Cloud-based active immune security defense method and device

A technology of security defense and active immunity, applied in the field of information security, it can solve the problems of inability to deal with zero-day vulnerabilities, unknown internal attacks, and inability to deal with attack threats.

Pending Publication Date: 2020-06-19
中科天御(苏州)科技有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Traditional passive defense methods such as access control, intrusion detection, and anti-virus have been unable to deal with potential attack threats, especially advanced persistent attacks such as Trojan horses and backdoors that have been latent in the system for a long time and wake up at another time
Passive defense methods cannot deal with zero-day vulnerabilities, unknown attacks, and internal attacks. Attackers have enough time to find vulnerabilities and wait for an opportunity to intrude and obtain data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud-based active immune security defense method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0030] In the cloud-based active immune security defense method and device disclosed in an embodiment of the present invention, the steps are:

[0031] 1) The immune library management module establishes a mirror virtual machine system in the cloud that is completely consistent with the initial state of the instance system outside the cloud;

[0032] 2) The immune cleaning module replaces the mirror system in the cloud to the instance system outside the cloud, keeps the operation and maintenance instance system completely consistent with the mirror system in the cloud, and identifies inconsistent heterogeneous software;

[0033] 3) The immune update module performs a security upgrade on the mirror system in the cloud;

[0034] 4) The immune agent module runs in the hardware remote boot state in the off-cloud instance system, receives the cleaning comma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a cloud-based active immune security defense method and device. The method mainly comprises the following steps: an immune library management module establishes a mirror imagevirtual machine system which is completely consistent with an off-cloud instance system in an initial state in cloud; the immune cleaning module pushes the in-cloud mirror image system to the out-of-cloud instance system for replacement, the operation and maintenance instance system and the in-cloud mirror image system are kept completely consistent, and meanwhile, inconsistent heterogeneous software is identified; the immune updating module carries out security upgrading on the in-cloud mirror image system; and the immune agent module operates in a hardware remote guidance state in the cloudexternal instance system, receives a cleaning instruction issued by the cloud immune cleaning module, and executes a cleaning action. According to the invention, high security of the system can be realized, risks of continuous penetration and invasion of advanced threats on a system attack surface exposed in a network environment and an operation environment for a long time are reduced, white lists of abnormal programs such as backdoors, Trojans and the like are identified, the system is periodically restored to an initial state, cloud and terminals are isolated in a one-way manner, and active immunization is realized.

Description

technical field [0001] The invention relates to a system security active defense method and device, in particular to a cloud-based active immune security defense method and device, belonging to the field of information security. Background technique [0002] Currently, security attacks are on the rise. The usual security defense strategy is to build a security system, such as improving the quality of the code to reduce vulnerabilities. Strategies to increase code security by reducing system design or coding errors are often impractical, because the system will come online with vulnerabilities known to developers or that may be generated in the future, and these vulnerabilities are likely to be attacked discovered and utilized. The defender uses various means to reduce system vulnerabilities and improve system security. But for a long time, in the confrontation of network security attack and defense, the attacker has always taken the initiative, while the defender has fa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455G06F21/56G06F21/57
CPCG06F9/45558G06F21/56G06F21/57G06F2009/45587G06F2221/033G06F2221/034
Inventor 邓高见马多耀黄雄栋李宜花
Owner 中科天御(苏州)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products