CN111416865A - Protocol proxy processing method and system based on mimicry defense - Google Patents
Protocol proxy processing method and system based on mimicry defense Download PDFInfo
- Publication number
- CN111416865A CN111416865A CN202010213921.1A CN202010213921A CN111416865A CN 111416865 A CN111416865 A CN 111416865A CN 202010213921 A CN202010213921 A CN 202010213921A CN 111416865 A CN111416865 A CN 111416865A
- Authority
- CN
- China
- Prior art keywords
- message
- protocol
- message information
- information
- executive body
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/133—Protocols for remote procedure calls [RPC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/562—Brokering proxy services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/26—Special purpose or proprietary protocols or architectures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention provides a protocol agent processing method based on mimicry defense, which comprises the following steps: the protocol receiving port sends a protocol message to the input agent and the SDK; the SDK acquires second message information related to a protocol message receiving port, extracts first message information from the protocol message, stores the first message information and the second message information in a one-to-one correspondence manner, and creates a first message information query interface; the input agent copies and distributes the protocol message to a plurality of heterogeneous executors; each heterogeneous executive body obtains second message information from the SDK according to the first message information in the protocol message and processes the protocol message according to the first message information and the second message information; and each heterogeneous executive body judges whether the heterogeneous executive body is the main executive body or not according to the main executive body information issued by the scheduling module, and if the heterogeneous executive body is the main executive body, the heterogeneous executive body sends a protocol message processing result to the front-end interface. The invention also provides a protocol agent processing system based on the mimicry defense.
Description
Technical Field
The invention relates to the technical field of network space security, in particular to a protocol agent processing method and system based on mimicry defense.
Background
With the rapid development of networks, security problems of network spaces are more and more exposed, and traditional passive defense often fails to address increasingly complex network security problems. The cyberspace mimicry defense technology fundamentally changes passive defense against unknown problems of unknown environments into active defense.
The mimicry defense system generally comprises an input agent, an equivalent heterogeneous executive body, a resolver and a feedback controller. The input agent finishes copying and distributing external input information to the heterogeneous executors; the heterogeneous executive body executes the externally input information and outputs the result; the arbitrator carries out multi-mode arbitration on the input result; and the feedback controller processes the judgment result, adjusts the heterogeneous executive bodies and realizes the mimicry camouflage.
The mimicry defense system comprises a protocol function of a common exchange system, protocol messages are different from common commands, in the proxy process, messages received by all ports are forwarded to a specified port, such as linux _ proxy, so that source port information is lost, the port is used for identifying the source port number by modifying the messages forwarded to the linux _ proxy and adding information such as label marks on the messages, and the processing process of the protocol messages in the mimicry system is complex and tedious; and the protocol message is repeated when the executive returns the result.
Disclosure of Invention
In view of the above problems, the present invention needs to provide a protocol proxy processing method and system based on mimicry defense, which solves the problems of complicated protocol message processing and reduced protocol message repetition in the existing mimicry defense system.
The first aspect of the present invention provides a protocol message processing method based on mimicry defense, which includes:
the protocol receiving port sends a protocol message to the input agent and the SDK, wherein the protocol message comprises first message information;
the SDK acquires second message information related to a protocol message receiving port, extracts first message information from the protocol message, stores the first message information and the second message information in a one-to-one correspondence manner, and creates a first message information query interface;
the input agent copies and distributes the protocol message to a plurality of heterogeneous executors;
each heterogeneous executive body obtains second message information from the SDK according to the first message information in the protocol message and processes the protocol message according to the first message information and the second message information;
each heterogeneous executive body judges whether the heterogeneous executive body is a main executive body or not according to the main executive body information issued by the subscription scheduling module, and if the heterogeneous executive body is the main executive body, a protocol message processing result is sent to a front-end interface; otherwise, no action is taken.
Based on the above, the obtaining, by each heterogeneous execution entity, the second packet information from the SDK according to the first packet information in the protocol packet specifically includes: and each heterogeneous executive body inquires whether the SDK stores the first message information or not through the first message information inquiry interface, if so, returns the second message information corresponding to the first message information, and if not, inquires again.
The invention also provides a protocol message processing system based on mimicry defense, which comprises: the protocol receiving port is used for receiving and forwarding a protocol message, and the protocol message comprises first message information;
the SDK comprises a message information acquisition module, a storage module and a first message query interface, wherein the message acquisition module is connected with the protocol receiving port and is used for extracting first message information in the received protocol message and acquiring second message information related to the protocol receiving port; the storage module is used for correspondingly storing the first message information and the second message information; the first message query interface is connected with the storage module and used for querying whether the storage module has first message information according to the received first message query request and returning corresponding second message information when the first message information exists;
the input agent is connected with the protocol receiving port and copies and distributes the protocol message to a plurality of heterogeneous executors;
the scheduling module is connected with the heterogeneous executors and used for issuing the information of the main executors;
the heterogeneous executors are connected with the first message query interface in a remote calling mode and are used for sending a first message query request to the first query interface and receiving returned second message information, and processing a protocol message according to the first message information and the second message information; and judging whether the main executive body is the main executive body or not according to the main executive body information, and outputting a protocol message processing result to the front panel port when the main executive body is the main executive body.
The invention has prominent substantive characteristics and remarkable progress, in particular to the following steps: the invention can obtain the message information of the protocol message while the heterogeneous executive body obtains the protocol message by adding the step that the SDK stores the message information of the protocol message and the heterogeneous executive body obtains the message information related to the protocol message from the SDK, and a user can realize the proxy of the network protocol such as the proxy of protocols such as stp, lldp, rip and the like without performing any operation on the message information, namely modifying the message forwarded to a protocol transceiving port by adding a label mark and the like to identify a source port number, thereby solving the problem of complex protocol message processing in the traditional mimicry system and simplifying the protocol message processing step; meanwhile, the heterogeneous executive body compares the subscribed main executive body message to judge whether the heterogeneous executive body is the main executive body, and only the main executive body inputs the protocol message processing result to the front panel port, so that the problem of protocol message repetition is reduced.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 shows a flow chart of the protocol agent processing method based on the mimicry defense of the invention.
Fig. 2 is a schematic structural diagram of the protocol agent processing method based on the mimicry defense of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that when an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may also be present.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention.
Example 1
As shown in fig. 1, a first aspect of the present invention provides a protocol packet processing method based on mimicry defense, including:
the protocol receiving port sends a protocol message to the input agent and the SDK, wherein the protocol message comprises first message information; in specific application, a specified protocol receiving and reporting port can be selected according to the type of the protocol message to receive and send the protocol message;
the SDK acquires second message information related to a protocol message receiving port, extracts first message information from the protocol message, stores the first message information and the second message information in a one-to-one correspondence manner, and creates a first message information query interface; specifically, a table similar to a mac table may be created in the SDK to store the first message information and the second message information;
the input agent copies and distributes the protocol message to a plurality of heterogeneous executors;
each heterogeneous executive body obtains second message information from the SDK according to the first message information in the protocol message and processes the protocol message according to the first message information and the second message information;
each heterogeneous executive body judges whether the heterogeneous executive body is a main executive body or not according to the main executive body information issued by the subscription scheduling module, and if the heterogeneous executive body is the main executive body, a protocol message processing result is sent to a front-end interface; otherwise, no action is taken.
Preferably, in S3, the step of acquiring, by each heterogeneous executive body, the second message information from the SDK according to the first message information in the protocol message specifically includes: and each heterogeneous executive body inquires whether the SDK stores the first message information or not through the first message information inquiry interface, if so, returns the second message information corresponding to the first message information, and if not, inquires again.
In a specific application, all the heterogeneous executors query the SDK through a common first message information query interface to obtain corresponding second message information.
It should be noted that each heterogeneous executor needs to subscribe to the scheduling module, and the scheduling module issues the main executor information in a targeted manner.
For convenience of understanding, the stp protocol is taken as an example herein to describe the specific implementation process in detail:
the p _ in protocol receiving port sends an stp protocol message to the input agent and the SDK;
an input proxy forwards an stp protocol message to each heterogeneous executive, wherein the stp protocol message contains first message information, and the first message information comprises source mac and vlan information;
after receiving a protocol message sent by a protocol receiving and reporting port, the SDK acquires a source port number of a p _ in protocol receiving and reporting port as second message information, extracts source mac and vlan information from the protocol message, and stores the source mac and vlan information and the source port number in a one-to-one correspondence manner; creating a source mac and vlan information query interface;
each heterogeneous execution body inquires whether the SDK stores the information of the source mac and the vlan through a source mac and vlan information inquiry interface, if so, the source port number corresponding to the heterogeneous execution body is returned, and if not, the inquiry is carried out again;
each heterogeneous execution body processes the protocol message according to the source mac, the vlan information and the source port number, such as calculating a root bridge and a block port;
each heterogeneous executive body judges whether the heterogeneous executive body is a main executive body or not according to main executive body information issued by a subscribed scheduling module, and if the heterogeneous executive body is the main executive body, protocol stp bpdu information is sent to a front-end interface; otherwise, no action is taken.
The invention can obtain the message information of the protocol message while the heterogeneous executive body obtains the protocol message by adding the step that the SDK stores the message information of the protocol message and the heterogeneous executive body obtains the message information related to the protocol message from the SDK, and a user can realize the proxy of the network protocol such as the proxy of protocols such as stp, lldp, rip and the like without performing any operation on the message information, namely modifying the message forwarded to a protocol transceiving port by adding a label mark and the like to identify a source port number, thereby solving the problem of complex protocol message processing in the traditional mimicry system and simplifying the protocol message processing step; meanwhile, the heterogeneous executive body compares the subscribed main executive body message to judge whether the heterogeneous executive body is the main executive body, and only the main executive body inputs the protocol message processing result to the front panel port, so that the problem of protocol message repetition is reduced.
Example 2
As shown in fig. 2, the present invention further provides a protocol message processing system based on mimicry defense, which includes:
the protocol receiving port is used for receiving and forwarding a protocol message, and the protocol message comprises first message information;
the SDK comprises a message information acquisition module, a storage module and a first message query interface, wherein the message acquisition module is connected with the protocol receiving port and is used for extracting first message information in the received protocol message and acquiring second message information related to the protocol receiving port; the storage module is used for correspondingly storing the first message information and the second message information; the first message query interface is connected with the storage module and used for querying whether the storage module has first message information according to the received first message query request and returning corresponding second message information when the first message information exists;
the input agent is connected with the protocol receiving port and copies and distributes the protocol message to a plurality of heterogeneous executors;
the scheduling module is connected with the heterogeneous executors and used for issuing the information of the main executors;
the heterogeneous executors are connected with the first message query interface in a remote calling mode and are used for sending a first message query request to the first query interface and receiving returned second message information, and processing a protocol message according to the first message information and the second message information; and judging whether the main executive body is the main executive body or not according to the main executive body information, and outputting a protocol message processing result to the front panel port when the main executive body is the main executive body.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (5)
1. A protocol message processing method based on mimicry defense is characterized by comprising the following steps:
the protocol receiving port sends a protocol message to the input agent and the SDK, wherein the protocol message comprises first message information;
the SDK acquires second message information related to a protocol message receiving port, extracts first message information from the protocol message, stores the first message information and the second message information in a one-to-one correspondence manner, and creates a first message information query interface;
the input agent copies and distributes the protocol message to a plurality of heterogeneous executors;
each heterogeneous executive body obtains second message information from the SDK according to the first message information in the protocol message and processes the protocol message according to the first message information and the second message information;
each heterogeneous executive body judges whether the heterogeneous executive body is a main executive body or not according to the main executive body information issued by the scheduling module, and if the heterogeneous executive body is the main executive body, a protocol message processing result is sent to a front-end interface; otherwise, no action is taken.
2. The protocol message processing method according to claim 1, characterized in that: each heterogeneous executive body specifically comprises the following steps of obtaining second message information from the SDK according to the first message information in the protocol message: and each heterogeneous executive body inquires whether the SDK stores the first message information or not through the first message information inquiry interface, if so, returns the second message information corresponding to the first message information, and if not, inquires again.
3. The protocol message processing method according to claim 1 or 2, characterized in that: each heterogeneous executive needs to subscribe to the scheduling module.
4. The protocol message processing method according to claim 3, characterized in that: and the scheduling module issues the main executive body information at regular time.
5. A protocol message processing system based on mimicry defense is characterized by comprising:
the protocol receiving port is used for receiving and forwarding a protocol message, and the protocol message comprises first message information;
the SDK comprises a message information acquisition module, a storage module and a first message query interface, wherein the message acquisition module is connected with the protocol receiving port and is used for extracting first message information in the received protocol message and acquiring second message information related to the protocol receiving port; the storage module is used for correspondingly storing the first message information and the second message information; the first message query interface is connected with the storage module and used for querying whether the storage module has first message information according to the received first message query request and returning corresponding second message information when the first message information exists;
the input agent is connected with the protocol receiving port and copies and distributes the protocol message to a plurality of heterogeneous executors;
the scheduling module is connected with the heterogeneous executors and used for issuing the information of the main executors;
the heterogeneous executors are connected with the first message query interface in a remote calling mode and are used for sending a first message query request to the first query interface and receiving returned second message information, and processing a protocol message according to the first message information and the second message information; and judging whether the main executive body is the main executive body or not according to the main executive body information, and outputting a protocol message processing result to the front panel port when the main executive body is the main executive body.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010213921.1A CN111416865B (en) | 2020-03-24 | 2020-03-24 | Protocol proxy processing method and system based on mimicry defense |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010213921.1A CN111416865B (en) | 2020-03-24 | 2020-03-24 | Protocol proxy processing method and system based on mimicry defense |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111416865A true CN111416865A (en) | 2020-07-14 |
CN111416865B CN111416865B (en) | 2022-12-13 |
Family
ID=71493182
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010213921.1A Active CN111416865B (en) | 2020-03-24 | 2020-03-24 | Protocol proxy processing method and system based on mimicry defense |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111416865B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112187865A (en) * | 2020-09-02 | 2021-01-05 | 中国人民解放军战略支援部队信息工程大学 | Open shortest path priority message processing method and mimicry equipment |
CN112511441A (en) * | 2020-11-18 | 2021-03-16 | 潍柴动力股份有限公司 | Message processing method and device |
CN112637238A (en) * | 2020-12-31 | 2021-04-09 | 河南信大网御科技有限公司 | Telnet proxy method, architecture and medium for protocol stack detachment |
CN113347085A (en) * | 2021-06-02 | 2021-09-03 | 河南信大网御科技有限公司 | Method for realizing STP protocol under mimicry environment |
CN113422721A (en) * | 2021-08-24 | 2021-09-21 | 之江实验室 | Method for realizing mimicry industrial edge computing gateway |
CN114915657A (en) * | 2022-04-24 | 2022-08-16 | 中国人民解放军战略支援部队信息工程大学 | Simulation application distributed tracking method based on OpenTracing specification |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102480462A (en) * | 2010-11-23 | 2012-05-30 | 中国电信股份有限公司 | Universal protocol adapting method and device |
US20130042115A1 (en) * | 2011-08-09 | 2013-02-14 | CloudPassage, Inc. | Systems and methods for implementing security in a cloud computing environment |
CN106992982A (en) * | 2017-03-31 | 2017-07-28 | 中国人民解放军信息工程大学 | A kind of dynamic routing protocol based on SDN performs body and realizes device and method |
CN107819774A (en) * | 2017-11-16 | 2018-03-20 | 郑州云海信息技术有限公司 | A kind of SDN isomeries multi-controller Synergistic method and system |
US20180359264A1 (en) * | 2015-05-12 | 2018-12-13 | CloudPassage, Inc. | Systems and methods for implementing intrusion prevention |
CN110177046A (en) * | 2019-04-18 | 2019-08-27 | 中国人民解放军战略支援部队信息工程大学 | Secure exchange chip, implementation method and the network switching equipment based on mimicry thought |
CN110247928A (en) * | 2019-06-29 | 2019-09-17 | 河南信大网御科技有限公司 | A kind of mimicry interchanger safe traffic control device and method |
CN110380961A (en) * | 2019-07-05 | 2019-10-25 | 中国人民解放军战略支援部队信息工程大学 | A kind of device and method of conventional router mimicryization transformation |
CN110557437A (en) * | 2019-08-05 | 2019-12-10 | 上海拟态数据技术有限公司 | universal mimicry distribution voting scheduling device and method based on user-defined protocol |
CN110740077A (en) * | 2019-09-24 | 2020-01-31 | 华东计算技术研究所(中国电子科技集团公司第三十二研究所) | Simulation system heterogeneity testing system, method and device based on network packet capturing |
-
2020
- 2020-03-24 CN CN202010213921.1A patent/CN111416865B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102480462A (en) * | 2010-11-23 | 2012-05-30 | 中国电信股份有限公司 | Universal protocol adapting method and device |
US20130042115A1 (en) * | 2011-08-09 | 2013-02-14 | CloudPassage, Inc. | Systems and methods for implementing security in a cloud computing environment |
US20170070499A1 (en) * | 2011-08-09 | 2017-03-09 | CloudPassage, Inc. | Systems and methods for implementing security |
US20180359264A1 (en) * | 2015-05-12 | 2018-12-13 | CloudPassage, Inc. | Systems and methods for implementing intrusion prevention |
CN106992982A (en) * | 2017-03-31 | 2017-07-28 | 中国人民解放军信息工程大学 | A kind of dynamic routing protocol based on SDN performs body and realizes device and method |
CN107819774A (en) * | 2017-11-16 | 2018-03-20 | 郑州云海信息技术有限公司 | A kind of SDN isomeries multi-controller Synergistic method and system |
CN110177046A (en) * | 2019-04-18 | 2019-08-27 | 中国人民解放军战略支援部队信息工程大学 | Secure exchange chip, implementation method and the network switching equipment based on mimicry thought |
CN110247928A (en) * | 2019-06-29 | 2019-09-17 | 河南信大网御科技有限公司 | A kind of mimicry interchanger safe traffic control device and method |
CN110380961A (en) * | 2019-07-05 | 2019-10-25 | 中国人民解放军战略支援部队信息工程大学 | A kind of device and method of conventional router mimicryization transformation |
CN110557437A (en) * | 2019-08-05 | 2019-12-10 | 上海拟态数据技术有限公司 | universal mimicry distribution voting scheduling device and method based on user-defined protocol |
CN110740077A (en) * | 2019-09-24 | 2020-01-31 | 华东计算技术研究所(中国电子科技集团公司第三十二研究所) | Simulation system heterogeneity testing system, method and device based on network packet capturing |
Non-Patent Citations (2)
Title |
---|
崔世建等: ""CAOHS:一种混合软件定义网络控制器架构"", 《信息工程大学学报》 * |
马海龙等: "基于动态异构冗余机制的路由器拟态防御体系结构", 《信息安全学报》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112187865A (en) * | 2020-09-02 | 2021-01-05 | 中国人民解放军战略支援部队信息工程大学 | Open shortest path priority message processing method and mimicry equipment |
CN112187865B (en) * | 2020-09-02 | 2022-11-01 | 中国人民解放军战略支援部队信息工程大学 | Open shortest path priority message processing method and mimicry equipment |
CN112511441A (en) * | 2020-11-18 | 2021-03-16 | 潍柴动力股份有限公司 | Message processing method and device |
CN112637238A (en) * | 2020-12-31 | 2021-04-09 | 河南信大网御科技有限公司 | Telnet proxy method, architecture and medium for protocol stack detachment |
CN113347085A (en) * | 2021-06-02 | 2021-09-03 | 河南信大网御科技有限公司 | Method for realizing STP protocol under mimicry environment |
CN113347085B (en) * | 2021-06-02 | 2022-12-13 | 河南信大网御科技有限公司 | Method for realizing STP protocol under mimicry environment |
CN113422721A (en) * | 2021-08-24 | 2021-09-21 | 之江实验室 | Method for realizing mimicry industrial edge computing gateway |
CN114915657A (en) * | 2022-04-24 | 2022-08-16 | 中国人民解放军战略支援部队信息工程大学 | Simulation application distributed tracking method based on OpenTracing specification |
CN114915657B (en) * | 2022-04-24 | 2024-01-26 | 中国人民解放军战略支援部队信息工程大学 | Mimicry application distributed tracking method based on OpenTraing specification |
Also Published As
Publication number | Publication date |
---|---|
CN111416865B (en) | 2022-12-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111416865B (en) | Protocol proxy processing method and system based on mimicry defense | |
US11411897B2 (en) | Communication method and communication apparatus for message queue telemetry transport | |
EP2835938B1 (en) | Message publishing and subscribing method and apparatus | |
CN101674255B (en) | Method, server and system for forwarding messages of enterprise service bus | |
CN102938794A (en) | Address resolution protocol (ARP) message forwarding method, exchanger and controller | |
CN105989539A (en) | Financial trading condition acquisition system and method | |
CN102263774A (en) | Method and device for processing source role information | |
CN109802951B (en) | Message forwarding method, device and storage device | |
CN102857414A (en) | Forwarding table writing method and device and message forwarding method and device | |
CN101175000A (en) | Method and device for automatic IP address detection | |
CN104270302B (en) | The transmission system of online order and transfer approach | |
CN101789949B (en) | Method and router equipment for realizing load sharing | |
CN105743687B (en) | Method and device for judging node fault | |
CN101409677A (en) | Access control method and apparatus | |
CN107547346A (en) | A kind of message transmitting method and device | |
CN107465621A (en) | A kind of router finds method, SDN controllers, router and network system | |
CN106452954B (en) | HTTP data characteristics analysis method and system | |
CN100586124C (en) | Securing communications equipment for processing data packets according to the send mechanism | |
CN101605301A (en) | A kind of group system and request message distribution method that carries out the multinode transaction | |
CN112165537B (en) | Virtual IP method for ping reply | |
CN103281317A (en) | Attack testing method for SDN (software defined network) | |
CN101534255A (en) | A method and device for realizing oriented processing of certain request | |
CN102090039A (en) | A method of performing data mediation, and an associated computer program product, data mediation device and information system | |
CN112152943A (en) | Method and system for controlling executive body based on processor mimicry switch | |
CN104639379A (en) | Proxy testing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |