An attack defense device, method, device and medium based on mimic defense
An executive and heterogeneous technology, applied in the direction of safety communication devices, digital transmission systems, electrical components, etc., can solve the problems of reducing the superiority of heterogeneous redundancy, unavailability, and affecting system stability, so as to improve reliability and Availability, enhanced overall security, reduced effects of restart cleaning
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0088] In this embodiment, an attack defense device based on mimic defense of the present invention is a mimic switch, the front-end chip is a switch chip, and an attack defense method based on mimic defense of the present invention is applied in the mimic switch, as shown in the appendix Figure 4 The specific process is as follows:
[0089] Step 1: The mimic scheduler in the mimic switch collects packet data sent by the switch chip.
[0090] Step 2: The mimic scheduler extracts key parameters in the message data.
[0091] Different protocols in the packet data result in different key parameters extracted. In this embodiment, in the packet data sent by the switching chip, the protocols are the STP protocol, the OSPF protocol, the RIP protocol, and the TCP protocol.
[0092] For the STP protocol, extract the BPDU message type, flag bit, root bridge ID, root path cost, sender ID, port ID, message lifetime, maximum lifetime, Hello Time, and MAC address information in BPDU pack...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


