Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Distributed service security detection method

A security detection and distributed technology, applied in security communication devices, data exchange through path configuration, digital transmission system, etc., can solve problems such as resource waste, reduce pressure, reduce protection triggers, and solve network storms.

Pending Publication Date: 2022-04-05
CHENGDU DBAPP SECURITY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing business security detection methods cannot further judge whether the occurrence of the problem node is caused by the problem of the business itself or by external malicious attacks. Therefore, when there is a problem in the business itself, the protection mechanism will also be triggered, resulting in a waste of resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed service security detection method
  • Distributed service security detection method
  • Distributed service security detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] A distributed service security detection method in this embodiment, such as figure 1 As shown, based on the realization of the distributed business system, the distributed business system includes a central server, several business terminals, an agency center corresponding to the central server, and several proxy nodes corresponding to several business terminals, and constructs a ring-shaped peer-to-peer network including several proxy nodes , compare the states of all proxy nodes in the ring peer-to-peer network to judge the real state of all proxy nodes, the real state includes normal state, abnormal state, and disconnected state; and for any state in the ring peer-to-peer network For proxy nodes in an abnormal state, determine whether to trigger protection for the proxy nodes in an abnormal state by calculating the ratio of the number of nodes in an abnormal state to the total number of nodes in the ring peer-to-peer network.

[0037] The distributed business system ...

Embodiment 2

[0042] This embodiment is further optimized on the basis of Embodiment 1, specifically including the following steps:

[0043] Step A1, establish a ring peer-to-peer network through several proxy nodes, and send a ring network heartbeat packet to the proxy center and other proxy nodes through the proxy nodes to determine the status of any proxy node in the ring peer-to-peer network;

[0044] Step A2, adding or removing proxy nodes in the ring peer-to-peer network according to the status of the proxy nodes in the ring peer-to-peer network, so as to correct the ring peer-to-peer network;

[0045] Step A3, if the current proxy node is in an online state normally connected to the proxy center, then mark the current proxy node as a normal state; if the current proxy node is in an offline state that is not connected to the proxy center, then query The status of the remaining proxy nodes. If the remaining proxy nodes are offline, mark the current proxy node as disconnected. If at lea...

Embodiment 3

[0049] This embodiment is further optimized on the basis of the above-mentioned embodiment 1 or 2, and the step A4 is specifically:

[0050] Step A4.1, counting the total number of nodes of all proxy nodes in the ring peer-to-peer network;

[0051] Step A4.2. If the total number of nodes is less than or equal to 20, calculate the ratio of the number of abnormal nodes of the proxy nodes in the abnormal state in the ring peer-to-peer network to the total number of nodes. When the ratio is greater than or equal to 50%, the pair in the abnormal state The proxy node of the state triggers the protection;

[0052] Step A4.3. If the total number of nodes is greater than 20, calculate the number of nodes in the abnormal state among the proxy nodes in the ring peer-to-peer network to be greater than or equal to 10, trigger protection for the proxy nodes in the abnormal state.

[0053] Further, whether to trigger the protection can also be judged according to the number of normal nodes ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a distributed service security detection method, which is realized based on a distributed service system, the distributed service system comprises a central server, a plurality of service terminals, a proxy center corresponding to the central server and a plurality of proxy nodes corresponding to the service terminals, and an annular peer-to-peer network comprising the proxy nodes is constructed. Comparing the states of all the agent nodes in the ring peer-to-peer network to judge the real states of all the agent nodes, wherein the real states comprise a normal state, an abnormal state and an off state; for any agent node in the abnormal state in the annular peer-to-peer network, judging whether to trigger protection for the agent node in the abnormal state by calculating the proportion of the number of the nodes in the abnormal state in the agent nodes in the annular peer-to-peer network to the total number of the nodes; the method has the advantages that hostile attacks are effectively distinguished, and effective security detection and protection are carried out on the proxy node on the premise of reducing unnecessary node protection triggering.

Description

technical field [0001] The invention belongs to the technical field of service security detection, and in particular relates to a distributed service security detection method. Background technique [0002] Network business requires frequent information interaction between the central server and each service terminal. During the information exchange process, due to the failure of the business terminal itself, the failure of the central server itself, external malicious attacks, etc., the business terminal will lose contact with the central server. . In order to ensure business security, the business is usually monitored through a monitoring system or anti-virus software. [0003] The monitoring system, such as the zabbix platform, collects the data on the host machine by installing an agent on the host machine, and then unifies and displays it on the monitoring platform, and can see the cpu, io, disk and other data information of each host machine. Through the summary of p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L12/42H04L43/16H04L67/56
Inventor 周虎范渊吴永越郑学新刘韬
Owner CHENGDU DBAPP SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products