Unlock instant, AI-driven research and patent intelligence for your innovation.

A relay routing pyramid data storage method and device

A data storage and pyramid technology, applied in the field of information security, to achieve the effect of improving data reading efficiency and data storage management efficiency

Active Publication Date: 2022-03-04
敦和万物信息技术(苏州)有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to propose a relay routing pyramid data storage method and device, aiming to solve how to improve the storage and reading efficiency of relay routing data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A relay routing pyramid data storage method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Kademlia protocol, Kad is a distributed hash table (DHT) technology, through the unique XOR algorithm (XOR) as the distance measurement basis, a new DHT topology is established, which can greatly improve the routing query speed.

[0022] Kad has now become the mainstream implementation of DHT, and the p2p network that the Mozi botnet parasitizes is also based on Kad. The Kademlia algorithm is a distributed hash storage and routing algorithm. Each node of the P2P network based on the Kad protocol stores some resources.

[0023] In the p2p network built by the Kademlia protocol, all information is stored in the form of hash table entries, and these entries are scattered and stored on each node, thus forming a huge distributed hash table in the whole network.

[0024] node distance. The data key value (Key) and node ID (NodeID) in the Kademlia network are represented by 160 bits, and the NodeID is randomly assigned when joining the network. The Kad protocol stipulates th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provided by the present invention proposes a relay routing pyramid data storage method, which is applied to a P2P network including multiple nodes. The method includes the following steps: Step 1, constructing a pyramid storage model, and the pyramid storage module includes N Storage level, N is a positive integer greater than 3. Step 2, receive the set of relay routing nodes, analyze and obtain the node ID of the relay routing node; Step 3, obtain the first 8 bits of the node ID of the relay routing node as parameter A, and use the first 8 bits of the P2P network specific subtree prefix bits as the parameter B, perform XOR calculation on the parameter AB according to the bits to get f(AB), when f(AB) is greater than 0, calculate the storage level of the relay routing node L(A)=(N‑log2( f(AB)), and store the relay routing node in the L(A)th layer; otherwise, store the node in the Nth layer.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and device for storing relay routing pyramid data. Background technique [0002] In recent years, DDoS botnet family activities are still dominated by traditional IoT Trojan horse families represented by Mirai and Gafgyt. These traditional IoT Trojans develop new variants by adding new vulnerabilities and communication control methods. In this iterative process, new IoT botnets such as Mozi and BigViktor have emerged, further exacerbating the infighting situation among botnets. What's more serious is that the Mozi botnet targets Internet of Things devices with security vulnerabilities. With the rapid development of 5G and IoT, how to monitor and defend against such new botnets has become an important task to grasp the security situation of the Internet of Things and ensure the security of the Internet of Things. [0003] In addition, when processing data ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L67/1097H04L67/104H04L45/44G06F3/06
CPCH04L67/1097H04L67/104H04L45/44G06F3/0604G06F3/067
Inventor 王大浩杜雄杰姜栋朱星迪杨帆刘弋嘉
Owner 敦和万物信息技术(苏州)有限公司