Protocol agent processing method and system based on mimicry defense

A processing method and protocol technology, applied in transmission systems, electrical components, etc., can solve the problems of complex protocol packet duplication in protocol packet processing, and achieve the effect of highlighting substantive features, simplifying processing steps, and reducing duplication.

Active Publication Date: 2020-07-14
河南信大网御科技有限公司 +1
View PDF11 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention aims at the above problems, it is necessary to provide a protocol agent processing method and system based on mimicry defense, which

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protocol agent processing method and system based on mimicry defense
  • Protocol agent processing method and system based on mimicry defense

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Such as figure 1 As shown, the first aspect of the present invention proposes a protocol message processing method based on mimic defense, including:

[0028] The protocol receiving port sends the protocol message to the input agent and SDK, and the protocol message includes the first message information; in specific applications, the designated protocol receiving port can be selected according to the type of the protocol message to perform the protocol message processing Send and receive

[0029] The SDK obtains the second message information related to the protocol receiving port, extracts the first message information from the protocol message, stores the first message information and the second message information in a one-to-one correspondence, and creates the first message Message information query interface; specifically, a table similar to the mac table can be created in the SDK to store the first message information and the second message information;

[0030] The in...

Embodiment 2

[0045] Such as figure 2 As shown, the present invention also provides a protocol message processing system based on mimic defense, including:

[0046] The protocol receiving port is used to receive and forward the protocol message, the protocol message including the first message information;

[0047] The SDK includes a message information acquisition module, a storage module, and a first message query interface. The message acquisition module is connected to the protocol receiving port for extracting first message information in the received protocol message, and Acquire the second message information related to the protocol receiving port; the storage module is used to store the first message information and the second message information correspondingly; the first message query interface is connected to the storage module , For querying whether the storage module has first message information according to the received first message query request, and returning corresponding se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a protocol agent processing method based on mimicry defense. The protocol agent processing method comprises the steps that a protocol receiving and reporting port sends a protocol message to an input agent and an SDK; the SDK acquires second message information related to the protocol receiving and reporting port, extracts the first message information from the protocol message, stores the first message information and the second message information in a one-to-one correspondence manner, and creates a first message information query interface; the input agent copies theprotocol message and distributes the protocol message to a plurality of heterogeneous executors; each heterogeneous execution body acquires second message information from the SDK according to the first message information in the protocol message, and processes the protocol message according to the first message information and the second message information; each heterogeneous executive judges whether the heterogeneous executive is a main executive according to the main executive information issued by the scheduling module, and sends a protocol message processing result to the front-end interface if the heterogeneous executive is the main executive. The invention further provides a protocol agent processing system based on the mimicry defense.

Description

Technical field [0001] The invention relates to the technical field of cyberspace security, in particular to a protocol proxy processing method and system based on mimic defense. Background technique [0002] With the rapid development of networks, more and more security issues in cyberspace are exposed, and traditional passive defenses are often powerless against increasingly complex network security issues. Cyberspace mimic defense technology fundamentally transforms passive defense against unknown problems in unknown environments to active defense. [0003] The mimic defense system is generally composed of input agents, equivalent heterogeneous executors, arbiter, and feedback controller. The input agent completes the copying and distribution of external input information to the heterogeneous executors; the heterogeneous executor executes the externally input information and outputs the results; the arbiter performs multi-mode arbitration on the input results; the feedback cont...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06
CPCH04L63/1441H04L63/20H04L69/26H04L67/562H04L67/56H04L67/133
Inventor 徐虹白果吕青松郭义伟冯志峰于天
Owner 河南信大网御科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products