A Trust-Based Mimic Defense Voting Mechanism and System

A technology of defense system and trust degree, applied in the field of network security, can solve problems such as attack escape, and achieve the effect of improving security and avoiding attack escape.

Active Publication Date: 2022-01-21
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problem of attack escape caused by the random selection result used by the current mimic defense voting mechanism as the output when the vote cannot be voted under the mimic defense framework, the present invention provides a trust-based mimic defense voting mechanism and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Trust-Based Mimic Defense Voting Mechanism and System
  • A Trust-Based Mimic Defense Voting Mechanism and System
  • A Trust-Based Mimic Defense Voting Mechanism and System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the present invention Examples, not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0060] Under the DHR architecture, the existing voting method generally adopts the k / n voting method, that is, among n executive bodies, at least k executive bodies have the same operation results, and the operation results are taken as the output results of the system. In practice, due to the complexity of network space, the diversity of network attacks, and the influence of fac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a trust-based mimic defense voting mechanism and system. The mechanism includes: Step 1: Count each executive body according to the calculation results of each executive body in the mimic defense system; Step 2: According to the counting result, estimate the statistical trust degree of each executive body at the current moment based on the Bayesian estimation theory; Step 3: Select the calculation result of the executive body with the highest statistical trust at the current moment as the output of the mimic defense system in the case of unable to vote. According to the historical performance records of each executive, the present invention constructs a trust measure for each executive. When encountering the above-mentioned failure to vote, the calculation result of the executive with the largest statistical trust degree is selected as the output result of the system, which can maximize to avoid the attack escape problem.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a trust-based mimic defense voting mechanism and system. Background technique [0002] With the rapid development of information and network technology, people's daily work and life are increasingly dependent on the network, making cyberspace an important support for today's social functions and social activities. One of the root causes of serious threats to cyberspace security lies in the long-term existence of software and hardware vulnerabilities and backdoors. The security loopholes in the software and hardware of the information system have become the decisive factors that directly affect the security. Practice has proved that the vast majority of information security incidents are initiated by attackers with the help of software and hardware vulnerabilities. At present, there is no effective theoretical and technical solution to the problem of loopholes caused by...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1433H04L63/145
Inventor 王伟李光松段明陈华瑾王磊郑群雄郭路路杜宜宾李强
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products