Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attack defense device and method based on mimicry defense, equipment and medium

An executive and heterogeneous technology, applied in transmission systems, electrical components, etc., can solve problems affecting system stability, reducing the superiority of heterogeneous redundancy, and unavailability, so as to improve reliability and availability, and reduce restart cleaning , enhance the overall security effect

Active Publication Date: 2021-04-06
PURPLE MOUNTAIN LAB
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the mimic scheduler sends the same attack message to the heterogeneous executable again, the heterogeneous executable will still appear abnormal again after receiving it, resulting in the heterogeneous executable being in an unavailable state all the time. Greatly reduces the advantages of heterogeneous redundancy and affects the overall stability of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack defense device and method based on mimicry defense, equipment and medium
  • Attack defense device and method based on mimicry defense, equipment and medium
  • Attack defense device and method based on mimicry defense, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0088] In this embodiment, a mimetic defense-based attack defense device of the present invention is a mimetic switch, the front-end chip is a switching chip, and a mimetic defense-based attack defense method of the present invention is applied to the mimetic switch, as shown in the attached Figure 4 As shown, the specific process is as follows:

[0089] Step 1: The mimic scheduler in the mimic switch collects the message data sent from the switch chip.

[0090] Step 2: The mimic scheduler extracts key parameters in the message data.

[0091] Depending on the protocol in the message data, the key parameters extracted are also different. In this embodiment, among the message data sent by the switching chip, the protocol is the STP protocol, the OSPF protocol, the RIP protocol, and the TCP protocol.

[0092] For the STP protocol, extract the BPDU message type, flag bit, root bridge ID, root path cost, sender ID, port ID, message lifetime, maximum lifetime, Hello Time, and MAC...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attack defense device and method based on mimicry defense, equipment and a medium. The device comprises a mimicry scheduler and a plurality of heterogeneous executors; the heterogeneous executive receives and processes the message data sent by the mimicry scheduler; the mimicry scheduler comprises a mimicry judgment module and an attack defense module and is used for receiving message data sent by the front-end chip and forwarding the message data to the heterogeneous executor to realize data distribution, mimicry judgment and cleaning management of the heterogeneous executor; the mimicry judgment module performs mimicry judgment on downlink data of the heterogeneous executor and sends a mimicry judgment result to the attack defense module; and the attack defense module performs acquisition, extraction and log storage on the message data sent by the front-end chip, and performs log updating, attack defense detection and attack data filtering according to a mimicry judgment result of the mimicry judgment module. According to the invention, attack detection judgment is carried out on the message data and the abnormal message data is effectively filtered, so that the isomer executor cleaning frequency is reduced.

Description

technical field [0001] The invention relates to the technical field of computer network security, in particular to an attack defense device, method, equipment and medium based on mimicry defense. Background technique [0002] The current cyberspace is in a security situation of "easy to attack but difficult to defend". How to improve the security of cyberspace is one of the most severe challenges in the current information age. Mimic defense technology is an endogenous security theory with a dynamic heterogeneous redundant structure as the core, which can prevent security threats based on unknown and known vulnerability backdoors, and greatly enhances the ability of critical business networks to deal with external intrusion and internal penetration. [0003] The mimic product is based on the existing network equipment, integrates the mimic defense technology, introduces multiple heterogeneous processing engines as heterogeneous executives in its architecture, and includes a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/0227H04L63/1441H04L63/1425
Inventor 张校臣倪晓波李彧于波武彦平詹俊林彦竹吴树平
Owner PURPLE MOUNTAIN LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products