Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Security cloud management system construction method and device based on mimicry defense

A cloud management and security technology, applied in the transmission system, electrical components, etc., can solve the problems of source code vulnerability acquisition, cloud management system unity, homogeneity amplification cloud management system attacks, etc., to ensure reliability and security, Improve endogenous safety performance and ensure safe and reliable operation

Active Publication Date: 2020-02-07
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU +1
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, when governments, enterprises, and institutions build cloud platforms, they often use Openstack for incremental development. As Openstack is an open source software, its source code vulnerabilities are easily obtained by attackers.
Most of the current public cloud providers adopt a single architecture for the convenience of management and development, such as literature (Chen Qiyun, Chen Zhikang. Research on public cloud security risks and countermeasures based on model analysis[J]. Modern Telecom Technology, 2012(8):6- As mentioned in 10), the singleness, homogeneity, vulnerability, and prevalence of backdoors in the cloud management system magnify the possibility and harm of the cloud management system being attacked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security cloud management system construction method and device based on mimicry defense
  • Security cloud management system construction method and device based on mimicry defense
  • Security cloud management system construction method and device based on mimicry defense

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the present invention Examples, not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0045] Such as figure 1 As shown, the embodiment of the present invention provides a method for constructing a security cloud management system based on mimic defense, including the following steps:

[0046] S101: Build multiple cloud management systems using diversified compilation tools, the multiple cloud management systems have the same functions but different structures;

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security cloud management system construction method and device based on mimicry defense. The method comprises the following steps: constructing a plurality of cloud management systems by using diversified compiling tools, wherein the plurality of cloud management systems have the same function but different structures; constructing a request proxy forwarding unit for receiving a user request, establishing a request queue and forwarding the user request to the plurality of cloud management systems according to the control information; constructing a request agency judgment unit for processing responses of the plurality of cloud management systems to the same user request according to a preset request processing and deployment judgment process, and forwarding a processing result to the Openstack execution component; and constructing a response forwarding unit and a reply response judgment unit, wherein the response forwarding unit and the reply response judgmentunit are used for processing the execution result of the Openstack execution component and the response of the plurality of cloud management systems to the execution result according to a preset response mimicry judgment and output flow. According to the method and device, the operation information of the administrator on the network can be prevented from being stolen and maliciously tampered, and the operation on the cloud system is safe and reliable.

Description

technical field [0001] The invention relates to the technical field of cloud computing network space security, in particular to a method and device for constructing a security cloud management system based on mimic defense. Background technique [0002] With the popularity and development of computers, people's dependence on functions such as computing and storage has penetrated into all aspects of work and life. However, the traditional local computing model is limited by expensive hardware costs and complex management operations, and it is increasingly difficult to meet the needs of individuals, enterprises, and governments for cheap, efficient, convenient, and flexible computing services. Therefore, a new computing mode——cloud computing emerges as the times require. Cloud computing has the characteristics and advantages of on-demand services, convenient access, metering and charging, rapid deployment and flexible management. The emergence of OpenStack is a milestone in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L67/12H04L67/10H04L63/1433H04L63/1441
Inventor 扈红超李凌书陈福才刘文彦程国振霍树民仝青徐水灵周梦丽倪思源
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products