Information system-oriented mimicry defense system and method, and medium

A technology of information system and defense system, applied in the direction of transmission system, electrical components, etc., can solve the problems of inability to resist system loopholes and backdoors, poor linkage effect of new network attack methods, etc.

Inactive Publication Date: 2020-03-24
EAST CHINA INST OF COMPUTING TECH
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The linkage effect of this active defense invention method on new network attack methods is

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information system-oriented mimicry defense system and method, and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several changes and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0048] Such as figure 1 , the request distribution module receives the service request from the client, and distributes the service request to the mimic executive, and the mimic executive executes to get the service request response, and the external voting module votes on the service request response, and returns the voting result to the client; The management module monitors and manages the mimic executive body.

[0049] According to the information system-oriented mimic defense method provided by th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an information system-oriented mimicry defense system, which comprises a request distribution module for receiving a request sent by an information system user, distributing therequest to a mimicry execution module, and forwarding a voted response result of the mimicry execution module to the information system user; a mimicry execution module, responding to the request toobtain a response result; an external voting module, used for carrying out consistency voting on the response result from the mimicry execution module; and a management service module used for managing and scheduling the mimicry execution module. According to the invention, heterogeneous maximization of the mimicry execution module is realized through dynamic scheduling of the mimicry execution module by the management service. Entrance-level security protection executed on a service request is completed through a traditional defense means, and result-level security protection is completed through external voting. Entrance-level and result-level security protection can realize active defense by most of attack means.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an information system-oriented mimic defense system, method and medium. In particular, it relates to a general system of mimicry defense for information systems developed in non-scripting languages. Background technique [0002] There are many loopholes and preset backdoors in the software and hardware system itself, which makes it face greater security threats. Attacks such as Trojan horses and botnets, malicious programs on the mobile Internet, security holes, and webpage tampering will lead to the theft, tampering, or destruction of the core data of the information system, and even cause the system to function abnormally or terminate. [0003] Nowadays, most of the security defenses for information systems are static defenses, such as traditional security protection methods such as intrusion detection, intrusion prevention, and intrusion tolerance. Static defense is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1433H04L63/1466
Inventor 邵培南应飞余新胜付琳徐李定李翔
Owner EAST CHINA INST OF COMPUTING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products