Mimicry defense construction method and system for edge computing cloud center
An edge computing and construction method technology, applied in the field of network security, can solve the problems of high cost of redundant heterogeneous entities, weak defense capabilities of unknown vulnerabilities, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0053] The present invention discloses a mimetic defense construction method and system oriented to an edge computing cloud center. The scheme will be further described and explained below in conjunction with the accompanying drawings.
[0054] Edge computing is to add mimetic tasks and data analysis processing functions on edge network devices, and migrate some or all computing tasks of the original cloud computing model to edge network devices to reduce the computing load of cloud computing centers. The structure of the edge network is as attached figure 1 As shown, the processing nodes of the edge network devices close to the Internet of Things are the edge network nodes. The edge network nodes are responsible for processing the service requests of their near-end IoT nodes. The cloud center is mainly responsible for the supervision of the edge network nodes and the synchronization of network data.
[0055] The edge network has the following characteristics:
[0056] 1) Due...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com