Network dynamic defense system and method

A dynamic defense and active defense technology, applied in the field of network security, can solve the problems that the technology can no longer provide any protection and the protection capability is limited, and achieve the effect of reducing the difficulty of identification, and the rate of false positives and false negatives.

Active Publication Date: 2019-02-15
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] However, this technology relies heavily on the robustness and stability of the basic network, and relies on a complete dete

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network dynamic defense system and method
  • Network dynamic defense system and method
  • Network dynamic defense system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the present invention Examples, not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0048] Quicksand is a natural phenomenon. Simply put, sand can flow like a liquid, that is, flowing sand. The appearance of quicksand is no different from ordinary sand, but once a heavy object is placed on the sand, it will be swallowed by the strong adsorption force of quicksand, making it difficult to escape.

[0049] The network dynamic defense system referred to in the pres...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network dynamic defense system and method. The system comprises a route distribution sub-system, a target sub-system and an active defense sub-system. The route distribution sub-system comprises a router, a client and a server; the router is used for detecting legality of users from the client, forwarding legal users which pass the detection to the server and forwarding doubtable users which are failed in the detection to the target sub-system; the target sub-system is used for recording attack behaviors of the doubtable users, performing secondary identity authentication on the doubtable users based on an identity knowledge base, forwarding normal users to the route distribution sub-system again and forwarding the doubtable users to the active defense sub-system;the active defense sub-system is used for extracting and analyzing attack characteristics and backing up and/or restoring important data. By adding dynamicity, randomness and indetermination of the defense system, a system defense capacity is put forth; and the network dynamic defense system increases the attack complexity of attackers and efficiently deals with the network attacks.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network dynamic defense system and method. Background technique [0002] Today, the Internet has penetrated into all aspects of work and life and has become an indispensable fifth dimension. However, new types of network attacks emerge in an endless stream, and the network security situation is becoming increasingly severe. Vulnerabilities are the premise of network attacks. Due to the objective existence of network security vulnerabilities, coupled with the static, similarity and determinism of the system, network security problems cannot be completely solved by digging and plugging loopholes. Even if the defender fixes most of the loopholes in time, the attacker only needs to exploit a small number of loopholes to gain an asymmetric advantage over the defender, forming an asymmetrical situation of "easy to attack but difficult to defend". [0003] Because the tradi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0823H04L63/1416H04L63/1466
Inventor 刘小虎张玉臣刘璟张柏赞谭晶磊王硕
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products