Unlock instant, AI-driven research and patent intelligence for your innovation.

Compilation, operation and management method and system for mimicry multi-mode hybrid executive

A management method and executive technology, applied in the field of network security and information security, can solve problems such as cumbersome and complicated steps, and achieve the effect of easy portability, security assurance, and simplified manual configuration and deployment steps

Active Publication Date: 2021-01-05
EAST CHINA INST OF COMPUTING TECH
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When deployed, the mimic executive program not only needs to implement basic functions such as service discovery, resource configuration, automatic deployment, component connection, and identity authentication, but also monitors, organizes, and collaboratively manages newly added mimic application system services. The steps are cumbersome and complicated. For such problem, this paper proposes a method of compiling, running and managing based on mimicry multi-mode hybrid executive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Compilation, operation and management method and system for mimicry multi-mode hybrid executive
  • Compilation, operation and management method and system for mimicry multi-mode hybrid executive
  • Compilation, operation and management method and system for mimicry multi-mode hybrid executive

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] The present invention mainly expounds the mimic execution body on the mimic operation environment, through compiling and packaging, deploying the operation environment, executing service discovery, status monitoring and control management steps, the execution body running in various systems is converted and loaded into the mimic operation environment for use It runs automatically.

[0061] It includes three modules: multi-mode mixed execution file, mimic running environment and mimic running environment manager;

[0062] The mimetic multi-mode mixed execution file mainly provides the mimetic operating environment manager to actively search for a system suitable for multi-mode executive operation and construct a distributed mimetic operating environment. The execution file is a combination form, which includes an execution requirement list and multiple service programs;

[0063] The mimetic running environment provides the basic support environment for the execution body...

Embodiment 2

[0084] Performs a two-phase distributed autodiscovery deployment of files.

[0085] Usually, the executable file can be directly loaded into the memory and run on the operating system, but in a distributed heterogeneous / homogeneous environment on the mimic running environment, the executable file needs to find a platform that can be executed, otherwise it will not only fail to start, but also have no platform. Therefore, the executable must be organized into a special file format and a special process in order to achieve the goal of automatic deployment and execution. The mimic multi-mode hybrid executive adopts a two-stage distributed automatic discovery and deployment method. The first stage is the operation manager to build the operating environment: upload the file to the mimic operating environment manager, use the ZIP format to decompress the file, and read the requirements list in the root directory , forming a list of configurations for each executable’s operating envi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a compilation, operation and management method and a system for a mimicry multi-mode hybrid executive, and the method comprises the steps: 1, carrying out the compilation and packaging of the executive, and constructing an equivalent function service program running in multiple platforms; 2, deploying the mimicry operation environment by adopting a two-stage distributed automatic discovery deployment mode; 3, adopting the executive to obtain the service of the operating environment, and verifying the executive through a double tamper-proof self-checking process; 4, performing state monitoring on all components in the mimicry operation environment, and repairing when an operation fault is found; and 5, monitoring the service state of a component through an execution controller, and controlling the running state of the component. According to the method, resources are dynamically allocated and the operation components are connected according to mimicry program operation requirements, so that the manual configuration and deployment steps of the mimicry operation environment executor are simplified, and the standardization and effectiveness of mimicry execution body deployment are improved.

Description

technical field [0001] The invention relates to the technical fields of network security and information security, in particular to a method and system for compiling, running and managing a mimetic multi-mode hybrid executive. Background technique [0002] The traditional network defense technology adopts a passive defense mechanism. The main reason is that there is a close relationship between the internal structures, which makes it impossible to dynamically change the components under attack, and it is difficult to deal with unknown threats. However, cyberspace mimicry defense is a generalized robust control architecture. , and has a deceptive camouflage or stealth mechanism, so a physical or logical scenario similar to the uncertainty effect of quantum mechanics is produced. Using this method can provide reliability guarantees in the target software and hardware systems, The intensive application service function of the "trinity" of security, trustworthiness and defense. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/41G06F9/48G06F9/50G06F21/64
CPCG06F8/41G06F9/4881G06F9/5027G06F21/64
Inventor 李翔全水龙彭咏戴曦南余新胜霍立田付琳沈雷
Owner EAST CHINA INST OF COMPUTING TECH