Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Active defense system and method based on biological immune

A technology of active defense and biological immunity, applied in the field of network security, it can solve the problems such as the lack of integrated cloud and terminal collaborative defense functions, the inability to actively detect unknown viruses and intrusions, and the inability to warn of potential security risks.

Active Publication Date: 2019-02-15
GUANGZHOU UNIVERSITY
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The current methods to solve network security problems have the following problems: ①It can only prevent existing security problems. If new system vulnerabilities or security problems appear, it is necessary to wait until the security software and equipment manufacturers release solutions and upgrade the software or equipment to solve them. ; ②It can only stop the security behaviors that have already occurred, and cannot warn and solve the security risks lurking in the terminal in advance; ③The security problems of the terminal are mostly solved by the security software installed by itself, and there is no integration of cloud and terminal Collaborative defense function
[0004] In the prior art, the author is Ren Xianghua, and Harbin University of Science and Technology published a master's degree thesis "Research and Implementation of an Intrusion Detection System Based on Biological Immunity" in May 2006, which proposed an intrusion detection system based on biological immunity. Composed of detection subsets distributed in different nodes, combined with normal detection and misuse detection methods, expert rules are used as innate detectors to detect some known intrusions, but it cannot solve the problem of actively detecting unknown viruses and intrusions; by "University of Electronic Science and Technology of China "Published in 2012, the author is Tao Xu "Research on Intrusion Detection Method Based on Biological Immunity", referring to the mechanism of memory cells, designing an information detection method based on biological immunity, and designing common antibodies and effective antibodies on the basis of conventional intrusion detection The three detectors, memory antibody and memory antibody, can detect some abnormalities, but have a certain false detection rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Active defense system and method based on biological immune
  • Active defense system and method based on biological immune
  • Active defense system and method based on biological immune

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The implementation of the present invention is described below through specific examples and in conjunction with the accompanying drawings, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific examples, and various modifications and changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention.

[0030] figure 1 It is a system architecture diagram of an active defense system based on biological immunity in the present invention. Such as figure 1 Shown, a kind of active defense system based on biological immunity of the present invention comprises:

[0031] Terminal 10, the terminal (referred to as "terminal") is equipped with a known behavior library trained on the cloud, through ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an active defense system and method based on biological immune. The system comprises a terminal, wherein the terminal is equipped with a known behavior library which is trainedthrough utilization of a cloud and is used for carrying out local detection and real-time monitoring on behaviors through utilization of a quasi-biological immune mechanism, wherein the behaviors aregenerated based on internal and external data, and the terminal is also used for carrying out first-level active defense, and sending unidentified unknown behaviors to the cloud; and the cloud, wherein the cloud is equipped with the known behavior library which is trained through utilization of the cloud, and the cloud is used for collecting the unknown behaviors sent by the terminal, importing deep learning, carrying out cloud detection and behavior early warning, pushing new behaviors to the terminal in real time and carrying out second level-defense. According to the system and the method,on the basis of the quasi-biological immune mechanism and an improved NAS negative selection algorithm, unsecure computer behaviors can be actively identified, prevented, traced and checked, and integrated defense and active defense of a cloud-terminal cooperative computing environment is realized.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a biological immunity-based active defense system method and method for a cloud-end collaborative computing environment. Background technique [0002] In the early stage of computer development, when stand-alone computer viruses appeared, it was generally adopted to install stand-alone anti-virus software to solve security problems. With the popularization of the network, security problems such as worms and Trojan horses that can spread in the network have appeared, and network security software with cloud scanning and killing can be installed to partially solve the security problem. At present, with the emergence of new network computing models such as the Internet, cloud computing, Internet of Things, fog computing, and edge computing, network applications are becoming more and more extensive, user needs are changing, environments are heterogeneous, networks are comple...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/145H04L63/20
Inventor 王国军苏命峰徐天骥彭滔
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products