, a forwarding and processing module, a decision response module, and a dynamic scheduling module. The invention provides a secure cloud service construction method and device based on mimic defense in order to solve security problems brought by the dependence on a single cloud service, to improve the reliability and security of cloud services, and to ensure correct response to an access request.

Description

technical field [0001] The invention belongs to the technical field of cyberspace security, and in particular relates to a method and device for constructing a security cloud service based on mimicry defense. Background technique [0002] Cloud computing provides a low-cost IT infrastructure that is used and paid for on demand. With the development of cloud computing, a new business model centered on providing cloud services has emerged and has been widely used, such as Microsoft's Windows Azure, Alibaba Cloud and Amazon's Amazon EC2 (Elastic Compute Cloud). Cloud computing has many advantages, such as easy expansion, high availability, access at any time, etc. For small and medium-sized enterprises, it is not necessary to invest a lot of money in infrastructure construction, and you can get the services you want with only a small amount of money, and you can quickly implementation of the deployment. [0003] The public cloud has unparalleled advantages both in terms of co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/20H04L63/14H04L63/1433
Inventor 刘文彦霍树民陈福才季新生程国振扈红超王亚文陈扬梁浩丁瑞浩
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products