Unlock instant, AI-driven research and patent intelligence for your innovation.

Relay routing pyramid data storage method and device

A data storage and pyramid technology, applied in the field of information security, to achieve the effect of improving data reading efficiency and improving data storage management efficiency

Active Publication Date: 2021-06-11
敦和万物信息技术(苏州)有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to propose a relay routing pyramid data storage method and device, aiming to solve how to improve the storage and reading efficiency of relay routing data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Relay routing pyramid data storage method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Kademlia protocol, Kad is a distributed hash table (DHT) technology, through the unique XOR algorithm (XOR) as the distance measurement basis, a new DHT topology is established, which can greatly improve the routing query speed.

[0022] Kad has now become the mainstream implementation of DHT, and the p2p network that the Mozi botnet parasitizes is also based on Kad. The Kademlia algorithm is a distributed hash storage and routing algorithm. Each node of the P2P network based on the Kad protocol stores some resources.

[0023] In the p2p network built by the Kademlia protocol, all information is stored in the form of hash table entries, and these entries are scattered and stored on each node, thus forming a huge distributed hash table in the whole network.

[0024] node distance. The data key value (Key) and node ID (NodeID) in the Kademlia network are represented by 160 bits, and the NodeID is randomly assigned when joining the network. The Kad protocol stipulates th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a relay routing pyramid data storage method, which is applied to a P2P network comprising a plurality of nodes, and comprises the following steps: step 1, constructing a pyramid storage model which comprises N storage hierarchies, N being a positive integer greater than 3; step 2, receiving a relay routing node set, and analyzing to obtain node IDs of relay routing nodes; step 3, obtaining the first eight bits of the node ID of the relay routing node as a parameter A, taking the first eight bits of the specific subtree prefix of the P2P network as a parameter B, performing XOR calculation on the parameter AB according to the bits to obtain f(AB), when f(AB) is greater than 0, calculating to obtain a storage level L(A)=(N-log2(f(AB)) of the relay routing node, and storing the relay routing node to an L (A) layer; otherwise, storing the node at the Nth level.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and device for storing relay routing pyramid data. Background technique [0002] In recent years, DDoS botnet family activities are still dominated by traditional IoT Trojan horse families represented by Mirai and Gafgyt. These traditional IoT Trojans develop new variants by adding new vulnerabilities and communication control methods. In this iterative process, new IoT botnets such as Mozi and BigViktor have emerged, further exacerbating the infighting situation among botnets. What's more serious is that the Mozi botnet targets Internet of Things devices with security vulnerabilities. With the rapid development of 5G and IoT, how to monitor and defend against such new botnets has become an important task to grasp the security situation of the Internet of Things and ensure the security of the Internet of Things. [0003] In addition, when processing data ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L12/721G06F3/06
CPCH04L67/1097H04L67/104H04L45/44G06F3/0604G06F3/067
Inventor 王大浩杜雄杰姜栋朱星迪杨帆刘弋嘉
Owner 敦和万物信息技术(苏州)有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More