System, method and device for testing heterogeneity of mimic system based on network packet capture

A technology of imitation system and test system, applied in transmission system, digital transmission system, data exchange network, etc., can solve the problem of limited types of test methods, and achieve the effect of high efficiency, convenience and comprehensive stability.

Active Publication Date: 2021-05-11
EAST CHINA INST OF COMPUTING TECH
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing testing methods for the heterogeneity of mimic security information systems are limited, especially when the heterogeneity can only be judged by the external characteristics of heterogeneous processors.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System, method and device for testing heterogeneity of mimic system based on network packet capture
  • System, method and device for testing heterogeneity of mimic system based on network packet capture
  • System, method and device for testing heterogeneity of mimic system based on network packet capture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0114] see figure 1, a device for testing the heterogeneity of a mimic system based on network packet capture, comprising a user unit, a mimic scheduler, a heterogeneous processor set, a heterogeneity identification unit, and an evaluation report generator;

[0115] The mimetic scheduler distributes the external data from the user unit to multiple heterogeneous processors through the reverse proxy server of the data transfer module, so that M heterogeneous processors perform operations on the data respectively; according to multiple heterogeneous processors The output calculation results are subjected to mimicry judgment, and the isomer numbering sequence that is consistent with the calculation results is output to the heterogeneity recognition unit, and the inconsistent heterogeneity processor is cleaned;

[0116] A set of M heterogeneous processors, including M heterogeneous processors that are dynamically executed online. The M heterogeneous processors are mutually heteroge...

Embodiment 2

[0120] see figure 2 , the specific workflow of the mimic scheduler is as follows:

[0121] Step 201, distributing the external data from the user unit to multiple heterogeneous processors through the reverse proxy server of the data transfer module;

[0122] Step 202: Receive the calculation results returned by the M heterogeneous processors according to the preset transmission rate, and perform a mimicry judgment on the calculation results returned by the M heterogeneous processors according to the current working mode;

[0123] Step 203 , output the isomer numbering sequences whose independent calculation results of the heterogeneous processors are consistent to the heterogeneity identification unit at a certain frequency, and at the same time perform cleaning operation on the inconsistent heterogeneous processors, and store the calculation results.

[0124] see image 3 , the specific workflow of the heterogeneity recognition unit is as follows:

[0125] Step 301: The d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method, system and device for testing the heterogeneity of a mimic system based on network packet capture, including: a user unit module: sending data to be tested to a mimic scheduling module; mimic scheduler module: distributing received data to be tested To multiple heterogeneous processors, so that multiple heterogeneous processors perform calculations on the data to be tested separately, obtain the calculation results, perform a mimetic judgment on the calculation results, and output the number sequence of the heterogeneous processors with consistent calculation results to the heterogeneity identification module, and perform cleaning operations on inconsistent heterogeneous processors, and store the operation results. The present invention adds verification and identification functions for heterogeneous processor types, which is beneficial to verify the stability, security and performance rationality of heterogeneous processors more efficiently, conveniently and comprehensively, and automatically generate detailed test reports , in order to meet the evaluation requirements for the heterogeneity of the mimic security information system.

Description

technical field [0001] The present invention relates to the technical field of cyberspace security, in particular to a system, method and device for testing the heterogeneity of a mimic system based on network packet capture. Background technique [0002] With the rapid development of 5G technology, the era of the Internet of Things is approaching. While enjoying the convenience brought by artificial intelligence, the problem of network security is becoming increasingly serious. At present, traditional cyberspace defense technologies such as intrusion detection, firewalls and other defense methods are passive and lagging, and cannot have active defense functions. Therefore, it is often difficult to predict and effectively reduce attack risks. Mimic defense technology is an active defense method that turns passive into active in response to this phenomenon. The mimic defense technology effectively enhances the robustness of the system and blocks the attacker's information ch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26
CPCH04L43/04H04L43/06H04L43/08H04L43/50
Inventor 崔红军李建军汪杨封亮李洪梅夏梦石安婷朱杰刘姣李翔刘晓娟
Owner EAST CHINA INST OF COMPUTING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products