Mimicry bracket implementation device and method in distributed mode

A distributed, bracketed technology, applied in the field of network security, can solve problems such as lack of mimic bracket design, avoid homogeneous loopholes, ensure stable and reliable operation, and prevent malicious attacks.

Active Publication Date: 2021-01-15
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU +1
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the security risk caused by attacks on the mimic brackets themselves, and the current lack of robust design of mimic brackets, the present invention proposes a device and method for implementing mimic brackets in a distributed mode

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mimicry bracket implementation device and method in distributed mode
  • Mimicry bracket implementation device and method in distributed mode
  • Mimicry bracket implementation device and method in distributed mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038]Such asfigure 1 As shown, a mimic bracket implementation device in a distributed mode includes a user agent unit, a distributed service agent unit, a voting unit, a heterogeneous redundant executive pool, and a control unit;

[0039]The user agent unit is used to receive user requests, add tags and control information to the user requests, and distribute the user requests to the distributed service agent unit; it is also used to receive and parse the response message returned by the distributed service agent unit, and send To the voting unit; also used to analyze the voting result of the voting unit and send it to the user; specifically, the control information includes but is not limited to (1) user IP: after passing through the user agent unit, the distributed service agent unit cannot directly obtain For the IP address of the client, the voting unit finds it is difficult for the attacker's IP; (2) Message scrambling code: such as encrypting part of the content, which has a con...

Embodiment 2

[0045]On the basis of Example 1, such asfigure 2 As shown, the present invention also discloses a device for implementing mimic brackets in distributed mode. The difference from Embodiment 1 is:

[0046]Further, the user agent unit includes a user-side link establishment and maintenance module, a message analysis and identification processing module, and a data distribution and maintenance module;

[0047]The user-side link establishment and maintenance module is used to establish and maintain a communication link with the user end;

[0048]The message analysis and identification processing module is used to parse the message sent by the user, add tags and control information to the user's request, and is also used to analyze the verification information returned by the distributed service agent unit;

[0049]The data distribution and maintenance module is used for distributing and maintaining data sent by users, and is also used for receiving response messages returned by the distributed servi...

Embodiment 3

[0055]On the basis of Example 2, such asimage 3 As shown, the present invention also discloses a distributed mode mimic bracket implementation device, which differs from Embodiment 2 in:

[0056]Further, the user agent unit and the voting unit are both located on the IO agent; the IO agent also includes multiple data sending channels and data receiving channels.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network security, and discloses a distributed mode mimicry bracket implementation device and method, and the device comprises a user agent unit, a distributed business agent unit, a voting unit, a heterogeneous redundant execution body pool, and a control unit. The user agent unit comprises a user side link establishment and maintenance module, a message analysis and identification processing module and a data distribution and maintenance module; the service agent example comprises a message transceiving module, a message restoring module and a message checking module; the user agent unit and the voting unit are both located on the IO agent; the IO agent further comprises a plurality of data sending channels and data receiving channels. According to the invention, an attacker can be prevented from maliciously attacking the mimicry system for the mimicry bracket, and reliable operation of the mimicry defense system is ensured.

Description

Technical field[0001]The invention belongs to the technical field of network security, and in particular relates to a distributed mode mimic bracket realization device and method.Background technique[0002]In today's Internet age, cyberspace security has increasingly become one of the most severe challenges. According to the "45th Statistical Report on the Development of the Internet in China", the operation of information systems may be attacked by security threats using software and hardware vulnerabilities and backdoors, such as web page tampering and worms based on application layer HTTP protocol, based on application support layer Backdoors and vulnerability attacks of web containers, distributed file systems, cloud containers based on the basic layer, and operating system backdoors and vulnerability attacks.[0003]Mimic defense technology (Wu Jiangxing. Mimic defense technology builds endogenous security in national information cyberspace[J].Information and Communication Technol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0218H04L63/0281H04L63/12H04L63/1433H04L63/1441
Inventor 邬江兴扈红超宋克程国振何赞园周大成何威振
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products