Unlock instant, AI-driven research and patent intelligence for your innovation.

An attack defense device, method, device and medium based on mimic defense

An executive and heterogeneous technology, applied in the direction of safety communication devices, digital transmission systems, electrical components, etc., can solve the problems of reducing the superiority of heterogeneous redundancy, unavailability, and affecting system stability, so as to improve reliability and Availability, enhanced overall security, reduced effects of restart cleaning

Active Publication Date: 2022-08-05
PURPLE MOUNTAIN LAB
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the mimic scheduler sends the same attack message to the heterogeneous executable again, the heterogeneous executable will still appear abnormal again after receiving it, resulting in the heterogeneous executable being in an unavailable state all the time. Greatly reduces the advantages of heterogeneous redundancy and affects the overall stability of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An attack defense device, method, device and medium based on mimic defense
  • An attack defense device, method, device and medium based on mimic defense
  • An attack defense device, method, device and medium based on mimic defense

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0088] In this embodiment, an attack defense device based on mimic defense of the present invention is a mimic switch, the front-end chip is a switch chip, and an attack defense method based on mimic defense of the present invention is applied in the mimic switch, as shown in the appendix Figure 4 The specific process is as follows:

[0089] Step 1: The mimic scheduler in the mimic switch collects packet data sent by the switch chip.

[0090] Step 2: The mimic scheduler extracts key parameters in the message data.

[0091] Different protocols in the packet data result in different key parameters extracted. In this embodiment, in the packet data sent by the switching chip, the protocols are the STP protocol, the OSPF protocol, the RIP protocol, and the TCP protocol.

[0092] For the STP protocol, extract the BPDU message type, flag bit, root bridge ID, root path cost, sender ID, port ID, message lifetime, maximum lifetime, Hello Time, and MAC address information in BPDU pack...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attack defense device, method, equipment and medium based on mimic defense. The device includes a mimic scheduler and several heterogeneous executives; the heterogeneous executive receives and processes message data sent by the mimic scheduler; The mimetic scheduler includes a mimetic judgment module and an attack defense module, which are used to receive the message data sent by the front-end chip and forward it to the heterogeneous executors, so as to realize the data distribution, mimetic judgment and cleaning management of the heterogeneous executors; The downlink data of the heterogeneous executors makes a mimetic judgment, and sends the result of the mimetic judgment to the attack defense module; the attack defense module collects, extracts, and logs the packet data sent by the front-end chip, and makes a mimetic judgment according to the mimetic judgment module. As a result, log updates, attack defense detection, and attack data filtering are performed. The invention performs attack detection and judgment on the message data and effectively filters the abnormal message data, thereby reducing the number of cleaning times of the isomer executive body.

Description

technical field [0001] The invention relates to the technical field of computer network security, in particular to an attack defense device, method, device and medium based on mimic defense. Background technique [0002] The current cyberspace is in a security situation of "easy to attack and difficult to defend". How to improve the security of cyberspace is one of the most serious challenges in the current information age. Mimic defense technology is based on the endogenous security theory with dynamic heterogeneous redundant structure as the core, which can prevent security threats based on unknown and known vulnerability backdoors, and greatly enhance the ability of critical business networks to deal with external intrusion and internal penetration. [0003] Mimic products are based on existing network equipment, integrate mimic defense technology, introduce multiple heterogeneous processing engines as heterogeneous executors in their architecture, and include mimic netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/0227H04L63/1441H04L63/1425
Inventor 张校臣倪晓波李彧于波武彦平詹俊林彦竹吴树平
Owner PURPLE MOUNTAIN LAB