CN111416865A - Protocol proxy processing method and system based on mimicry defense - Google Patents

Protocol proxy processing method and system based on mimicry defense Download PDF

Info

Publication number
CN111416865A
CN111416865A CN202010213921.1A CN202010213921A CN111416865A CN 111416865 A CN111416865 A CN 111416865A CN 202010213921 A CN202010213921 A CN 202010213921A CN 111416865 A CN111416865 A CN 111416865A
Authority
CN
China
Prior art keywords
message
protocol
message information
information
executive body
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010213921.1A
Other languages
Chinese (zh)
Other versions
CN111416865B (en
Inventor
徐虹
白果
吕青松
郭义伟
冯志峰
于天
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Comleader Information Technology Co Ltd
Henan Xinda Wangyu Technology Co Ltd
Original Assignee
Zhuhai Comleader Information Technology Co Ltd
Henan Xinda Wangyu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Comleader Information Technology Co Ltd, Henan Xinda Wangyu Technology Co Ltd filed Critical Zhuhai Comleader Information Technology Co Ltd
Priority to CN202010213921.1A priority Critical patent/CN111416865B/en
Publication of CN111416865A publication Critical patent/CN111416865A/en
Application granted granted Critical
Publication of CN111416865B publication Critical patent/CN111416865B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/133Protocols for remote procedure calls [RPC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/562Brokering proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/26Special purpose or proprietary protocols or architectures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a protocol agent processing method based on mimicry defense, which comprises the following steps: the protocol receiving port sends a protocol message to the input agent and the SDK; the SDK acquires second message information related to a protocol message receiving port, extracts first message information from the protocol message, stores the first message information and the second message information in a one-to-one correspondence manner, and creates a first message information query interface; the input agent copies and distributes the protocol message to a plurality of heterogeneous executors; each heterogeneous executive body obtains second message information from the SDK according to the first message information in the protocol message and processes the protocol message according to the first message information and the second message information; and each heterogeneous executive body judges whether the heterogeneous executive body is the main executive body or not according to the main executive body information issued by the scheduling module, and if the heterogeneous executive body is the main executive body, the heterogeneous executive body sends a protocol message processing result to the front-end interface. The invention also provides a protocol agent processing system based on the mimicry defense.

Description

Protocol proxy processing method and system based on mimicry defense
Technical Field
The invention relates to the technical field of network space security, in particular to a protocol agent processing method and system based on mimicry defense.
Background
With the rapid development of networks, security problems of network spaces are more and more exposed, and traditional passive defense often fails to address increasingly complex network security problems. The cyberspace mimicry defense technology fundamentally changes passive defense against unknown problems of unknown environments into active defense.
The mimicry defense system generally comprises an input agent, an equivalent heterogeneous executive body, a resolver and a feedback controller. The input agent finishes copying and distributing external input information to the heterogeneous executors; the heterogeneous executive body executes the externally input information and outputs the result; the arbitrator carries out multi-mode arbitration on the input result; and the feedback controller processes the judgment result, adjusts the heterogeneous executive bodies and realizes the mimicry camouflage.
The mimicry defense system comprises a protocol function of a common exchange system, protocol messages are different from common commands, in the proxy process, messages received by all ports are forwarded to a specified port, such as linux _ proxy, so that source port information is lost, the port is used for identifying the source port number by modifying the messages forwarded to the linux _ proxy and adding information such as label marks on the messages, and the processing process of the protocol messages in the mimicry system is complex and tedious; and the protocol message is repeated when the executive returns the result.
Disclosure of Invention
In view of the above problems, the present invention needs to provide a protocol proxy processing method and system based on mimicry defense, which solves the problems of complicated protocol message processing and reduced protocol message repetition in the existing mimicry defense system.
The first aspect of the present invention provides a protocol message processing method based on mimicry defense, which includes:
the protocol receiving port sends a protocol message to the input agent and the SDK, wherein the protocol message comprises first message information;
the SDK acquires second message information related to a protocol message receiving port, extracts first message information from the protocol message, stores the first message information and the second message information in a one-to-one correspondence manner, and creates a first message information query interface;
the input agent copies and distributes the protocol message to a plurality of heterogeneous executors;
each heterogeneous executive body obtains second message information from the SDK according to the first message information in the protocol message and processes the protocol message according to the first message information and the second message information;
each heterogeneous executive body judges whether the heterogeneous executive body is a main executive body or not according to the main executive body information issued by the subscription scheduling module, and if the heterogeneous executive body is the main executive body, a protocol message processing result is sent to a front-end interface; otherwise, no action is taken.
Based on the above, the obtaining, by each heterogeneous execution entity, the second packet information from the SDK according to the first packet information in the protocol packet specifically includes: and each heterogeneous executive body inquires whether the SDK stores the first message information or not through the first message information inquiry interface, if so, returns the second message information corresponding to the first message information, and if not, inquires again.
The invention also provides a protocol message processing system based on mimicry defense, which comprises: the protocol receiving port is used for receiving and forwarding a protocol message, and the protocol message comprises first message information;
the SDK comprises a message information acquisition module, a storage module and a first message query interface, wherein the message acquisition module is connected with the protocol receiving port and is used for extracting first message information in the received protocol message and acquiring second message information related to the protocol receiving port; the storage module is used for correspondingly storing the first message information and the second message information; the first message query interface is connected with the storage module and used for querying whether the storage module has first message information according to the received first message query request and returning corresponding second message information when the first message information exists;
the input agent is connected with the protocol receiving port and copies and distributes the protocol message to a plurality of heterogeneous executors;
the scheduling module is connected with the heterogeneous executors and used for issuing the information of the main executors;
the heterogeneous executors are connected with the first message query interface in a remote calling mode and are used for sending a first message query request to the first query interface and receiving returned second message information, and processing a protocol message according to the first message information and the second message information; and judging whether the main executive body is the main executive body or not according to the main executive body information, and outputting a protocol message processing result to the front panel port when the main executive body is the main executive body.
The invention has prominent substantive characteristics and remarkable progress, in particular to the following steps: the invention can obtain the message information of the protocol message while the heterogeneous executive body obtains the protocol message by adding the step that the SDK stores the message information of the protocol message and the heterogeneous executive body obtains the message information related to the protocol message from the SDK, and a user can realize the proxy of the network protocol such as the proxy of protocols such as stp, lldp, rip and the like without performing any operation on the message information, namely modifying the message forwarded to a protocol transceiving port by adding a label mark and the like to identify a source port number, thereby solving the problem of complex protocol message processing in the traditional mimicry system and simplifying the protocol message processing step; meanwhile, the heterogeneous executive body compares the subscribed main executive body message to judge whether the heterogeneous executive body is the main executive body, and only the main executive body inputs the protocol message processing result to the front panel port, so that the problem of protocol message repetition is reduced.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 shows a flow chart of the protocol agent processing method based on the mimicry defense of the invention.
Fig. 2 is a schematic structural diagram of the protocol agent processing method based on the mimicry defense of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that when an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may also be present.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention.
Example 1
As shown in fig. 1, a first aspect of the present invention provides a protocol packet processing method based on mimicry defense, including:
the protocol receiving port sends a protocol message to the input agent and the SDK, wherein the protocol message comprises first message information; in specific application, a specified protocol receiving and reporting port can be selected according to the type of the protocol message to receive and send the protocol message;
the SDK acquires second message information related to a protocol message receiving port, extracts first message information from the protocol message, stores the first message information and the second message information in a one-to-one correspondence manner, and creates a first message information query interface; specifically, a table similar to a mac table may be created in the SDK to store the first message information and the second message information;
the input agent copies and distributes the protocol message to a plurality of heterogeneous executors;
each heterogeneous executive body obtains second message information from the SDK according to the first message information in the protocol message and processes the protocol message according to the first message information and the second message information;
each heterogeneous executive body judges whether the heterogeneous executive body is a main executive body or not according to the main executive body information issued by the subscription scheduling module, and if the heterogeneous executive body is the main executive body, a protocol message processing result is sent to a front-end interface; otherwise, no action is taken.
Preferably, in S3, the step of acquiring, by each heterogeneous executive body, the second message information from the SDK according to the first message information in the protocol message specifically includes: and each heterogeneous executive body inquires whether the SDK stores the first message information or not through the first message information inquiry interface, if so, returns the second message information corresponding to the first message information, and if not, inquires again.
In a specific application, all the heterogeneous executors query the SDK through a common first message information query interface to obtain corresponding second message information.
It should be noted that each heterogeneous executor needs to subscribe to the scheduling module, and the scheduling module issues the main executor information in a targeted manner.
For convenience of understanding, the stp protocol is taken as an example herein to describe the specific implementation process in detail:
the p _ in protocol receiving port sends an stp protocol message to the input agent and the SDK;
an input proxy forwards an stp protocol message to each heterogeneous executive, wherein the stp protocol message contains first message information, and the first message information comprises source mac and vlan information;
after receiving a protocol message sent by a protocol receiving and reporting port, the SDK acquires a source port number of a p _ in protocol receiving and reporting port as second message information, extracts source mac and vlan information from the protocol message, and stores the source mac and vlan information and the source port number in a one-to-one correspondence manner; creating a source mac and vlan information query interface;
each heterogeneous execution body inquires whether the SDK stores the information of the source mac and the vlan through a source mac and vlan information inquiry interface, if so, the source port number corresponding to the heterogeneous execution body is returned, and if not, the inquiry is carried out again;
each heterogeneous execution body processes the protocol message according to the source mac, the vlan information and the source port number, such as calculating a root bridge and a block port;
each heterogeneous executive body judges whether the heterogeneous executive body is a main executive body or not according to main executive body information issued by a subscribed scheduling module, and if the heterogeneous executive body is the main executive body, protocol stp bpdu information is sent to a front-end interface; otherwise, no action is taken.
The invention can obtain the message information of the protocol message while the heterogeneous executive body obtains the protocol message by adding the step that the SDK stores the message information of the protocol message and the heterogeneous executive body obtains the message information related to the protocol message from the SDK, and a user can realize the proxy of the network protocol such as the proxy of protocols such as stp, lldp, rip and the like without performing any operation on the message information, namely modifying the message forwarded to a protocol transceiving port by adding a label mark and the like to identify a source port number, thereby solving the problem of complex protocol message processing in the traditional mimicry system and simplifying the protocol message processing step; meanwhile, the heterogeneous executive body compares the subscribed main executive body message to judge whether the heterogeneous executive body is the main executive body, and only the main executive body inputs the protocol message processing result to the front panel port, so that the problem of protocol message repetition is reduced.
Example 2
As shown in fig. 2, the present invention further provides a protocol message processing system based on mimicry defense, which includes:
the protocol receiving port is used for receiving and forwarding a protocol message, and the protocol message comprises first message information;
the SDK comprises a message information acquisition module, a storage module and a first message query interface, wherein the message acquisition module is connected with the protocol receiving port and is used for extracting first message information in the received protocol message and acquiring second message information related to the protocol receiving port; the storage module is used for correspondingly storing the first message information and the second message information; the first message query interface is connected with the storage module and used for querying whether the storage module has first message information according to the received first message query request and returning corresponding second message information when the first message information exists;
the input agent is connected with the protocol receiving port and copies and distributes the protocol message to a plurality of heterogeneous executors;
the scheduling module is connected with the heterogeneous executors and used for issuing the information of the main executors;
the heterogeneous executors are connected with the first message query interface in a remote calling mode and are used for sending a first message query request to the first query interface and receiving returned second message information, and processing a protocol message according to the first message information and the second message information; and judging whether the main executive body is the main executive body or not according to the main executive body information, and outputting a protocol message processing result to the front panel port when the main executive body is the main executive body.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (5)

1. A protocol message processing method based on mimicry defense is characterized by comprising the following steps:
the protocol receiving port sends a protocol message to the input agent and the SDK, wherein the protocol message comprises first message information;
the SDK acquires second message information related to a protocol message receiving port, extracts first message information from the protocol message, stores the first message information and the second message information in a one-to-one correspondence manner, and creates a first message information query interface;
the input agent copies and distributes the protocol message to a plurality of heterogeneous executors;
each heterogeneous executive body obtains second message information from the SDK according to the first message information in the protocol message and processes the protocol message according to the first message information and the second message information;
each heterogeneous executive body judges whether the heterogeneous executive body is a main executive body or not according to the main executive body information issued by the scheduling module, and if the heterogeneous executive body is the main executive body, a protocol message processing result is sent to a front-end interface; otherwise, no action is taken.
2. The protocol message processing method according to claim 1, characterized in that: each heterogeneous executive body specifically comprises the following steps of obtaining second message information from the SDK according to the first message information in the protocol message: and each heterogeneous executive body inquires whether the SDK stores the first message information or not through the first message information inquiry interface, if so, returns the second message information corresponding to the first message information, and if not, inquires again.
3. The protocol message processing method according to claim 1 or 2, characterized in that: each heterogeneous executive needs to subscribe to the scheduling module.
4. The protocol message processing method according to claim 3, characterized in that: and the scheduling module issues the main executive body information at regular time.
5. A protocol message processing system based on mimicry defense is characterized by comprising:
the protocol receiving port is used for receiving and forwarding a protocol message, and the protocol message comprises first message information;
the SDK comprises a message information acquisition module, a storage module and a first message query interface, wherein the message acquisition module is connected with the protocol receiving port and is used for extracting first message information in the received protocol message and acquiring second message information related to the protocol receiving port; the storage module is used for correspondingly storing the first message information and the second message information; the first message query interface is connected with the storage module and used for querying whether the storage module has first message information according to the received first message query request and returning corresponding second message information when the first message information exists;
the input agent is connected with the protocol receiving port and copies and distributes the protocol message to a plurality of heterogeneous executors;
the scheduling module is connected with the heterogeneous executors and used for issuing the information of the main executors;
the heterogeneous executors are connected with the first message query interface in a remote calling mode and are used for sending a first message query request to the first query interface and receiving returned second message information, and processing a protocol message according to the first message information and the second message information; and judging whether the main executive body is the main executive body or not according to the main executive body information, and outputting a protocol message processing result to the front panel port when the main executive body is the main executive body.
CN202010213921.1A 2020-03-24 2020-03-24 Protocol proxy processing method and system based on mimicry defense Active CN111416865B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010213921.1A CN111416865B (en) 2020-03-24 2020-03-24 Protocol proxy processing method and system based on mimicry defense

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010213921.1A CN111416865B (en) 2020-03-24 2020-03-24 Protocol proxy processing method and system based on mimicry defense

Publications (2)

Publication Number Publication Date
CN111416865A true CN111416865A (en) 2020-07-14
CN111416865B CN111416865B (en) 2022-12-13

Family

ID=71493182

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010213921.1A Active CN111416865B (en) 2020-03-24 2020-03-24 Protocol proxy processing method and system based on mimicry defense

Country Status (1)

Country Link
CN (1) CN111416865B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112187865A (en) * 2020-09-02 2021-01-05 中国人民解放军战略支援部队信息工程大学 Open shortest path priority message processing method and mimicry equipment
CN112511441A (en) * 2020-11-18 2021-03-16 潍柴动力股份有限公司 Message processing method and device
CN112637238A (en) * 2020-12-31 2021-04-09 河南信大网御科技有限公司 Telnet proxy method, architecture and medium for protocol stack detachment
CN113347085A (en) * 2021-06-02 2021-09-03 河南信大网御科技有限公司 Method for realizing STP protocol under mimicry environment
CN113422721A (en) * 2021-08-24 2021-09-21 之江实验室 Method for realizing mimicry industrial edge computing gateway
CN114915657A (en) * 2022-04-24 2022-08-16 中国人民解放军战略支援部队信息工程大学 Simulation application distributed tracking method based on OpenTracing specification

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102480462A (en) * 2010-11-23 2012-05-30 中国电信股份有限公司 Universal protocol adapting method and device
US20130042115A1 (en) * 2011-08-09 2013-02-14 CloudPassage, Inc. Systems and methods for implementing security in a cloud computing environment
CN106992982A (en) * 2017-03-31 2017-07-28 中国人民解放军信息工程大学 A kind of dynamic routing protocol based on SDN performs body and realizes device and method
CN107819774A (en) * 2017-11-16 2018-03-20 郑州云海信息技术有限公司 A kind of SDN isomeries multi-controller Synergistic method and system
US20180359264A1 (en) * 2015-05-12 2018-12-13 CloudPassage, Inc. Systems and methods for implementing intrusion prevention
CN110177046A (en) * 2019-04-18 2019-08-27 中国人民解放军战略支援部队信息工程大学 Secure exchange chip, implementation method and the network switching equipment based on mimicry thought
CN110247928A (en) * 2019-06-29 2019-09-17 河南信大网御科技有限公司 A kind of mimicry interchanger safe traffic control device and method
CN110380961A (en) * 2019-07-05 2019-10-25 中国人民解放军战略支援部队信息工程大学 A kind of device and method of conventional router mimicryization transformation
CN110557437A (en) * 2019-08-05 2019-12-10 上海拟态数据技术有限公司 universal mimicry distribution voting scheduling device and method based on user-defined protocol
CN110740077A (en) * 2019-09-24 2020-01-31 华东计算技术研究所(中国电子科技集团公司第三十二研究所) Simulation system heterogeneity testing system, method and device based on network packet capturing

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102480462A (en) * 2010-11-23 2012-05-30 中国电信股份有限公司 Universal protocol adapting method and device
US20130042115A1 (en) * 2011-08-09 2013-02-14 CloudPassage, Inc. Systems and methods for implementing security in a cloud computing environment
US20170070499A1 (en) * 2011-08-09 2017-03-09 CloudPassage, Inc. Systems and methods for implementing security
US20180359264A1 (en) * 2015-05-12 2018-12-13 CloudPassage, Inc. Systems and methods for implementing intrusion prevention
CN106992982A (en) * 2017-03-31 2017-07-28 中国人民解放军信息工程大学 A kind of dynamic routing protocol based on SDN performs body and realizes device and method
CN107819774A (en) * 2017-11-16 2018-03-20 郑州云海信息技术有限公司 A kind of SDN isomeries multi-controller Synergistic method and system
CN110177046A (en) * 2019-04-18 2019-08-27 中国人民解放军战略支援部队信息工程大学 Secure exchange chip, implementation method and the network switching equipment based on mimicry thought
CN110247928A (en) * 2019-06-29 2019-09-17 河南信大网御科技有限公司 A kind of mimicry interchanger safe traffic control device and method
CN110380961A (en) * 2019-07-05 2019-10-25 中国人民解放军战略支援部队信息工程大学 A kind of device and method of conventional router mimicryization transformation
CN110557437A (en) * 2019-08-05 2019-12-10 上海拟态数据技术有限公司 universal mimicry distribution voting scheduling device and method based on user-defined protocol
CN110740077A (en) * 2019-09-24 2020-01-31 华东计算技术研究所(中国电子科技集团公司第三十二研究所) Simulation system heterogeneity testing system, method and device based on network packet capturing

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
崔世建等: ""CAOHS:一种混合软件定义网络控制器架构"", 《信息工程大学学报》 *
马海龙等: "基于动态异构冗余机制的路由器拟态防御体系结构", 《信息安全学报》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112187865A (en) * 2020-09-02 2021-01-05 中国人民解放军战略支援部队信息工程大学 Open shortest path priority message processing method and mimicry equipment
CN112187865B (en) * 2020-09-02 2022-11-01 中国人民解放军战略支援部队信息工程大学 Open shortest path priority message processing method and mimicry equipment
CN112511441A (en) * 2020-11-18 2021-03-16 潍柴动力股份有限公司 Message processing method and device
CN112637238A (en) * 2020-12-31 2021-04-09 河南信大网御科技有限公司 Telnet proxy method, architecture and medium for protocol stack detachment
CN113347085A (en) * 2021-06-02 2021-09-03 河南信大网御科技有限公司 Method for realizing STP protocol under mimicry environment
CN113347085B (en) * 2021-06-02 2022-12-13 河南信大网御科技有限公司 Method for realizing STP protocol under mimicry environment
CN113422721A (en) * 2021-08-24 2021-09-21 之江实验室 Method for realizing mimicry industrial edge computing gateway
CN114915657A (en) * 2022-04-24 2022-08-16 中国人民解放军战略支援部队信息工程大学 Simulation application distributed tracking method based on OpenTracing specification
CN114915657B (en) * 2022-04-24 2024-01-26 中国人民解放军战略支援部队信息工程大学 Mimicry application distributed tracking method based on OpenTraing specification

Also Published As

Publication number Publication date
CN111416865B (en) 2022-12-13

Similar Documents

Publication Publication Date Title
CN111416865B (en) Protocol proxy processing method and system based on mimicry defense
US11411897B2 (en) Communication method and communication apparatus for message queue telemetry transport
EP2835938B1 (en) Message publishing and subscribing method and apparatus
CN101674255B (en) Method, server and system for forwarding messages of enterprise service bus
CN102938794A (en) Address resolution protocol (ARP) message forwarding method, exchanger and controller
CN105989539A (en) Financial trading condition acquisition system and method
CN102263774A (en) Method and device for processing source role information
CN109802951B (en) Message forwarding method, device and storage device
CN102857414A (en) Forwarding table writing method and device and message forwarding method and device
CN101175000A (en) Method and device for automatic IP address detection
CN104270302B (en) The transmission system of online order and transfer approach
CN101789949B (en) Method and router equipment for realizing load sharing
CN105743687B (en) Method and device for judging node fault
CN101409677A (en) Access control method and apparatus
CN107547346A (en) A kind of message transmitting method and device
CN107465621A (en) A kind of router finds method, SDN controllers, router and network system
CN106452954B (en) HTTP data characteristics analysis method and system
CN100586124C (en) Securing communications equipment for processing data packets according to the send mechanism
CN101605301A (en) A kind of group system and request message distribution method that carries out the multinode transaction
CN112165537B (en) Virtual IP method for ping reply
CN103281317A (en) Attack testing method for SDN (software defined network)
CN101534255A (en) A method and device for realizing oriented processing of certain request
CN102090039A (en) A method of performing data mediation, and an associated computer program product, data mediation device and information system
CN112152943A (en) Method and system for controlling executive body based on processor mimicry switch
CN104639379A (en) Proxy testing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant