Method for constructing dynamic heterogeneous redundant architecture

A dynamic heterogeneous and heterogeneous technology, applied to electrical components, transmission systems, etc., can solve problems such as difficult escapes

Active Publication Date: 2019-07-23
北京中科晶上超媒体信息技术有限公司
View PDF10 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, since the same misexpression exists between heterogeneous algorithms only in the case of small probability, it is difficult to attack from the multi-mode arbitration mechanism under the architecture of Dynamic Heterogeneous Redundancy (DHR). successful escape

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for constructing dynamic heterogeneous redundant architecture
  • Method for constructing dynamic heterogeneous redundant architecture
  • Method for constructing dynamic heterogeneous redundant architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0043] As introduced in the background technology, the DHR architecture dynamically and randomly configures the parameters of heterogeneous elements to obtain functionally equivalent heterogeneous executives. However, this method is not operable in all fields.

[0044] figure 1A schematic structural diagram of an existing DHR architecture is shown. refer to figure 1 , the system includes an input agent, a collection of heterogeneous components, a dynamic selection algorithm using random parameters, an executive body set, and a voter. The input agent and the voter constitute a "mimic bracket", and the protection scope limited by the mimic bracket is A "poisonous" heterogeneous execution environment with unknown vulnerabilities, backdoors, software and hardware codes such as viruses and Trojan horses. When in use, m functionally equivalent h...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for constructing a dynamic heterogeneous redundant architecture and a method for realizing active defense on an operating system based on the dynamic heterogeneous redundant architecture. The method for constructing the dynamic heterogeneous redundant architecture comprises the steps that (1) at least one corresponding heterogeneous component is determined for one task in an operating system, and the heterogeneous components are processes capable of being used for completing the task; and 2) a process parameter is set for each heterogeneous component in the at least one heterogeneous component by adopting a random algorithm to obtain a set of executors of the dynamic heterogeneous redundant architecture for completing the task.

Description

technical field [0001] The invention relates to computer network security, in particular to active defense against network attacks. Background technique [0002] A network attack refers to an attack on the hardware, software and data in the network system by using the loopholes and security flaws in the network, which may disrupt the operation of the system, steal system data, and destroy system data, thereby affecting the network. Space security. With the persistence and uncertainty of network attacks (such as: Advanced Persistent Threat (APT) attacks), how to provide a safe and reliable network space has become the focus of increasing attention in this field. [0003] Most of the current defense systems are accurate defenses based on known threats. However, such a passive defense method can only be effectively defended on the basis of understanding the attack source, attack characteristics, attack behavior and attack mechanism. For the passive defense used in the operat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1466
Inventor 高明晋沈茹婧袁尧石晶林
Owner 北京中科晶上超媒体信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products