Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Two-stage multi-layer resource scheduling method and system for mimicry defense

A resource scheduling and mimic system technology, applied in the field of network security, can solve the problems of small heterogeneous resource collection, loss randomness, limiting scheduling dynamics and heterogeneity, etc.

Active Publication Date: 2021-07-06
EAST CHINA INST OF COMPUTING TECH
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, although the random scheduling algorithm is simple and easy to implement, because the heterogeneous resource sets used to generate executives are often small, such as: the operating system instruction set does not exceed 10, even if the scheduling is completely random, the same heterogeneous resource combination is repeated The probability of calling is still relatively high; the coefficient-based scheduling algorithm is generally based on the random scheduling algorithm, and the probability of various resources being called is adjusted through the system. Since the scheduling coefficient is often adjusted by machine learning and other methods, the scheduling results often have Biased, with some loss of randomness
In addition, in order to improve the cleaning and recovery speed of the execution body when the mimic system is attacked, the execution body to be scheduled is often created in advance and placed in the execution body pool. The service object of the scheduling algorithm is the execution body pool. Due to limited software and hardware resources, Executor pools are generally small, which largely limits the dynamics and heterogeneity of scheduling

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-stage multi-layer resource scheduling method and system for mimicry defense

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several changes and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0031] refer to figure 1 , a two-level and multi-layer resource scheduling method for mimicry defense, which ensures the dynamics and heterogeneity of the mimicry system by providing scheduling services for executives and resources during the stages of mimicry system creation, initialization, and executive cleaning and recovery. The method mainly includes a two-level scheduling process among the executive body deployment plan, backup executive body pool, and work executive body group, and a multi-layer ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a two-stage multi-layer resource scheduling method and system for mimicry defense, and the method comprises the steps: a scheduling object is built in a mimicry system, wherein the scheduling object comprises an executor deployment scheme, a backup executor pool and a work executor group; and two-stage scheduling is carried out among the three, a plurality of scheduling strategies are adopted to determine a multi-layer scheduling target, and scheduling services of an executor and resources are provided for the mimicry system in the stages of creation, initialization and executor cleaning and recovery. According to the method, the randomness and the isomerism of the scheduling result are improved through two-stage scheduling of the execution body deployment scheme and the backup execution body. Multi-layer scheduling is formed by comprehensively using multiple scheduling strategies, and scheduling in multiple scenes such as mimicry system initialization and cleaning recovery is met.

Description

technical field [0001] The invention relates to network security technology, in particular to a two-level and multi-layer resource scheduling method and system for mimic defense. Background technique [0002] In order to cope with the information leakage, system failure and other losses caused by the increasing number of network attacks, as well as the inability of traditional passive defense technologies to effectively defend against threats from unknown vulnerabilities, the mimicry defense theory independently developed by my country has been tested and verified in actual combat, and can effectively defend against malicious attacks Threats, especially the threat of defending against backdoor attacks that exploit unknown vulnerabilities, have reduced the success rate of cyber attacks exponentially. [0003] The core of the mimicry defense theory is the system architecture of "Dynamic Heterogeneous Redundancy" (DHR). Based on the common knowledge that "independently develope...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08G06N20/00
CPCH04L63/105H04L63/1441H04L67/1095G06N20/00H04L67/60
Inventor 朱丹江付琳余新胜邵培南解维
Owner EAST CHINA INST OF COMPUTING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products