Safe operation method and system of mimicry voter

A technology of safe operation and voting device, applied in the field of network security, to increase uncertainty, ensure security, and improve the difficulty of attack

Active Publication Date: 2020-07-31
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU +1
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the web server has become the main attack target of network hackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe operation method and system of mimicry voter
  • Safe operation method and system of mimicry voter
  • Safe operation method and system of mimicry voter

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0046] Such as figure 1 As shown, it is a method flowchart of Embodiment 1 of a safe operation method of a mimetic voting device disclosed by the present invention, and the method may include the following steps:

[0047] S101. Store the heterogeneous compilation algorithm;

[0048] When it is necessary to realize the safe operation of the mimetic voter, the heterogeneous compilation algorithm used to generate the variant of the mimetic voter is stored first....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe operation method and system for a mimicry voter, and the method comprises the steps: storing a heterogeneous compiling algorithm, and obtaining a safety demand parameterof a user; calling a heterogeneous compiling algorithm based on the parameters to generate a specific number of mimicry voter variants, and storing the generated mimicry voter variants; and randomlycalling one mimicry voter variant from the stored mimicry voter variants based on the parameters to perform online service. According to the invention, the mimicry voter software can be isomerized andcompiled on the basis of software diversification and moving target defense thought, and meanwhile, the voter variants are periodically and randomly scheduled according to user requirements, so the uncertainty of voter service is increased, the attack difficulty of attackers is improved, and the safety of the mimicry voter is guaranteed.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and system for safe operation of a mimetic voter. Background technique [0002] In today's network environment, the web service system, as an important service bearing and providing platform, is a virtual representative of the government, enterprises and individuals on the Internet, and it brings together massive data resources, such as user information, enterprise data, financial finance, business secrets, Intellectual property rights, customer order information, etc. Its importance is self-evident. Therefore, the web server becomes the main attack target of network hackers. Network hackers use various channels, various attack tools, and various deceptive means to obtain the information they want. [0003] Practice has proved that the mimetic web server, as an important engineering implementation of the mimetic defense technology, can effectively defend agai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F8/41G06F16/955
CPCG06F21/55G06F8/41G06F16/9566
Inventor 张铮刘浩邬江兴王晓梅刘镇武唐源张高斐马博林李秉政
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products