Mimicry defense construction method and system for edge computing cloud center

An edge computing and construction method technology, applied in the field of network security, can solve the problems of high cost of redundant heterogeneous entities, weak defense capabilities of unknown vulnerabilities, etc.

Active Publication Date: 2020-07-31
NANJING REDMATRIX NETWORK SECURITY TECH R & D INST
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Technical purpose: Aiming at the disadvantages of weak defense against unknown vulnerabilities in edge computing and the high cost of actively constructing redundant isomers in the prior art, the present invention discloses a method and system for constructing mimetic defense for edge computing cloud centers. Computing the heterogeneity existing in the network, constructing a heterogeneous pool and forming a collection of heterogeneous executives,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mimicry defense construction method and system for edge computing cloud center
  • Mimicry defense construction method and system for edge computing cloud center
  • Mimicry defense construction method and system for edge computing cloud center

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The present invention discloses a mimetic defense construction method and system oriented to an edge computing cloud center. The scheme will be further described and explained below in conjunction with the accompanying drawings.

[0054] Edge computing is to add mimetic tasks and data analysis processing functions on edge network devices, and migrate some or all computing tasks of the original cloud computing model to edge network devices to reduce the computing load of cloud computing centers. The structure of the edge network is as attached figure 1 As shown, the processing nodes of the edge network devices close to the Internet of Things are the edge network nodes. The edge network nodes are responsible for processing the service requests of their near-end IoT nodes. The cloud center is mainly responsible for the supervision of the edge network nodes and the synchronization of network data.

[0055] The edge network has the following characteristics:

[0056] 1) Due...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mimicry defense construction method and system for an edge computing cloud center. The method is applied to the technical field of network security, and comprises the steps of obtaining edge node information, constructing a heterogeneous pool, screening out a heterogeneous execution body set from the heterogeneous pool, synchronizing a mimicry task between a cloud centerand the heterogeneous execution body set, scheduling heterogeneous execution bodies in the heterogeneous execution body set by a dynamic heterogeneous redundancy module, and re-screening out the heterogeneous execution body set. According to the invention, the heterogeneity existing in the edge computing network is utilized to construct the heterogeneous pool and form the heterogeneous execution body set; the cloud center synchronizes the mimicry task to the heterogeneous execution body, a dynamic redundancy heterogeneous defense mechanism is established, attacks of hackers on specific systemsor software vulnerabilities are blocked, the redundancy mechanism can prevent functional anomalies caused by unknown vulnerabilities to a certain extent, the robustness and safety of an edge computing network are improved, and the cost of mimicry defense is reduced.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and system for constructing a mimetic defense oriented to an edge computing cloud center. Background technique [0002] The mimicry defense technology was proposed in 2013. Its fundamental origin is inspired by the phenomenon of biological mimicry, drawing on the working mechanism of the biological self-immune system, the proposed cyberspace mimicry defense theory with endogenous security effects, and rooting the security gene in the network information system In order to establish an endogenous immune system. After the mimicry defense was proposed, it has received widespread attention and recognition from domestic academic and industrial circles, and relevant departments and units have given strong support. Mimicry technology research and system development have been fully deployed at the national science and technology plan level. The principle of the mimic d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08G06F21/57
CPCG06F21/577H04L63/1433H04L63/1441H04L63/20H04L67/10
Inventor 羊子煜王泽雨陈垚赵海宁郁晨陈立全冯海生
Owner NANJING REDMATRIX NETWORK SECURITY TECH R & D INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products