Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for dynamically adjusting scheduling opportunity and scheduling quantity of endogenous safety system

A security system and dynamic adjustment technology, applied in the field of network security, can solve problems such as less consideration of scheduling timing and the number of executives, insufficient flexible adjustment capabilities, redundant waste, etc., to achieve balanced security and operating costs, and good security The effect of reducing the risk of system failure and operating cost

Active Publication Date: 2022-08-09
INFORMATION & COMM BRANCH OF STATE GRID JIANGSU ELECTRIC POWER
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Most of the existing scheduling strategies focus on the problem of scheduling objects, the research objects are relatively single, less consideration is given to scheduling timing and the number of executives, and few attributes are organically combined for comprehensive research, which is not comprehensive enough
Most of the existing scheduling strategies fix the scheduling working hours and the number of executors, which are more stable but not flexible enough to adjust. They are vulnerable to continuous attacks and cause the system to fail completely, which makes the information system insufficient in security and dynamics. poor sex
In addition, some scheduling algorithms pursue high security but have high complexity, and there is a problem of redundancy and waste, which cannot balance system security and operating costs well.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for dynamically adjusting scheduling opportunity and scheduling quantity of endogenous safety system
  • Method for dynamically adjusting scheduling opportunity and scheduling quantity of endogenous safety system
  • Method for dynamically adjusting scheduling opportunity and scheduling quantity of endogenous safety system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0094] Suppose there is an SDN defense system designed with DHR architecture, and use n i =5 controllers with different structures and the same functions are used as heterogeneous executives, and the scheduling work duration is Δt i = 5 minutes, the abnormal threshold is =3. During the work process, the attacker uses the vulnerability to launch a tentative attack on the system. The number of attacks in one minute is less than 20. The number of abnormal heterogeneous executives detected by the scheduling module has never exceeded the abnormal threshold. =3 will not switch the scheduling process C 2 , the system works normally until the end of the scheduling cycle, and the scheduling enters the next cycle. This switch is performed by C 1 Event triggering; the scheduling triggering module encapsulates the corresponding information that the working time of this scheduling period is 5 minutes, the abnormal threshold value is 3, and the number of execution bodies is 5, and then...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for dynamically adjusting the scheduling opportunity and the scheduling quantity of an endogenous safety system, which comprises the following steps of: in a current working period, respectively processing an input sequence by a plurality of online heterogeneous executors, and respectively generating output results; according to all the output results, a unique output result is obtained, and according to the unique output result, the number of abnormal heterogeneous execution bodies and the working duration of the heterogeneous execution bodies are obtained; according to the number of the abnormal heterogeneous execution bodies and the working duration of the heterogeneous execution bodies, the type of the scheduling trigger event is judged; according to the type of the scheduling trigger event, the number and parameters of heterogeneous execution bodies in the next work period are calculated; and updating the number and the parameters of the online heterogeneous executors according to the number and the parameters of the heterogeneous executors in the next work cycle. According to the method, the risk of system failure caused by sudden large-scale attacks is reduced, the security and dynamics of the system are improved, and meanwhile, resource consumption caused by unnecessary scheduling is reduced.

Description

technical field [0001] The invention relates to a dynamic adjustment method for scheduling timing and scheduling quantity of an endogenous security system, and belongs to the technical field of network security. Background technique [0002] With the rapid development of computer technology, society has entered the era of "Internet of Everything". The Internet covers all aspects of people's lives. At the same time, the use of unknown loopholes and backdoors to conduct cybercrimes is growing, and the importance of cybersecurity is becoming more and more prominent. Although traditional network defense technologies represented by anti-virus software or firewalls are constantly being updated, the defense measures deployed by traditional defense technologies must be effective only when the type of attack or their own loopholes and backdoors are known in advance, which has certain limitations. This makes the information system deterministic and static, thus showing vulnerability...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/205H04L63/1425Y02P90/02
Inventor 曾锃缪巍巍张瑞夏元轶张明轩滕昌志李世豪余益团毕思博张震
Owner INFORMATION & COMM BRANCH OF STATE GRID JIANGSU ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products