Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A kind of active defense system method and method based on biological immunity

A technology of active defense and biological immunity, applied in the field of network security, it can solve the problems of not being able to actively detect unknown viruses and intrusions, not being able to give early warning of potential security risks, and to solve them in advance.

Active Publication Date: 2022-01-14
GUANGZHOU UNIVERSITY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The current methods to solve network security problems have the following problems: ①It can only prevent existing security problems. If new system vulnerabilities or security problems appear, it is necessary to wait until the security software and equipment manufacturers release solutions and upgrade the software or equipment to solve them. ; ②It can only stop the security behaviors that have already occurred, and cannot warn and solve the security risks lurking in the terminal in advance; ③The security problems of the terminal are mostly solved by the security software installed by itself, and there is no integration of cloud and terminal Collaborative defense function
[0004] In the prior art, the author is Ren Xianghua, and Harbin University of Science and Technology published a master's degree thesis "Research and Implementation of an Intrusion Detection System Based on Biological Immunity" in May 2006, which proposed an intrusion detection system based on biological immunity. Composed of detection subsets distributed in different nodes, combined with normal detection and misuse detection methods, expert rules are used as innate detectors to detect some known intrusions, but it cannot solve the problem of actively detecting unknown viruses and intrusions; by "University of Electronic Science and Technology of China "Published in 2012, the author is Tao Xu "Research on Intrusion Detection Method Based on Biological Immunity", referring to the mechanism of memory cells, designing an information detection method based on biological immunity, and designing common antibodies and effective antibodies on the basis of conventional intrusion detection The three detectors, memory antibody and memory antibody, can detect some abnormalities, but have a certain false detection rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of active defense system method and method based on biological immunity
  • A kind of active defense system method and method based on biological immunity
  • A kind of active defense system method and method based on biological immunity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The implementation of the present invention is described below through specific examples and in conjunction with the accompanying drawings, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific examples, and various modifications and changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention.

[0030] figure 1 It is a system architecture diagram of an active defense system based on biological immunity in the present invention. Such as figure 1 Shown, a kind of active defense system based on biological immunity of the present invention comprises:

[0031] Terminal 10, the terminal (referred to as "terminal") is equipped with a known behavior library trained on the cloud, through ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an active defense system and method based on biological immunity. The system includes: a terminal equipped with a known behavior library trained through the cloud, and through a mechanism similar to biological immunity, the behavior generated based on internal and external data Carry out local detection, real-time monitoring, first-level active defense, and send unidentified unknown behaviors to the cloud; the cloud has a known behavior library trained on the cloud to collect unknown behaviors sent by the terminal, Introduce deep learning, carry out cloud detection and behavior early warning, and push new behaviors to the terminal in real time for second-level defense. Safe computer behavior, realize the overall defense and active defense of the cloud-terminal collaborative computing environment.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a biological immunity-based active defense system method and method for a cloud-end collaborative computing environment. Background technique [0002] In the early stage of computer development, when stand-alone computer viruses appeared, it was generally adopted to install stand-alone anti-virus software to solve security problems. With the popularization of the network, security problems such as worms and Trojan horses that can spread in the network have appeared, and network security software with cloud scanning and killing can be installed to partially solve the security problem. At present, with the emergence of new network computing models such as the Internet, cloud computing, Internet of Things, fog computing, and edge computing, network applications are becoming more and more extensive, user needs are changing, environments are heterogeneous, networks are comple...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/145H04L63/20
Inventor 王国军苏命峰徐天骥彭滔
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products