Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A method and device for constructing a security cloud management system based on mimic defense

A cloud management and security technology, applied in the direction of secure communication devices, transmission systems, digital transmission systems, etc., can solve the problems of source code vulnerability acquisition, cloud management system unity, homogeneity amplification cloud management system attacks, etc., to ensure reliability Improve safety and security, improve endogenous safety performance, and ensure safe and reliable operation

Active Publication Date: 2022-03-25
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, when governments, enterprises, and institutions build cloud platforms, they often use Openstack for incremental development. As Openstack is an open source software, its source code vulnerabilities are easily obtained by attackers.
Most of the current public cloud providers adopt a single architecture for the convenience of management and development, such as literature (Chen Qiyun, Chen Zhikang. Research on public cloud security risks and countermeasures based on model analysis[J]. Modern Telecom Technology, 2012(8):6- As mentioned in 10), the singleness, homogeneity, vulnerability, and prevalence of backdoors in the cloud management system magnify the possibility and harm of the cloud management system being attacked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for constructing a security cloud management system based on mimic defense
  • A method and device for constructing a security cloud management system based on mimic defense
  • A method and device for constructing a security cloud management system based on mimic defense

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the present invention Examples, not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0045] like figure 1 As shown, the embodiment of the present invention provides a method for constructing a security cloud management system based on mimic defense, including the following steps:

[0046] S101: Build multiple cloud management systems using diversified compilation tools, the multiple cloud management systems have the same functions but different structures;

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for constructing a security cloud management system based on mimic defense. The method includes: using diversified compiling tools to build multiple cloud management systems, the multiple cloud management systems have the same function but different structures; build a request agent forwarding unit to receive user requests, establish a request queue, and send user The request is forwarded to multiple cloud management systems; the construction of a request proxy decision unit is used to process the response of multiple cloud management systems to the same user request according to the preset request processing and deployment decision process, and forward the processing result to the Openstack execution component; Build a response forwarding unit and reply response adjudication unit to process the execution results of the Openstack execution components and the responses of multiple cloud management systems to the execution results according to the preset response mimicry adjudication and output process. The invention can ensure that the network operation information of the administrator is not stolen or maliciously tampered with, and the operation of the cloud system is safe and reliable.

Description

technical field [0001] The invention relates to the technical field of cloud computing network space security, in particular to a method and device for constructing a security cloud management system based on mimic defense. Background technique [0002] With the popularity and development of computers, people's dependence on functions such as computing and storage has penetrated into all aspects of work and life. However, the traditional local computing model is limited by expensive hardware costs and complex management operations, and it is increasingly difficult to meet the needs of individuals, enterprises, and governments for cheap, efficient, convenient, and flexible computing services. Therefore, a new computing mode——cloud computing emerges as the times require. Cloud computing has the characteristics and advantages of on-demand services, convenient access, metering and charging, rapid deployment and flexible management. The emergence of OpenStack is a milestone in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L67/12H04L67/10H04L9/40
CPCH04L67/12H04L67/10H04L63/1433H04L63/1441
Inventor 扈红超李凌书陈福才刘文彦程国振霍树民仝青徐水灵周梦丽倪思源
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products