Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Annular mimicry architecture without protocol state, defense method and readable storage medium

A protocol state, loop technology, applied in the field of mimic defense systems, can solve the problems of unguaranteed security, reduced agent efficiency, system performance bottlenecks, etc., to achieve the effect of simplified functions, improved efficiency, and improved security

Inactive Publication Date: 2020-09-04
河南信大网御科技有限公司 +1
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this method, the agent generally runs on the server, such as nginx. In this way, the agent needs to establish a connection with the equivalent heterogeneous execution body of heterogeneous redundancy, and perform the same operation, which reduces the efficiency of the agent and improves the performance requirements for the agent. , the proxy can easily become the performance bottleneck of the entire system
At the same time, the agent runs in a systematic environment, and its own security cannot be guaranteed
In addition, after processing the request, the equivalent heterogeneous executive will send the processing result to the arbiter for adjudication, and the adjudication result will be returned by the same route. The request and response are on the same line, which will also damage the system security to a certain extent.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Annular mimicry architecture without protocol state, defense method and readable storage medium
  • Annular mimicry architecture without protocol state, defense method and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] Such as figure 2 As shown in , a ring-like mimic architecture without protocol state, including input agent, equivalent heterogeneous executive, arbiter and feedback controller, the output side of the input agent communicates with each equivalent heterogeneous through a one-way communication channel Communication is established between execution bodies of different structures, and the output side of each equivalent heterogeneous execution body establishes communication with the arbiter through a one-way communication channel, and the output side of the arbiter is connected to a one-way request side communication channel. The arbiter also establishes a connection with the feedback controller. The feedback controller controls the state of each equivalent heterogeneous execution body. The input agent is an independent simple module with the functions of protocol normalization and message copying and distribution, such as FPGA or simple hardware circuit.

[0030] When per...

Embodiment 2

[0042] A readable storage medium, on which computer instructions are stored, and when the computer instructions are executed by a processor, the described mimic defense method is realized.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a mimicry defense method for an annular mimicry architecture without a protocol state. The method comprises the following steps that: a request side sends request information toan input agent, and the input agent copies and distributes the request information to each equivalent heterogeneous execution body through a one-way communication channel after normalizing a protocol; each equivalent heterogeneous execution body processes the request information and sends response information to a judgment module through a one-way communication channel; and the judgment module judges the response information, sends the response information to a request side through a one-way request side communication channel if judgment succeeds, and sends the judgment information to a feedback controller if judgment fails so as to adjust the state of each heterogeneous execution body. According to the mimicry defense method, the requirement on the input agent is reduced, the structure of the agent is simplified, the agent is prevented from becoming a performance bottleneck, the problem that the agent is easily attacked is solved, and the security of the whole mimicry architecture isimproved.

Description

technical field [0001] The invention relates to a mimetic defense system, in particular to a ring-like mimetic architecture in a no-protocol state, a defense method and a readable storage medium. Background technique [0002] With the rapid development of the network, more and more security issues in cyberspace have been exposed, and traditional passive defenses are often powerless to deal with increasingly complex network security issues. Cyberspace mimicry defense technology fundamentally transforms passive defense against unknown problems in unknown environments into active defense. [0003] A mimic defense system generally consists of an input agent, an equivalent heterogeneous executive, an arbiter, and a feedback controller. The input agent completes the copying and distribution of the input information on the request side to the equivalent heterogeneous executor; the equivalent heterogeneous executor executes the information input on the request side and outputs the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L67/1095H04L63/0281H04L67/565H04L67/60
Inventor 徐虹郭义伟白果冯志峰王群锋高岳杨少雪
Owner 河南信大网御科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products