Device and method for implementing mimic brackets in distributed mode

A distributed, bracketed technology, applied in the field of network security, can solve problems such as lack of mimetic bracket design, and achieve the effect of avoiding homogeneous loopholes, simplifying functions, and reducing risks

Active Publication Date: 2022-06-21
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the security risk caused by attacks on the mimic brackets themselves, and the current lack of robust design of mimic brackets, the present invention proposes a device and method for implementing mimic brackets in a distributed mode

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method for implementing mimic brackets in distributed mode
  • Device and method for implementing mimic brackets in distributed mode
  • Device and method for implementing mimic brackets in distributed mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] like figure 1 As shown, a distributed mode mimic bracket implementation device includes a user agent unit, a distributed business agent unit, a voting unit, a heterogeneous redundant executive pool and a control unit;

[0039] The user proxy unit is used to receive user requests, add labels and control information to the user requests, and distribute user requests to the distributed service proxy unit; it is also used to receive and parse the response message returned by the distributed service proxy unit, and send to the voting unit; it is also used to parse the voting result of the voting unit and send it to the user; specifically, the control information includes but is not limited to (1) user IP: after passing through the user proxy unit, the distributed service proxy unit cannot directly obtain The IP address of the client, the voting unit finds it difficult to find the attacker's IP; (2) Packet scrambling: For example, encrypting part of the content will cause con...

Embodiment 2

[0045] On the basis of Example 1, as figure 2 As shown in the figure, the present invention also discloses a device for realizing the mimetic brackets in a distributed mode, and the difference from Embodiment 1 is:

[0046] Further, the user agent unit includes a user-side chain building and maintenance module, a message parsing and identification processing module, and a data distribution and maintenance module;

[0047] The user side chain establishment and maintenance module is used for establishing and maintaining a communication link with the user end;

[0048] The message parsing and identification processing module is used to parse the message sent by the user, add labels and control information to the user request, and parse the verification information returned by the distributed service proxy unit;

[0049] The data distribution and maintenance module is used to distribute and maintain the data sent by the user, and is also used to receive the response message return...

Embodiment 3

[0055] On the basis of Example 2, as image 3 As shown, the present invention also discloses a distributed mode mimic bracket implementation device, and the difference from Embodiment 2 is:

[0056] Further, both the user agent unit and the voting unit are located on the IO agent; the IO agent further includes a plurality of data sending channels and data receiving channels.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network security, and discloses a device and method for implementing mimic brackets in a distributed mode. The device includes a user agent unit, a distributed service agent unit, a voting unit, a heterogeneous redundant execution body pool and a control unit; The user agent unit includes a user-side link building and maintenance module, message analysis and identification processing module, data distribution and maintenance module; the business agent instance includes a message sending and receiving module, a message restoration module and a message verification module; Both the user agent unit and the voting unit are located on the IO agent; the IO agent also includes a plurality of data sending channels and data receiving channels. The invention can prevent attackers from maliciously attacking the mimic system against the mimic brackets, and ensure the reliable operation of the mimic defense system.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a device and method for realizing mimetic brackets in a distributed mode. Background technique [0002] In today's Internet era, cyberspace security has increasingly become one of the most serious challenges. According to the "45th Statistical Report on the Development of China's Internet", the operation of information systems may be attacked by security threats through software and hardware vulnerabilities and backdoors, such as: web page tampering and worms based on the application layer HTTP protocol, based on the application support layer Backdoors and exploits of web containers, distributed file systems, cloud containers based on the base layer, backdoors and exploits of operating systems. [0003] Mimic defense technology (Wu Jiangxing. Mimic defense technology builds endogenous security of national information cyberspace [J]. Information and Communica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0218H04L63/0281H04L63/12H04L63/1433H04L63/1441
Inventor 邬江兴扈红超宋克程国振何赞园周大成何威振
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products