Isomer scheduling method in mimicry DNS defense system control unit

A technology of defense system and control unit, applied in the direction of transmission system, electrical components, etc., can solve the problem of not considering the fluctuation effect of performance index

Active Publication Date: 2020-09-22
BEIJING RUNSTONE TECH
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this scheduling strategy is that it does not consider the impact of the fluctuation of performance indicators on the entire mimic DNS defense system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Isomer scheduling method in mimicry DNS defense system control unit
  • Isomer scheduling method in mimicry DNS defense system control unit
  • Isomer scheduling method in mimicry DNS defense system control unit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The implementation of the present invention will be described in detail below with reference to the accompanying drawings and embodiments, so as to fully understand how the present invention applies technical means to solve technical problems and achieve the realization process of technical effects and implement them accordingly. It should be noted that, as long as there is no conflict, each embodiment of the present invention and each feature in each embodiment can be combined with each other, and the technical solutions formed are all within the protection scope of the present invention.

[0036] In addition, the steps shown in the flowcharts of the drawings can be executed in a computer system such as a set of computer-executable instructions, and although the logical sequence is shown in the flowcharts, in some cases, they can be different Perform the steps shown or described in the order here.

[0037] The principle of the scheduling strategy algorithm provided by the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an isomer scheduling method in a mimicry DNS defense system control unit. The method comprises the following steps: 1) obtaining a difference value between isomers according toparameters, the parameters comprising the number (L) of redundant executors, the minimum number (P) of scheduled executors, the type of an operating system of the isomers, and the type and version ofsource DNS analysis software adopted by the isomers; 2) obtaining credible values of the isomer according to the running state and the performance index of the isomer, wherein the credible values comprise a CPU utilization rate, a memory utilization rate, response time delay, running duration, an analysis success rate and scheduling participation times; 3) randomly selecting a seed random quantity; and step 4) finally selecting a group of isomers as a scheduling strategy according to the step 1), the step 2) and the step 3). By adopting the weighted random dissimilatory maximum algorithm introduced by the invention, the selection of the isomer is more scientific and accurate, the method is suitable for daily operation of the mimicry DNS defense system, and the operation of the mimicry DNSdefense system is promoted to be more stable and safer.

Description

Technical field [0001] The invention belongs to the technical field of network technology and mimic DNS defense system, and specifically relates to a weighted random alienation maximum value algorithm for isomer scheduling. Background technique [0002] The new generation of information infrastructure is built on the basis of networking, cloudization, virtualization and intelligence. Its security challenges are often endogenous and inevitable. In order to enhance its basic immunity, it must be based on At the initial stage of facility technology development and at the beginning of network design, security is regarded as its inherent and core basic requirement. Mimic defense is a new idea that transforms the security landscape. It builds a dynamic redundant system architecture or operating mechanism to improve security. [0003] The domain name system DNS is one of the important infrastructures of the Internet. It has the characteristics of open protocol, scattered deployment, huge...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/1483H04L61/4511Y02P90/02
Inventor 王立俊孙萍贺磊李宜明张伟丽项朝君
Owner BEIJING RUNSTONE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products