Unlock instant, AI-driven research and patent intelligence for your innovation.

Mimicry WAF judgment method based on credibility

An adjudication method and reliability technology, applied in secure communication devices, digital transmission systems, electrical components, etc., can solve problems such as insecurity of network infrastructure, reduce inaccurate traffic adjudication results, and improve defense capabilities. Effect

Active Publication Date: 2022-04-08
ZHEJIANG UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Cyberspace security issues have existed since the birth of the Internet and have become increasingly serious. At present, the security of the network infrastructure itself has become the most important insecurity factor. Attackers may launch malicious attacks on it through backdoors or loopholes in software and hardware. Make network security "easy to attack but difficult to defend", so it is imminent to improve the active defense capability of network infrastructure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mimicry WAF judgment method based on credibility
  • Mimicry WAF judgment method based on credibility
  • Mimicry WAF judgment method based on credibility

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Such as figure 1 As shown, the present invention is a mimetic WAF adjudication method based on credibility, which characterizes the validity of the adjudication results of each executive by defining the credibility, and introduces a preliminary credible executive selection module, adjudication result processing module, and credibility The dynamic adjustment module performs traffic arbitration. Specifically include the following steps:

[0033] (1) Deploy M functionally equivalent heterogeneous executives L={l i |i=1,2,...,M}, where l i For the i-th heterogeneous executive, define the credibility to represent the validity of the judgment result of each executive, and use r i to represent the credibility of the i-th executive, r i The initial value of is 1.

[0034] (2) When the flow passes, the preliminary credible executive body selection module selects the execution body with a relatively credible ruling result based on the current credibility and average credibil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a credibility-based mimicry WAF decision method, which is characterized in that the validity of decision results of all executors is represented by defining credibility, and a preliminary credible executor selection module, a decision result processing module and a credibility dynamic adjustment module are introduced to carry out traffic decision. The initial trusted executor selection module selects a relatively trusted executor to participate in flow judgment, the judgment result processing module obtains a judgment result through result fusion, consistency judgment and voting calculation, the credibility dynamic adjustment module updates the credibility of the executor in combination with a consistency result, and the untrusted executor executes self-cleaning operation. According to the method, the adverse effect on the flow judgment result due to the threat of the executor in the mimicry WAF can be weakened, and the defense capability of the mimicry defense system is effectively improved.

Description

technical field [0001] The invention belongs to the technical field of network security mimic defense, and in particular relates to a credibility-based mimic WAF judgment method. Background technique [0002] Cyberspace security issues have existed since the birth of the Internet and have become increasingly serious. At present, the security of the network infrastructure itself has become the most important insecurity factor. Attackers may launch malicious attacks on it through backdoors or loopholes in software and hardware. It makes network security "easy to attack but difficult to defend", so it is imminent to improve the active defense capability of network infrastructure. Mimic defense provides a relatively safe system operating environment through the application of dynamic heterogeneous redundant construction mechanism, which effectively improves the active defense capability of the system. Compared with traditional defense methods such as access control and intrusio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
Inventor 吴春明唐馨陈双喜张江瑜曲振青
Owner ZHEJIANG UNIV