Network security defense method and system, effect evaluation method and related device thereof

A network security and defense system technology, applied in the fields of related devices, systems and their effect evaluation methods, and network security defense methods, can solve the problems of computing technology cyberspace full of risks and uncertain threats, and achieve the ultimate goal of solving endogenous security problems. Effect

Inactive Publication Date: 2021-01-12
CHINA NAT DIGITAL SWITCHING SYST ENG & TECHCAL R&D CENT +1
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The development of contemporary computing technology has brought mankind into a glorious information age, but

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security defense method and system, effect evaluation method and related device thereof
  • Network security defense method and system, effect evaluation method and related device thereof
  • Network security defense method and system, effect evaluation method and related device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The construction principle of the dynamic heterogeneous redundant memory elimination device and the network security defense system disclosed in the embodiment of the present application is as follows:

[0048] 1. The applicant proposed the definition and connotation of endogenous security issues

[0049]The cyberspace of the information world has the same philosophical essence as the physical space of the real world: "everything is a self-generated (endogenous) contradiction, and contradiction is the root of all movement and vitality." The identity of contradictions is the prerequisite for the existence and development of things, and they are the conditions for the development of each other. The fighting nature of the contradiction will promote the ebb and flow of the two sides of the contradiction, resulting in an unbalanced development of the forces of both sides, and creating conditions for the transformation of opposites and the qualitative change of things. Takin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

According to the technical scheme, the influence of generalized disturbance on the second strategy is eliminated by using the first strategy comprising encoding, decoding and memory elimination strategies, correct calculation, storage and communication of the data are realized by acting the second strategy on the data, and the generalized disturbance is used as an external cause, so the internal cause of the fault of the second strategy can be activated, and error and failure are generated, so the error and failure caused by the activated fault can be corrected through the first strategy, andthe first strategy is obtained through adjustment of the feedback control strategy triggered by the decoding result of the processed data; therefore, a closed loop is formed between the steps, and theendogenous security problem is solved without external software and hardware. In conclusion, according to the technical scheme provided by the invention, the endogenous safety problem can be solved through an endogenous safety mechanism.

Description

technical field [0001] The present application relates to the field of network security, and in particular to a network security defense method, system and effect evaluation method thereof, and related devices. Background technique [0002] The development of contemporary computing technology has brought mankind into a glorious information age, but the security flaws of existing computing technology itself make cyberspace full of risks and uncertain threats. In cyberspace, besides intrinsic (meta) functions, a software or hardware structure (or strategy) always has associated or derived explicit side effects or implicit dark functions. Triggered by factors, it will affect the correct expression of intrinsic functions. We call such side effects and dark functions "endogenous security problems" in cyberspace. Contents of the invention [0003] During the research process, the applicant found that most of the security threats in cyberspace are formed by the external cause of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L1/22
CPCH04L63/20H04L1/22H04L63/1441H04L63/1416
Inventor 邬江兴贺磊任权周俊傅敏张伟丽丁瑞浩郭义伟周金锁
Owner CHINA NAT DIGITAL SWITCHING SYST ENG & TECHCAL R&D CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products