Unlock instant, AI-driven research and patent intelligence for your innovation.

Mimicry micro-service device and method

A micro-service and service request technology, which is applied in the direction of secure communication devices, digital transmission systems, electrical components, etc., can solve the problem of no mimetic micro-service, etc., and achieve the effect of large attack difficulty, enhanced security, and strong flexibility

Pending Publication Date: 2022-07-22
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In recent years, with the rapid development of microservices, many security problems have emerged in the field of microservice security. Mimic microservices have a good defense effect on some security problems, but there is currently no method related to mimetic microservices.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mimicry micro-service device and method
  • Mimicry micro-service device and method
  • Mimicry micro-service device and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] like figure 1 As shown, the device for mimicking microservices in this embodiment includes a microservice gateway component and a control component; the microservice gateway component includes a microservice native gateway and a microservice mimicking gateway, and the microservice mimicking gateway is in the microservice A mimetic micro-service communication proxy unit is added to the service native gateway; the mimetic micro-service communication proxy unit includes an input proxy module and an output proxy module; the input proxy module is used for receiving front-end micro-service requests, and copying and distributing them to multiple executors , and at the same time receive the return information of the executor, adjudicate the return information of the executor and respond to the front-end microservice; the output proxy module is used to receive the request of the executor to access the back-end micro-service and make a judgment, and at the same time receive the ba...

Embodiment 2

[0048] like image 3 As shown in the figure, the device for mimicking microservices in this embodiment selectively modifies middle microservices for serial or parallel microservices during the interaction between front-end microservices and back-end microservices. The device deploys On the kubernetes platform, as an independent logical unit, a microservice can run multiple copies of pods. Each instance runs in a pod. The input proxy module and output proxy module add mimicry to the original microservice gateway. Functions, microservices, input proxy modules and output proxy modules run as containers. image 3 The data flow is represented by a solid line, and the control flow is represented by a dashed line.

[0049] The device includes a microservice gateway component and a control component; the microservice gateway component includes a microservice native gateway and a microservice emulation gateway, and the microservice emulation gateway is to add an emulation microservice...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of network space security, and particularly relates to a mimicry micro-service device and method, and the device comprises a micro-service gateway assembly and a control assembly. The micro-service gateway assembly comprises a micro-service native gateway and a micro-service mimicry gateway, and the micro-service mimicry gateway is formed by adding a mimicry micro-service communication agent unit on the micro-service native gateway; the mimicry micro-service communication agent unit comprises an input agent module and an output agent module; the input agent module is used for receiving a front-end micro-service request, copying and distributing the request to a plurality of execution bodies, receiving return information of the execution bodies at the same time, judging the return information of the execution bodies and responding to the front-end micro-service; and the output agent module is used for receiving a back-end micro-service access request of the executor, performing decision, receiving return information of the back-end micro-service, and responding to the executor. According to the invention, the micro-service security can be effectively improved.

Description

technical field [0001] The invention belongs to the technical field of cyberspace security, and in particular relates to a device and method for mimicking microservices. Background technique [0002] Cloud-native technology helps organizations build and run elastically scalable applications in dynamic environments such as public, private, and hybrid clouds, which makes cloud-native technology develop rapidly. As a representative technology of cloud native, microservices can meet the requirements of high cohesion and low coupling in software development, and build a loosely coupled system that is easy to manage and easy to observe. Its essence is to divide the application software into several small services, and these small services run independently and do not affect each other. The characteristics of microservices enable the rapid development of microservice technology under cloud native, but it also brings many security problems. Compared with the monolithic scenario, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40
CPCH04L63/1441H04L63/1483H04L63/1491
Inventor 扈红超刘道清张帅程国振刘文彦史雪静张帅普刘轩宇梁浩
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU