CN111917754A - Method for realizing rapid cleaning and online of mimicry executive body - Google Patents

Method for realizing rapid cleaning and online of mimicry executive body Download PDF

Info

Publication number
CN111917754A
CN111917754A CN202010724900.6A CN202010724900A CN111917754A CN 111917754 A CN111917754 A CN 111917754A CN 202010724900 A CN202010724900 A CN 202010724900A CN 111917754 A CN111917754 A CN 111917754A
Authority
CN
China
Prior art keywords
executive
online
manager
alternative pool
pool
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010724900.6A
Other languages
Chinese (zh)
Inventor
朱明星
吴少勇
黄培龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Lab
Original Assignee
Zhejiang Lab
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Lab filed Critical Zhejiang Lab
Priority to CN202010724900.6A priority Critical patent/CN111917754A/en
Publication of CN111917754A publication Critical patent/CN111917754A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Abstract

The invention provides a method for realizing rapid cleaning and online of a mimicry executive, and relates to the field of computer networks. The method comprises the following steps: the executive manager selects j executors with highest credibility from the offline executive alternative pool to run, and the executors are added into the online executive alternative pool. Next, the executive manager receives the request of the executive scheduler, selects k executors from the on-line executive alternative pool and wakes up to enter the on-line state; when the executive dispatcher washes the executives, the executive manager is called, the executives which are washed off the line are returned to the offline executive alternative pool, and then one executive is awakened from the online executive alternative pool and enters an online state. And if no redundant executors which can be called exist in the online executors alternative pool, selecting one executor from the offline executors alternative pool and running.

Description

Method for realizing rapid cleaning and online of mimicry executive body
Technical Field
The invention belongs to the field of computer networks, and particularly relates to a method for realizing quick cleaning and online of a mimicry executive.
Background
In the mimicry defense technology, one important mechanism is a dynamic heterogeneous redundancy structure, which comprises an input agent, an output agent, a functionally equivalent heterogeneous executive body set, a multi-mode arbitration, a negative feedback controller and other components and functional compositions, and by introducing various security technologies such as diversity, dynamics, randomness and the like, the aim is to greatly improve the attack cost and the vulnerability utilization cost by deploying and operating uncertain and randomly dynamic networks, platforms, systems, devices and even components or constructions. However, due to the complexity of the system structure and the unpredictability of the attack behavior, a certain escape probability still exists when the heterogeneous redundant structure faces differential mode, N-1 mode and N mode attacks, and hidden dangers brought by the attacks can be eliminated completely by cleaning for many times, so that how to effectively reduce the escape time of the heterogeneous redundant structure is a key difficulty of the dynamic heterogeneous redundant structure.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a method for realizing quick cleaning and line loading of a mimicry executive body.
The purpose of the invention is realized by the following technical scheme: a method for realizing rapid cleaning and line loading of a mimicry executive body comprises the following steps:
(1) when the mimicry scheduling system is started, constructing an offline executive body alternative pool and an online executive body alternative pool; the offline execution body alternative pool comprises i execution bodies, and each execution body is configured with initial credibility;
(2) when the mimicry scheduling system selects the executive to be online, selecting the executive from the online executive alternative pool and online; the method comprises the steps that an executive manager receives an online request of a mimicry scheduling system;
(3) when the mimicry scheduling system selects an executive to clean, the executive manager receives a cleaning request of the mimicry scheduling system, the credibility of the cleaned executive is multiplied by 0.8 to be used as the current credibility of the cleaned executive, then the executive is returned to an offline executive alternative pool, and the executive is selected from the online executive alternative pool and is online;
(4) the executive manager regularly monitors the number of executors in the online executive alternative pool, and if the actual number is less than j, sufficient executors are supplemented from the offline executive alternative pool and added into the online executive alternative pool.
Further, the step (1) includes the sub-steps of:
(1.1) the executive manager selects the former j executors with higher credibility from the offline executive candidate pool to operate, and adds the executors into the online executive candidate pool after stripping the executors from the offline executive candidate pool, wherein j is less than or equal to i;
(1.2) the executive manager distributes m ports from the multi-path bridge to the executive in each online executive alternative pool, connects to the executive of each online, and sets all the distributed ports to a forbidden state;
(1.3) the executive manager puts the executors in each online executive's alternative pool into a sleep state.
Further, the step (2) includes the sub-steps of:
(2.1) the executive manager selects the former k executors with higher credibility from the online executive alternative pool to wake up, and strips the executors from the online executive alternative pool, wherein k is less than j;
and (2.2) the executive manager sets the port on the multi-path bridge corresponding to the woken executive to be in an enabling state.
Further, the step (3) includes the sub-steps of:
(3.1) the executive manager closes the executive to be cleaned, deletes the port on the multi-path bridge corresponding to the executive and adds the port into the offline executive alternative pool;
(3.2) the executive manager checks the number of available executors in the online executive alternative pool, and judges whether the available number is 0:
(3.2.1) if the available number is 0: the executive manager selects 1 executive with the highest credibility from the offline executive alternative pool to operate, and strips the executive from the offline executive alternative pool; the executive manager distributes m ports for the executive from the multi-path bridge, connects to the executive on each line, and sets all the distributed ports to be in an enabling state;
(3.2.2) if the available number is other than 0: the executive manager selects 1 executive with the highest credibility from the online executive alternative pool to wake up, and strips the executive from the online executive alternative pool; the executive manager sets the port on the multi-path bridge corresponding to the awakened executive into an enabling state;
(3.3) the executive manager checks the number of available executors in the online executive alternative pool, and judges whether the available number is j:
(3.3.1) if the available number is less than j, the executive manager selects 1 executive with the highest credibility from the offline executive alternative pool to operate, strips the executive from the offline executive alternative pool, and adds the executive into the online executive alternative pool; the executive manager allocates m ports for the executive from the multi-path bridge, connects to the executive and sets the allocated m ports to a forbidden state; the executive manager makes the executive enter into a dormant state;
(3.3.2) if the actual number is equal to j, no processing is done.
Further, the step (4) is specifically as follows: the executive manager selects 1 executive with the highest credibility from the offline executive alternative pool to operate, strips the executive from the offline executive alternative pool, and adds the executive into the online executive alternative pool; the executive manager allocates m ports for the executive from the multi-path bridge, connects to the executive and sets the allocated m ports to a forbidden state; the executive manager puts the executive into a sleep state.
Compared with the prior art, the invention has the following beneficial effects:
1. the invention adopts a two-stage executive body alternative pool mechanism, can regard the on-line executive body alternative pool as the cache of the off-line executive body alternative pool, and preferentially selects from the on-line executive body alternative pool when a new executive body is on line each time, thereby accelerating the on-line speed of the executive body and reducing the escape time;
2. the executors in the on-line executors alternative pool only occupy disk resources and memory resources, and do not occupy CPU resources and IO resources, so that the realization difficulty is reduced, and the realization cost of software and hardware is low;
3. by introducing the credibility parameter, the execution body with higher credibility can be preferentially placed in the online execution body selection pool, and the execution body with lower credibility is preferentially placed in the offline execution body selection pool, so that the online cost of the execution body with high credibility is reduced;
drawings
FIG. 1 is a block diagram of a pseudo scheduling system according to the present invention;
FIG. 2 is a flow chart of the method for quickly cleaning the pseudo-executor on-line according to the present invention.
Detailed Description
The technical solution of the present invention is further explained with reference to the accompanying drawings.
Referring to fig. 1-2, the invention provides a method for realizing rapid cleaning and online of a mimicry executive, which comprises an offline executive alternative pool, an online executive, an executive manager and a multi-path network bridge; the corresponding functions are as follows:
and (3) offline executive body selection pool: and the method is used for saving the execution body mirror image and the configuration file thereof in the non-operation state. When the device is just started, all executors are in this state. The executive body in the state only occupies disk resources and does not occupy memory resources, CPU resources and IO resources.
And (3) performing on-line executive body selection pool: after an executive from the offline executive's alternate pool is started, it is first added to the alternate pool. The executive body in the state occupies disk resources and memory resources, but does not occupy CPU resources and IO resources.
An online executive: the online executives are selected by the executives manager from an online executives alternative pool to be online by the corresponding executives. The executive body in the state occupies disk resources, memory resources, CPU resources and IO resources.
The executive manager: the core of the whole device is used for managing and controlling the execution body and the multi-path bridge.
Multi-way bridge: all of the online executors and executors in the alternative pool of online executors are first connected to the multi-way bridge and then to the I/O agent of the DHR (Dynamic Heterogeneous Redundancy architecture). Wherein, the network channel of the on-line executive is in an enabling state, namely can communicate with the input/output agent; the network channel of the executive in the on-line executive selection pool is in a forbidden state, namely, the communication with the input/output agent is not possible.
In addition, each executive body distributes corresponding credibility parameters according to the safety evaluation result or is configured by a person skilled in the art according to actual needs, when the executive body is selected from the offline executive body alternative pool to be added into the online executive body alternative pool or is selected from the online executive body alternative pool to be online, the executive body with the highest credibility is selected preferentially, and when the online executive body is cleaned to be offline, the credibility is multiplied by 0.8 to serve as the current credibility.
The quick cleaning and online method for the executive body specifically comprises the following steps:
(1) when the mimicry scheduling system is started, constructing an offline executive body alternative pool and an online executive body alternative pool; the offline executive body alternative pool comprises i executive bodies, each executive body is configured with initial credibility, and the executive body manager executes the following substeps to construct the online executive body alternative pool:
(1.1) the executive manager selects the former j executors with higher credibility from the offline executive candidate pool to operate, and adds the executors into the online executive candidate pool after stripping the executors from the offline executive candidate pool, wherein j is less than or equal to i;
(1.2) the executive manager distributes m ports from the multi-path bridge to the executive in each online executive alternative pool, connects to the executive of each online, and sets all the distributed ports to a forbidden state; the number of the ports is set according to specific conditions;
(1.3) the executive manager puts the executors in each online executive's alternative pool into a sleep state, i.e., not running.
(2) When the mimicry scheduling system selects the execution body to be online, preferentially selecting the execution body from the online execution body alternative pool and online; the executive manager receives an online request of the mimicry scheduling system, and the executive manager executes the following sub-steps to construct an online executive:
(2.1) the executive manager selects the former k executors with higher credibility from the online executive alternative pool to wake up, and strips the executors from the online executive alternative pool; wherein k is less than j;
and (2.2) the executive manager sets the port on the multi-path bridge corresponding to the woken executive to be in an enabling state.
(3) When the mimicry scheduling system selects an executive to clean, the executive manager receives a cleaning request of the mimicry scheduling system, the credibility of the cleaned executive is multiplied by 0.8 to be used as the current credibility of the cleaned executive, then the executive is returned to an offline executive alternative pool, and then the executive is selected from the online executive alternative pool and is online; the execution body manager executes the following sub-steps to reconstruct the online execution body:
(3.1) the executive manager closes the executive to be cleaned, deletes the port on the multi-path bridge corresponding to the executive and adds the port into the offline executive alternative pool;
(3.2) the executive manager checks the number of available executors in the online executive alternative pool, and judges whether the available number is 0:
(3.2.1) if the available number is 0: the executive manager selects 1 executive with the highest credibility from the offline executive alternative pool to operate, and strips the executive from the offline executive alternative pool; the executive manager distributes m ports for the executive from the multi-path bridge, connects to the executive on each line, and sets all the distributed ports to be in an enabling state;
(3.2.2) if the available number is other than 0: the executive manager selects 1 executive with the highest credibility from the online executive alternative pool to wake up, and strips the executive from the online executive alternative pool; and the executive manager sets the port on the multi-path bridge corresponding to the woken executive to be in an enabling state.
(3.3) the executive manager checks the number of available executors in the online executive alternative pool, and judges whether the available number is j:
(3.3.1) if the available number is less than j, the executive manager selects 1 executive with the highest credibility from the offline executive alternative pool to operate, strips the executive from the offline executive alternative pool, and adds the executive into the online executive alternative pool; the executive manager allocates m ports for the executive from the multi-path bridge, connects to the executive and sets the allocated m ports to a forbidden state; the executive manager makes the executive enter into a dormant state;
(3.3.2) if the actual number is equal to j, no processing is done.
(4) The executive manager regularly monitors the number of executives in the on-line executive alternative pool, if the actual number is less than j, enough executives are supplemented from the off-line executive alternative pool and added into the on-line executive alternative pool, specifically: the executive manager selects 1 executive with the highest credibility from the offline executive alternative pool to operate, strips the executive from the offline executive alternative pool, and adds the executive into the online executive alternative pool; the executive manager allocates m ports for the executive from the multi-path bridge, connects to the executive and sets the allocated m ports to a forbidden state; the executive manager puts the executive into a sleep state.

Claims (5)

1. A method for realizing rapid cleaning and line loading of a mimicry executive body is characterized by comprising the following steps:
(1) when the mimicry scheduling system is started, constructing an offline executive body alternative pool and an online executive body alternative pool; the offline execution body alternative pool comprises i execution bodies, and each execution body is configured with initial credibility.
(2) When the mimicry scheduling system selects the executive to be online, selecting the executive from the online executive alternative pool and online; the executive manager may receive an online request of the pseudo scheduling system.
(3) When the mimicry scheduling system selects the executive to clean, the executive manager can receive the cleaning request of the mimicry scheduling system, the credibility of the cleaned executive is multiplied by 0.8 to be used as the current credibility of the cleaned executive, then the executive is returned to the offline executive alternative pool, and the executive is selected from the online executive alternative pool and is online.
(4) The executor manager may periodically monitor the number of executors in the online executor alternative pool, and if the actual number is less than j, sufficient executors are replenished from the offline executor alternative pool and added to the online executor alternative pool.
2. The method for realizing fast cleaning of the upper line of the mimicry executive as set forth in claim 1, wherein the step (1) comprises the substeps of:
(1.1) the executive manager selects the former j executors with higher credibility from the offline executive candidate pool to operate, and adds the executors into the online executive candidate pool after stripping the executors from the offline executive candidate pool, wherein j is less than or equal to i;
(1.2) the executive manager distributes m ports from the multi-path bridge to the executive in each online executive alternative pool, connects to the executive of each online, and sets all the distributed ports to a forbidden state;
(1.3) the executive manager puts the executors in each online executive's alternative pool into a sleep state.
3. The method for realizing fast cleaning of the upper line of the mimicry executive as set forth in claim 2, wherein the step (2) comprises the substeps of:
(2.1) the executive manager selects the former k executors with higher credibility from the online executive alternative pool to wake up, and strips the executors from the online executive alternative pool, wherein k is less than j;
and (2.2) the executive manager sets the port on the multi-path bridge corresponding to the woken executive to be in an enabling state.
4. A method for implementing a rapid cleaning of an upper line of a mimicry effector as claimed in claim 3, wherein said step (3) comprises the sub-steps of:
(3.1) the executive manager closes the executive to be cleaned, deletes the port on the multi-path bridge corresponding to the executive and adds the port into the offline executive alternative pool;
(3.2) the executive manager checks the number of available executors in the online executive alternative pool, and judges whether the available number is 0: (3.2.1) if the available number is 0: the executive manager selects 1 executive with the highest credibility from the offline executive alternative pool to operate, and strips the executive from the offline executive alternative pool; the executive manager distributes m ports for the executive from the multi-path bridge, connects to the executive on each line, and sets all the distributed ports to be in an enabling state;
(3.2.2) if the available number is other than 0: the executive manager selects 1 executive with the highest credibility from the online executive alternative pool to wake up, and strips the executive from the online executive alternative pool; the executive manager sets the port on the multi-path bridge corresponding to the awakened executive into an enabling state;
(3.3) the executive manager checks the number of available executors in the online executive alternative pool, and judges whether the available number is j: (3.3.1) if the available number is less than j, the executive manager selects 1 executive with the highest credibility from the offline executive alternative pool to operate, strips the executive from the offline executive alternative pool, and adds the executive into the online executive alternative pool; the executive manager allocates m ports for the executive from the multi-path bridge, connects to the executive and sets the allocated m ports to a forbidden state; the executive manager makes the executive enter into a dormant state;
(3.3.2) if the actual number is equal to j, no processing is done.
5. The method for realizing the rapid cleaning of the upper line of the mimicry executive body as claimed in claim 4, wherein the step (4) is specifically as follows: the executive manager selects 1 executive with the highest credibility from the offline executive alternative pool to operate, strips the executive from the offline executive alternative pool, and adds the executive into the online executive alternative pool; the executive manager allocates m ports for the executive from the multi-path bridge, connects to the executive and sets the allocated m ports to a forbidden state; the executive manager puts the executive into a sleep state.
CN202010724900.6A 2020-07-24 2020-07-24 Method for realizing rapid cleaning and online of mimicry executive body Pending CN111917754A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010724900.6A CN111917754A (en) 2020-07-24 2020-07-24 Method for realizing rapid cleaning and online of mimicry executive body

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010724900.6A CN111917754A (en) 2020-07-24 2020-07-24 Method for realizing rapid cleaning and online of mimicry executive body

Publications (1)

Publication Number Publication Date
CN111917754A true CN111917754A (en) 2020-11-10

Family

ID=73280258

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010724900.6A Pending CN111917754A (en) 2020-07-24 2020-07-24 Method for realizing rapid cleaning and online of mimicry executive body

Country Status (1)

Country Link
CN (1) CN111917754A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113079169A (en) * 2021-04-13 2021-07-06 华东计算技术研究所(中国电子科技集团公司第三十二研究所) Two-stage multi-layer resource scheduling method and system for mimicry defense

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8739283B1 (en) * 2009-12-07 2014-05-27 Trend Micro, Inc. Automatic generation of malware clean pattern
CN106411937A (en) * 2016-11-15 2017-02-15 中国人民解放军信息工程大学 Mimicry defense architecture based zero-day attack detection, analysis and response system and method thereof
CN106713262A (en) * 2016-11-17 2017-05-24 上海红阵信息科技有限公司 Heterogeneous execution body dynamic scheduling device based on credibility and scheduling method thereof
CN110673951A (en) * 2019-08-30 2020-01-10 华东计算技术研究所(中国电子科技集团公司第三十二研究所) Mimicry scheduling method, system and medium for general operation environment
CN111314337A (en) * 2020-02-11 2020-06-19 之江实验室 Mimicry scheduling method based on credibility and credibility coefficient

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8739283B1 (en) * 2009-12-07 2014-05-27 Trend Micro, Inc. Automatic generation of malware clean pattern
CN106411937A (en) * 2016-11-15 2017-02-15 中国人民解放军信息工程大学 Mimicry defense architecture based zero-day attack detection, analysis and response system and method thereof
CN106713262A (en) * 2016-11-17 2017-05-24 上海红阵信息科技有限公司 Heterogeneous execution body dynamic scheduling device based on credibility and scheduling method thereof
CN110673951A (en) * 2019-08-30 2020-01-10 华东计算技术研究所(中国电子科技集团公司第三十二研究所) Mimicry scheduling method, system and medium for general operation environment
CN111314337A (en) * 2020-02-11 2020-06-19 之江实验室 Mimicry scheduling method based on credibility and credibility coefficient

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113079169A (en) * 2021-04-13 2021-07-06 华东计算技术研究所(中国电子科技集团公司第三十二研究所) Two-stage multi-layer resource scheduling method and system for mimicry defense

Similar Documents

Publication Publication Date Title
JP3922070B2 (en) Distributed control method and apparatus
US6920632B2 (en) Dynamic multilevel task management method and apparatus
CN110888719A (en) Distributed task scheduling system and method based on web service
CN111240806B (en) Distributed container mirror image construction scheduling method
US11392414B2 (en) Cooperation-based node management protocol
CN106020976A (en) Method and apparatus for offloading out of memory processing process to user space
CN107085542A (en) IPC communication means and server
CN109491780B (en) Multi-task scheduling method and device
CN109597378B (en) Resource-limited hybrid task energy consumption sensing method
CN111314337B (en) Mimicry scheduling method based on credibility and credibility coefficient
CN111917754A (en) Method for realizing rapid cleaning and online of mimicry executive body
Xu et al. Speculative execution for a single job in a mapreduce-like system
Zhang et al. Energy efficient EDF-VD-based mixed-criticality scheduling with shared resources
CN111208985B (en) Data processing method, system and storage medium based on producer consumer model
Naghibzadeh A modified version of rate-monotonic scheduling algorithm and its' efficiency assessment
WO2021139174A1 (en) Faas distributed computing method and apparatus
CN115996197B (en) Distributed computing flow simulation system and method with preposed flow congestion
US20140245050A1 (en) Power management for host with devices assigned to virtual machines
CN111694787A (en) Chip starting method, network equipment and machine readable storage medium
CN115357395A (en) Fault equipment task transfer method and system, electronic equipment and storage medium
CN114820218A (en) Content operation method, device, server and storage medium
Niu et al. Leakage-aware scheduling for embedded real-time systems with (m, k)-constraints
CN112799809B (en) Cache coloring-based hybrid critical real-time system for resource sharing and isolation
Xu et al. Optimization for speculative execution of multiple jobs in a mapreduce-like cluster
JPH09179834A (en) Scheduling method of parallel system for process

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201110

RJ01 Rejection of invention patent application after publication