Quantitative characterization method for potential threat degree of mimicry controller executor

A technology of threat level and executive body, applied in the field of quantitative characterization of potential threat level, it can solve the problems of unguaranteed detection cycle, labor-intensive, difficult to accurately judge potential threat level, etc., so as to enhance security and reliability, and improve reliability. , the effect of improving the robustness

Inactive Publication Date: 2019-12-17
ZHEJIANG UNIV
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing mimic defense system, there is no suitable quantitative characterization method for the potential threat level of the mimic controller executive body. At present, the main way to strengthen the correctness of the mimic controller is to manually judge the functionally equivalent redundant executive body , and then manually go online and offline the corresponding executives to improve the security of the entire mimic controller and ensure the robustness of the entire mimic defense system
However, this method has three shortcomings: first, it is difficult to accurately judge the potential threat level of functionally equivalent redundant execution bodies that have not been marked; second, it is labor-intensive and the detection cycle cannot be guaranteed; finally, manual judgment and manual online and offline Line executives are highly biased

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantitative characterization method for potential threat degree of mimicry controller executor
  • Quantitative characterization method for potential threat degree of mimicry controller executor
  • Quantitative characterization method for potential threat degree of mimicry controller executor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0032] This example works on the mimic controller in the mimic defense server, such as figure 1 As shown, running A in the mimic controller 1 ~A 6 A total of 6 executive bodies, and E 1 ~E 6 A total of 6 offline executives are input into the controller and delivered to 6 online executives; the method of the present invention replaces the online and offline executives at the same time period t according to the following specific steps to ensure the final voter According to the algorithm, the final result is true and reliable, and the processing of the access request is completed.

[0033] Such as figure 2 As shown, this example is implemented through the following steps:

[0034] Step 1. Receive a user access request, input the agent to determine whether the user IP is in the blacklist of the honeypot server, if yes, then import the request into the honeypot server for execution; if not, then enter step 2;

[0035] Step 2: Input to the mimic controller, deliver to the on...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a quantitative characterization method for the potential threat degree of a mimicry controller executor. According to the method, the difference between each processing input of an executor and a multimode voter is recorded through a mimicry controller, the confidence coefficient of the executor is calculated, the confidence coefficient is updated and sorted after a periodof time, the executor with the lowest confidence coefficient is offline, and the executor is selected from offline candidate executors to be online. According to the method, the reliability of the mimicry controller is further improved through comprehensive consideration, the potential threat degree of an executor of the mimicry controller is quantitatively represented, the concept of confidence is introduced, and operation of the executor is reliably adjusted according to the confidence; under the condition of lack of an effective quantitative characterization method in the prior art, the robustness of the mimicry defense system is greatly improved under the condition of basically not changing software and hardware expenditures.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to the technical field of network security mimic defense, and particularly relates to a quantitative characterization method of the potential threat degree of a mimic controller executive body. Background technique [0002] With the continuous evolution of the Internet and the continuous evolution of attack technologies, network attacks present the characteristics of "concealment, coordination, and precision", and network security is in a situation of "easy to attack but difficult to defend". In order to completely change the traditional protection mode of passive response such as "blocking and killing", and form an active defense capability, mimic defense technology came into being. Mimic defense technology refers to an active defense technology based on the internal dynamic heterogeneous redundant structure of the system, which can deal with various unknown threats in cyb...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/1491
Inventor 吴春明陈双喜姜鑫悦潘高宁
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products