Unlock instant, AI-driven research and patent intelligence for your innovation.

Mimic quantity adjustment method, device, host computer and storage medium

An adjustment method and host computer technology, applied in the computer field, can solve problems such as consuming system resources, and achieve the effect of ensuring resource consumption

Active Publication Date: 2022-06-28
中科星启(北京)科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, mimicry consumes system resources. The more mimics, the more system resources are consumed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mimic quantity adjustment method, device, host computer and storage medium
  • Mimic quantity adjustment method, device, host computer and storage medium
  • Mimic quantity adjustment method, device, host computer and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work are protected by the present invention. scope.

[0044] As mentioned above, the greater the number of mimics that are adjudicated in the dynamic heterogeneous redundant architecture, the more conducive to detecting threats with a higher probability, but mimicking requires system resources, and the number of mimics cannot be infinite. The greater the number of mimics, the more system resources ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method, device, host machine and storage medium for adjusting the number of mimics, and relates to the field of computer technology, wherein the method includes: determining the basic number of mimics based on the mimicry ruling result of the host machine; determining the host machine according to the basic number of mimics The corresponding relationship between the load and the number of mimics; the number of mimics in the corresponding relationship is related to the basic number of mimics; the current load and the current number of mimics of the host machine are determined; and the number corresponding to the current load in the corresponding relationship is determined Target mimicry quantity: judging whether the current mimicry quantity is equal to the target mimicry quantity, if not, adjusting the mimicry quantity of the host machine from the current mimicry quantity to the target mimicry quantity. This solution can ensure the balance between threat perception and resource consumption.

Description

technical field [0001] Embodiments of the present invention relate to the field of computer technology, and in particular, to a method, device, host, and storage medium for adjusting the number of mimics. Background technique [0002] Mimic defense is a kind of active defense theory, which improves the reliability of the corresponding environment by adopting multi-mode adjudication under the dynamic heterogeneous redundant architecture. Mimic defense is used in network security to protect cyberspace based on unknown vulnerabilities, backdoors, Trojan horse viruses, etc. A definite or uncertain threat translates into a risk control problem that can be described by probabilities. The greater the number of mimics that adjudicate in a dynamic heterogeneous redundant architecture, the more conducive it is to detect threats with a higher probability of perception. However, mimicking requires system resources. The more mimics, the more system resources are consumed. Therefore, ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F21/56
CPCG06F21/566G06F21/554
Inventor 雷奕康葛永文蔡敬忠
Owner 中科星启(北京)科技有限公司