Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

SCIT-based mobile target defensive system

A moving target defense and defense system technology, applied in the field of moving target defense systems, can solve the problems of lack of in-depth understanding and research on the impact of system security, and effective attack types.

Inactive Publication Date: 2017-01-04
ANHUI XINHUA UNIV
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although researchers at home and abroad have put forward their own insights and verified the mobile target defense technology, there are still some problems: the research is usually effective for a specific attack type.
Because most moving target defense technologies mainly randomize a certain local property of the system, if a certain type of attack does not depend on this property, it will be ineffective against such attacks; after the introduction of moving target defense technology, the impact on system security Impacts lack of in-depth understanding and research

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SCIT-based mobile target defensive system
  • SCIT-based mobile target defensive system
  • SCIT-based mobile target defensive system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In the content of the invention, the overall technical idea of ​​the technical solution of the present invention is proposed. In order for those skilled in the art to further understand the content of the present invention, the technical solution of the application of the present invention will be further described below in conjunction with specific embodiments.

[0027] First, three ThinkPad X240 (CPU i7-2640M@2.8GHz, memory 12GB) are selected as the hosts of the back-end server group; one DELL Ins15RR (CPU i5-3210M@2.5GHz, memory 4GB) is used as the central controller; One NSFOCUS remote vulnerability scanner is used for vulnerability scanning, and the software stack composition of three ThinkPad X240s is shown in Table 2:

[0028]

[0029] Table 2 The specific composition of the software stack

[0030] The scanning results of the NSFOCUS remote vulnerability scanner show that the RPC vulnerability numbered MS08-067 exists only in the ThinkPad X240 of Windows 2007....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of internets, and discloses a SCIT-based mobile target defensive system. The system comprises a back-end server group, a data distribution module, a central control module, a cleaning module, an auditing module and an information sharing module; the central control module controls the data distribution module to forward an access request of a user to a server in the running state in the back-end server group to process, after a period of time, the central processor selects a clean server from the server group in a ready state according to a scheduling algorithm when the switching time arrives, the state of the clean server is switched to the running state, and the central processor notifies the data distribution module to forward the request from the user to the new server in the running state, and the primary server enters an offline cleaning state. The technical scheme disclosed by the invention is based on the switching and cleaning of the server, the critical infrastructure servers are mechanized to improve the security through the introduction of the diversity of the software and the randomness and the unpredictability of the system.

Description

technical field [0001] The invention belongs to the technical field of the Internet, and more specifically relates to a SCIT-based mobile target defense system. Background technique [0002] The convenience of the network has accelerated the popularization and development of the Internet, and more and more individuals and companies use it to speed up the sharing of information and the real-time operation of business. With the continuous updating of network technology, there are many complex security issues in the network applications and services of a large amount of valuable information, and a considerable number of loopholes exist in the network systems supporting these basic services. [0003] In the current environment, the structure of the network and operating system is relatively static, such as IP address, port number, platform type, service and patch version, etc., which provides enough time for malicious attackers to detect and learn the structure and vulnerabiliti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441
Inventor 王琦进齐晓霞古奋飞王迎云
Owner ANHUI XINHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products