Mimicry safety system and method based on sampling detection

A sampling detection and security system technology, applied in the field of network communication, can solve problems such as increasing the difficulty and cost of loopholes and backdoor attacks, difficulty for attackers to observe and predict, complex computing functions, etc., to improve the efficiency of mimicry ruling, reduce storage space and Computing resources and ensuring timeliness effects

Active Publication Date: 2019-12-03
ZHEJIANG LAB
View PDF11 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Chinese patent CN201610853938.7 "A Device, Method, and Equipment for Encapsulating Heterogeneous Functional Equivalents" proposes a mimic security defense technology, which can obtain a favorable endogenous defense situation from initiative, variability, and randomness. The environment changes dynamically, which is difficult for attackers to observe and predict, thus greatly increasing the difficulty and cost of attacks including unknown exploitable vulnerabilities and backdoors
[0004] Chinese patent CN201610853938.7 solves the problem of network element security protection very well, but at present, network functions are becoming more and more complex, and there are more and more types of security attacks. For example, in network edge computing, network elements not only have network transmission functions, as well as storage and calculation functions. The data stored by network elements usually exceeds G bytes or even T bytes, and the calculation functions are complicated. If the mimicry judgment function of Chinese patent CN201610853938. In terms of ruling accuracy, it is difficult to meet the actual needs of the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mimicry safety system and method based on sampling detection
  • Mimicry safety system and method based on sampling detection
  • Mimicry safety system and method based on sampling detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] A mimic security system based on sampling detection, including an input agent, a redundant controller, at least two heterogeneous functional equivalents, and an output agent; the input agent is used to receive an external service request according to the redundant controller Agent strategy, sending external service requests to one or more selected heterogeneous functional equivalents; redundant controller, used to compare the parameters of the judgment results of heterogeneous functional equivalents, and notify the output of the ruling result Agent; the heterogeneous functional equivalent is used for sampling data selection and synchronization, making feature judgment on the sampled data, and sending the judgment result to the redundant controller; the output agent is used to transfer the corresponding The output of the equivalent body is sent as an external service response;

[0026] Further, as figure 2 As shown, the redundant controller includes:

[0027] Adjudica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mimicry security system and method based on sampling detection. The mimicry security system comprises an input agent, a redundant controller, at least two heterogeneous function equivalents and an output agent, the redundant controller is used for carrying out parameter comparison on a judgment result of the heterogeneous function equivalence body and informing the outputagent of a judgment result; the heterogeneous function equivalence body is used for selecting and synchronizing sampling data, carrying out feature judgment on the sampling data and sending a judgmentresult to the redundant controller, wherein the mimicry judgment parameters of the heterogeneous function equivalence body are sampling data generated based on the storage data; the method greatly reduces the storage space and computing resources required by the decision parameters, guarantees the timeliness and accuracy of the decision parameters, improves the mimicry decision efficiency in network edge computing scenes such as large-scale data computing, and improves the availability of a mimicry security system.

Description

technical field [0001] The invention relates to the field of network communication, in particular to a mimic security system and method based on sampling detection. Background technique [0002] While cyberspace is developing vigorously, it is facing a severe security situation. There are a large number of malicious attacks against cyberspace. In addition, the network system is complex and inevitably has loopholes. Therefore, cyberspace has both external threats and internal security threats. Vulnerability issues are intertwined, and security risks are severe and complex. In the new cyberspace security situation, traditional defense methods based on prior knowledge are difficult to deal with various attacks. It is necessary to change defense thinking, define new defense boundaries, consolidate the depth of defense, and move from passive to active defense with endogenous security. [0003] Chinese patent CN201610853938.7 "A Device, Method, and Equipment for Encapsulating Het...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0281H04L63/1441H04L63/20H04L67/2866
Inventor 吴少勇王延松李顺斌
Owner ZHEJIANG LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products