A mimetic defense device, mimetic defense method and mimetic defense architecture

A heterogeneous, virtual machine technology, applied in computer security devices, instruments, computing, etc., can solve problems such as increasing the difficulty and cost of body mimicry transformation, and reducing the efficiency of executive body mimicry transformation, to ensure security and prevent mimicry. Escape, credibility-enhancing effects

Active Publication Date: 2022-07-26
河南信大网御科技有限公司 +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when building a mimetic defense system, in order to make the executive body or the executive body set have a mimetic defense function, it is necessary to change the structure of the original executive body or the original executive body set, thus increasing the execution body mimic transformation. Difficulty and cost, reducing the efficiency of body mimic transformation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mimetic defense device, mimetic defense method and mimetic defense architecture
  • A mimetic defense device, mimetic defense method and mimetic defense architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] like figure 1 As shown, the first aspect of the present invention provides a mimetic defense device, comprising an input module, an output module, an agent module and a plurality of heterogeneous processor modules, the agent module includes a copy distribution unit, a judgment unit and a selection output unit; preferably , the selection output unit and the judgment unit are respectively software function modules generated inside the proxy module using software programming;

[0039] The input module supports the reception and transmission of external data;

[0040] The copying and distributing unit is respectively connected with the input module and a plurality of heterogeneous processor modules, receives external data sent by the input module, and copies and distributes it to the plurality of heterogeneous processor modules;

[0041] Each heterogeneous processor module includes an input agent, a plurality of heterogeneous virtual machines, and an arbiter. The input age...

Embodiment 2

[0054] This embodiment provides a mimetic defense method, comprising the following steps:

[0055] The input module receives external data, and replicates and distributes the external data to multiple heterogeneous processor modules through the replication and distribution unit of the agent module;

[0056] The input agent of each heterogeneous processor module replicates and distributes external data to multiple heterogeneous virtual machines, and multiple heterogeneous virtual machines process the external data and output the processing results to the arbiter; The processing result of the machine is used for adjudication, and the adjudication result is output to the selection output unit;

[0057] The judgment unit obtains the judgment results output by the multiple heterogeneous processor modules from the selection output unit, judges the multiple judgment results, and returns the judgment results to the selection output unit;

[0058] The selection output unit selects a j...

Embodiment 3

[0066] This embodiment provides a mimetic defense architecture, such as figure 2 As shown in the figure, it includes the aforementioned mimetic defense device and an executor, and the mimetic defense device is connected to the executor for receiving external data, analysing and adjudicating the external data, and outputting the adjudication result to the executor; the execution The body responds to the ruling.

[0067] It should be noted that the mimetic defense architecture can be applied in front of servers, routers or other devices according to specific mimetic defense requirements.

[0068] By adding a mimetic defense device with independent functions at the front end of the executive body, the data received by the executive body at this time is the data that has been judged by the mimetic defense device, and its security can be effectively guaranteed, that is, it can effectively ensure that the executive body does not It will be attacked by this external data; on the pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a mimic defense device, a mimic defense method, and a mimic defense architecture, wherein the mimic defense device includes an input module, an output module, an agent module and a plurality of heterogeneous processor modules, and the agent module includes a copy distribution unit, a judgment unit and select output unit; copy distribution unit, receive external data sent by input module and copy and distribute to multiple heterogeneous processor modules; each heterogeneous processor module includes an arbiter and multiple heterogeneous virtual machines. The arbiter is used to process external data, and the arbiter is used to adjudicate the processing results of multiple heterogeneous virtual machines; select the output unit, and select a heterogeneous processor module according to the judgment result and the preset selection strategy. The result is output through the output module; the judgment unit is configured to judge the judgment results output by the multiple heterogeneous processor modules.

Description

technical field [0001] The present invention relates to the field of mimic defense, in particular, to a mimic defense device, a mimic defense method and a mimic defense structure. Background technique [0002] Dynamic Heterogeneous Redundancy Architecture (DHR) is a principle method to realize mimic defense. Based on the non-similar redundancy structure in the reliability field, a multi-dimensional dynamic reconstruction mechanism is introduced to make it have the high reliability characteristics of DRS, and at the same time It also has high security of mimetic defense. [0003] In the DHR architecture, the input agent of the system forwards the input to each executive in the current heterogeneous executive set, and submits the output vector of these executives to the arbiter for voting to obtain the system output; we combine the input agent and the multi-mode The Arbiter is commonly known as "Mimic Bracket" (MB); obviously, Mimic Bracket is a necessary part of the entire M...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/53G06F21/55G06F21/56
CPCG06F21/53G06F21/554G06F21/566
Inventor 武彭彭吕青松宋延坡郭义伟宋帅康邵文超冯志峰陈国仁
Owner 河南信大网御科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products