Mimicry switch judgment system and method based on trusted measurement

A method of adjudication, a technology of credibility, applied in the field of network security

Active Publication Date: 2020-11-03
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU +1
View PDF11 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the problem that the existing patched switch defense method can only defend against security threats caused by known loopholes and backdoors, but is helpless against zero-day loopholes and unknown backdoors, the present invention proposes a verdict system for mimic switches based on trusted metrics and method, the mimic switch has built-in security capabilities, which can reduce the security threats caused by unknown vulnerabilities and potential backdoors of the switch to the local area network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mimicry switch judgment system and method based on trusted measurement
  • Mimicry switch judgment system and method based on trusted measurement
  • Mimicry switch judgment system and method based on trusted measurement

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The present invention will be further explained below in conjunction with accompanying drawing and specific embodiment:

[0055] Such as figure 1 As shown, a mimetic switch arbitration system based on trusted metrics, including forwarding plane, management interface agent, intermediate adaptation module, forwarding plane agent, multiple heterogeneous executives (switch network operating systems), based on trusted metrics The Mimic Judgment Module and Situational Awareness and Negative Feedback Scheduling Module:

[0056] The forwarding plane is used to complete the forwarding of data messages, the reporting of protocol messages and the access of management systems;

[0057] The management interface agent is used to complete the distribution of management configuration information to multiple executives, realize the single presentation of multiple executives to the management user, and simultaneously realize the access of the management user to the situation awareness a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network security, and discloses a mimicry switch decision system based on trusted measurement, and the system comprises a forwarding plane, a managementinterface agent, an intermediate adaptation module, a forwarding plane agent, a plurality of heterogeneous actuators, a trusted measurement-based mimicry decision module and a situation awareness andnegative feedback scheduling module. The invention further discloses a mimicry switch judgment method based on trusted measurement. The mimicry switch judgment method comprises the steps: setting mimicry switch judgment elements; distributing input information; collecting output information; carrying out mimicry decision based on credibility measurement; issuing a judgment result, sensing the threat situation of the switch, and scheduling an executor; the mimicry decision based on credibility measurement comprises the following steps: establishing an executive credible index tree; collectingand updating the credible index data of the executive body; calculating the credible weight of the output result of each executive body; and calculating the credibility of each output result. The method can effectively reduce the influence of unknown loopholes and potential backdoors, and improves the safety protection level of a local area network.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a verdict system and method for a mimetic switch based on trustworthiness measurement. Background technique [0002] With the rapid development of network communication technology, the network has been integrated into all fields of society, and has brought a profound impact on politics, economy, people's work and life. However, in recent years, network security incidents have emerged one after another, which has had a huge impact on the country, society, economy, and people's work and life. Network security has also attracted extensive attention from various countries, and the network security industry is also developing rapidly. As an important network infrastructure, switches are full of switches and play an extremely important role in enterprise networks, data center networks, or carrier networks. However, the existing technical level (Principles of Mimic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/931G06F17/16
CPCH04L63/1441H04L63/20H04L49/20G06F17/16
Inventor 谢记超张震伊鹏马海龙陈祥张进程章龙丁瑞浩
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products