CN112488300A - Information system safety protection method based on bionic control mechanism - Google Patents
Information system safety protection method based on bionic control mechanism Download PDFInfo
- Publication number
- CN112488300A CN112488300A CN202011413094.7A CN202011413094A CN112488300A CN 112488300 A CN112488300 A CN 112488300A CN 202011413094 A CN202011413094 A CN 202011413094A CN 112488300 A CN112488300 A CN 112488300A
- Authority
- CN
- China
- Prior art keywords
- task
- execution
- information system
- module
- strategy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 230000007246 mechanism Effects 0.000 title claims abstract description 33
- 239000011664 nicotinic acid Substances 0.000 title claims abstract description 17
- 210000002569 neuron Anatomy 0.000 claims abstract description 34
- 230000006870 function Effects 0.000 claims abstract description 23
- 230000008569 process Effects 0.000 claims abstract description 19
- 230000009471 action Effects 0.000 claims abstract description 18
- 210000004556 brain Anatomy 0.000 claims abstract description 17
- 210000001032 spinal nerve Anatomy 0.000 claims abstract description 17
- 238000012544 monitoring process Methods 0.000 claims abstract description 13
- 210000005036 nerve Anatomy 0.000 claims abstract description 12
- 230000007613 environmental effect Effects 0.000 claims abstract description 10
- 230000008859 change Effects 0.000 claims abstract description 7
- 238000013507 mapping Methods 0.000 claims abstract description 5
- 230000000694 effects Effects 0.000 claims description 25
- 230000007123 defense Effects 0.000 claims description 11
- 230000003767 neural control Effects 0.000 claims description 10
- 230000001537 neural effect Effects 0.000 claims description 8
- 230000008447 perception Effects 0.000 claims description 8
- 230000010354 integration Effects 0.000 claims description 4
- 230000006399 behavior Effects 0.000 claims description 3
- 230000006698 induction Effects 0.000 claims description 3
- 230000000149 penetrating effect Effects 0.000 claims description 3
- 230000008520 organization Effects 0.000 claims description 2
- 238000012546 transfer Methods 0.000 claims description 2
- 230000003993 interaction Effects 0.000 claims 1
- 230000005540 biological transmission Effects 0.000 description 9
- 238000004891 communication Methods 0.000 description 6
- 230000006872 improvement Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 4
- 230000008260 defense mechanism Effects 0.000 description 3
- 239000012636 effector Substances 0.000 description 2
- 230000004927 fusion Effects 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 230000009467 reduction Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000003631 expected effect Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000003053 immunization Effects 0.000 description 1
- 238000002649 immunization Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/045—Combinations of networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/06—Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons
- G06N3/061—Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons using biological neurons, e.g. biological neurons connected to an integrated circuit
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Abstract
The invention relates to an information system safety protection method based on a bionic control mechanism, which comprises the following steps: simulating a high-efficiency nerve control mechanism of a human body, constructing a nerve system-like control framework, mapping main elements of the human body nerve system into an information system, and deploying safety neurons in an all-around manner; step (2) functional elements and safety elements are merged into a basic functional module, and a task-oriented fine-grained monitoring mechanism for executing actions is constructed; and (3) calling a basic module to execute operation according to the task execution condition, sensing an execution path in the execution process, finding out environmental change through feedback, and calibrating according to a strategy. According to the technical scheme, elements of neurons, spinal nerves and human brain are introduced into each layer of an information system network, so that a safety system and system functions are highly integrated, and fine-grained safety control is performed by taking tasks as guidance on the basis of functional element modularization of the system.
Description
Technical Field
The invention relates to the fields of information security technology, bionic control and active security defense, in particular to an information system security protection method based on a bionic control mechanism.
Background
With the increasingly complex architecture of the information system, the data volume of the load is exponentially increased, the data source is richer, the content is more diversified, and the dimensionality is wider. Meanwhile, with the gradual improvement of the performance of the terminal equipment, the sending rate of the data source is higher, which also leads to higher requirements on the acquisition speed of the security parameters. In the face of information networks of heavy traffic communication services, "shell defense" has no time to do depth filtering and intrusion detection. The existing security strategy of 'firstly establishing a network and then protecting' cannot cope with relevant scenes; the centralized defense mode can also reduce the external service capability of the information system to a certain extent; the weak security association between the defense mechanism and the information system also results in reduced defense effectiveness. In the practical application process of the existing methods or models such as computer immunization, trusted computing and the like, the unification of the system operation efficiency and the safety protection is difficult to achieve due to the lack of high fusion with the original information system.
In recent years, the concept of intrinsic security can solve the fusion problem, process high-rate data and cope with unknown threats, and is an active defense method. However, the existing endogenous safety protection method is not defined clearly, the biological safety protection mechanism is used for reference, and the active defense based on the bionic control is few in related researches, so that the patent provides an information system safety protection method based on the bionic control mechanism, and the method has great significance for the active defense in the dynamic operation environment so as to enable the task to be completed as expected by using the defense mechanism of human body facing internal and external safety threats.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides an information system safety protection method based on a bionic control mechanism, and the technical scheme leads elements of neurons, spinal nerves and human brain to each layer of an information system network, so that the safety system and the system function are highly integrated. On the basis of modularization of functional elements of the system, fine-grained safety control is conducted by taking a task as guidance. The method can more effectively realize the dynamic and active maintenance of the security of the information system.
In order to achieve the above object, the technical solution of the present invention is as follows, a method for information system security protection based on a bionic control mechanism, the method comprising the steps of:
simulating a high-efficiency nerve control mechanism of a human body, constructing a nerve system-like control framework, mapping main elements of the human body nerve system into an information system, and deploying safety neurons in an all-around manner;
step (2) functional elements and safety elements are merged into a basic functional module, and a task-oriented fine-grained monitoring mechanism for executing actions is constructed;
and (3) calling a basic module to execute operation according to the task execution condition, sensing an execution path in the execution process, finding out environmental change through feedback, and calibrating according to a strategy.
As an improvement of the present invention, the step (1) "simulating a high-efficiency neural control mechanism of a human body and constructing a neural system control architecture" means simulating a main composition of a neural control system and an internal feedback principle to form a set of neural control flow of an information system, and the neural system hierarchical architecture is roughly divided into neurons, spinal nerves and a brain, and a system architecture penetrating through an information system terminal, a network layer and a core network layer is constructed.
As an improvement of the invention, the layering method in the step (1) comprises the following steps: (1.1) the terminal is mainly responsible for perception, feedback and calibration, it contains a large amount of safe neurons, through the activity of neuron perception and control every terminal system, monitor and maintain the normal operation of application task, the composition module of various applications of terminal operation is effect part, the neuron extends to every effect part, in order to reduce the terminal burden simultaneously, the neuron only carries out the low-power consumption operation such as strategy assignment, environmental perception, action calibration function, do not do large-scale operation, the terminal application is carried out with the mode of task, call corresponding module and carry out task according to the tactics stipulated in advance, perceive various operational parameters and feed back it to the spinal nerve in the implementation, if the deviation appears, the terminal neuron then commands the effector to calibrate according to the calibration strategy, if: replacement of modules, reduction of load, etc.; (1.2) the network layer contains end nodes with interactive requirements at higher layers, these nodes: sharing a large amount of resources, communicating the resources through a local or wide area network, supporting the same organization network, coordinating the work of terminal neurons by using network layer spinal nerves and transmitting information between a terminal and a brain, wherein the spinal nerves are mainly responsible for receiving execution information transmitted by the terminal neurons, judging task execution effects, classifying the effects, matching execution flow information with a behavior library, searching whether a corresponding calibration strategy exists or not if a deviation occurs, reporting the calibration strategy and the effects to the brain by the spinal nerves, and optimizing and improving calibration efficiency by the brain; (1.3) the core network layer is the top of the framework, is equivalent to the brain, can generate and self-adaptively calibrate strategy resources and transfer the strategy resources to the network layer, and meanwhile, can complete the structure and function of security defense through learning, control and process the whole data through brain-like security, realize multitask integration, induction and decision making, and improve the security performance through autonomous learning.
As an improvement of the present invention, in the step (1), "safe neurons are deployed omnidirectionally" means that a large number of sensors need to be arranged in an information system to sense environmental changes.
As an improvement of the present invention, in the step (2), "integrating the functional elements and the security elements into the basic functional modules" refers to reconstructing an execution architecture of the information system, where the reconstructed architecture includes a public module and a private module for completing a specific task, and "constructing a task-oriented fine-grained monitoring mechanism for execution actions" refers to that each basic functional module corresponds to a basic action and the execution effect of the module is represented by an output generated by the action, when a task is submitted, analyzing the data to determine modules and execution sequences required by the tasks, monitoring the execution effect of the basic modules in the execution process, feeding back in real time and calibrating the execution deviation, meanwhile, a safe part needs to be integrated into the divided functional modules, so that the sensing and calibration of the neuron-like elements are realized, and the functional operation condition is monitored and configured and adjusted.
As an improvement of the present invention, the step (3) "calling the basic module to perform the operation according to the task execution condition, sensing the execution path in the execution process, finding the environmental change through feedback, and performing calibration according to the policy" means that after the security function is fused on the basis of the original function part, each parameter can be monitored while the basic task is completed in the task execution process, and then the monitored parameters are reported and the issued adjustment policy is received to reconfigure the function.
Compared with the prior art, the invention has the advantages that 1) the technical scheme integrates the function mapping from the human body neural control system to the information system, and provides a neural system-like control framework by using the safety protection mechanism based on the bionic control mechanism and the defense mechanism of the human body facing the internal and external safety threats; 2) according to the technical scheme, different safety components are deployed on different information scale levels, a multi-level hierarchical control mechanism is constructed, and a mechanism of fusing a basic function module and safety is provided; 3) according to the technical scheme, the sensing and control of the execution action are completed by deploying massive neurons in an information system, so that the task can be completed according to the expected effect; 4) according to the technical scheme, the method can consider the safety function deployment during the design of the information system, realize the high integration of the safety system and the information system, has better safety performance when the communication network has low defense efficiency, cannot process high-speed data and cannot deal with the problems of position threats, and can more effectively realize the dynamic active maintenance of the safety of the information system.
Drawings
FIG. 1 is a class neural system control architecture;
FIG. 2 is a task-oriented execution architecture;
FIG. 3 incorporates the modular infrastructure of the security function;
fig. 4 prototype system build framework.
The specific implementation mode is as follows:
for the purpose of enhancing an understanding of the present invention, the present embodiment will be described in detail below with reference to the accompanying drawings.
Example 1: referring to fig. 1, a method for information system security protection based on a bionic control mechanism includes the following steps:
simulating a high-efficiency nerve control mechanism of a human body, constructing a nerve system-like control framework, mapping main elements of the human body nerve system into an information system, and deploying safety neurons in an all-around manner;
in this example, as shown in fig. 1, a neural system control architecture is given, a set of neural control flow of the information system is formed by simulating the main composition and the internal feedback principle of the neural control system, the neural system hierarchical architecture is roughly divided into neurons, spinal nerves and a brain, and a system architecture penetrating through an information system terminal, a network layer and a core network layer is constructed;
the detailed steps are as follows:
and (1.1) the terminal is mainly responsible for sensing, feedback and calibration, and comprises a large number of safety neurons, the activity of each terminal system is sensed and controlled through the neurons, the normal operation of an application task is monitored and maintained, the component modules of various applications operated by the terminal are effect components, and the neurons extend to each effect component. Meanwhile, in order to reduce the burden of the terminal, the neuron only executes low-power-consumption operations such as strategy assignment, environment perception and action calibration functions, and does not perform large-scale operation. The terminal application is executed in a task mode, and calls a corresponding module according to a preset strategy and executes the task. Various operation parameters are sensed in the execution process and fed back to the spinal nerves, and if deviation occurs, the terminal neuron commands the effector to carry out calibration according to a calibration strategy, such as: replacement of modules, reduction of load, etc.;
step (1.2) the network layer contains terminal nodes with interactive requirements at higher layers, these nodes: share a large amount of resources, are connected by a local or wide area network, and support the same organizational network. Network layer spinal nerves are utilized to coordinate the operation of the terminal neurons and to convey information between the terminal and the brain. The spinal nerves are mainly responsible for receiving execution information uploaded by terminal neurons, judging task execution effects, classifying the effects, matching execution flow information with a behavior library, searching whether a corresponding calibration strategy exists or not if deviation occurs, reporting the calibration strategy and the effects to the brain by the spinal nerves, optimizing by the brain and improving the calibration efficiency;
and (1.3) the core network layer is the top of the framework, is equivalent to a brain, and can generate and self-adaptively calibrate strategy resources and put down to the network layer. Meanwhile, the structure and the function of security defense can be perfected through learning, the overall data is controlled and processed through brain-like security, multi-task integration, induction and decision making are realized, and the security performance is improved through autonomous learning;
step (2) functional elements and safety elements are merged into a basic functional module, and a task-oriented fine-grained monitoring mechanism for executing actions is constructed;
during specific implementation, an execution architecture of the information system needs to be rebuilt, and the rebuilt task-oriented execution architecture comprises a public module and a private module for completing a specific task. The detailed steps are as follows:
(2.1) designing each basic function module in the system to correspond to a basic action, wherein the execution effect of the module is represented by the output generated by the action;
(2.2) when a task is submitted, analyzing the task to determine a module and an execution sequence required by the task, monitoring the execution effect of a basic module in the execution process, feeding back in real time and calibrating the execution deviation;
(2.3) building a module basic structure, integrating a safe part into the divided functional modules, realizing the sensing and calibration of the neuron-like elements, and monitoring and configuring and adjusting the functional operation condition;
the task-oriented execution architecture involved in step (2) is shown in fig. 2, and the basic structure of the module involved in step (2.3) is shown in fig. 3.
Step (3) calling a basic module to execute operation according to the task execution condition, sensing an execution path in the execution process, finding out environmental change through feedback, and calibrating according to a strategy;
in the specific implementation, the detailed steps of (3) are as follows:
(3.1) fusing a safety function on the basis of the original function part, constructing a prototype system frame by utilizing Erlang on a Linux (Ubuntu 16.04) system, realizing communication and encryption and decryption modules, and managing an operation mechanism by a safety management part in the constructed prototype system, wherein a task management part is responsible for system task decomposition and selecting modules and parameter setting according to task expectation;
(3.2) decomposing the action parameters of the communication module in the basic module into transmission rate and CPU occupancy rate, wherein the adjustment strategy is divided into the size of a transmission data block and transmission bandwidth, the action output parameters of the encryption and decryption module are divided into encryption and decryption speed and CPU occupancy rate, and the adjustment strategy is encryption strength;
(3.3) establishing a target task to finish encryption and transmission of data by using a communication module and an encryption and decryption module, wherein configurable options comprise: data block size per transmission, includingAnd(ii) a The transmission bandwidth may be set to 900Kb and 11 Mb; with AES encryption, there may be set no encryption, 128-bit encryption, and 256-bit encryption. Under configurable parameters, combining into 12 groups of strategy modes;
(3.4) monitoring various parameters while completing the basic task in the task execution process, including: the processing time of each sending task, the overall CPU occupancy rate of the tasks and the data transmission rate. Then, under the framework of a built-in safety neuron, reporting the monitoring parameters and receiving the issued adjustment strategy to reconfigure the functions, and when the data sent by the task is not required to be confidential but needs faster processing and transmission rate, selecting the data to be sent by the task900Kb, policy mode without encryption. The choice is made when the encryption requirements are relatively high and the processing speed and resource consumption requirements are relatively low900Kb, 256 bit encrypted policy mode;
(3.5) parameters executed by a module in the fine-grained monitoring system can sense the environmental change of the system, the encryption strength is improved when a listener exists in the network, an abnormal warning is sent out when sensing the deviation of the parameters such as the transmission rate, the processing time and the like, and the security strategy is adjusted by the upper layer;
the prototype system framework involved in step (3.1) is shown in fig. 4, and refers to that a running environment simulating neural control is built on a system kernel layer, and a functional part and a safety part of a module are highly fused together on an application environment level. The security management section manages the operation mechanism. The task management part decomposes the tasks of the system, and selects a module and sets parameters according to the expectation of the tasks. The operation monitoring part senses the operation process of the module. The execution adjustment performs a reconfiguration of the policy based on the feedback parameters. In addition, the resource management carries out unified management on the bottom layer resources of the system, and the upper layer is connected with the upper layer to carry out communication in the aspect of safety.
It should be noted that the above-mentioned embodiments are not intended to limit the scope of the present invention, and all equivalent modifications and substitutions based on the above-mentioned technical solutions are within the scope of the present invention as defined in the claims.
Claims (6)
1. An information system safety protection method based on a bionic control mechanism is characterized by comprising the following steps:
simulating a high-efficiency nerve control mechanism of a human body, constructing a nerve system-like control framework, mapping main elements of the human body nerve system into an information system, and deploying safety neurons in an all-around manner;
step (2) functional elements and safety elements are merged into a basic functional module, and a task-oriented fine-grained monitoring mechanism for executing actions is constructed;
and (3) calling a basic module to execute operation according to the task execution condition, sensing an execution path in the execution process, finding out environmental change through feedback, and calibrating according to a strategy.
2. The information system safety protection method based on the bionic control mechanism as claimed in claim 1, wherein in the step (1), "simulating the efficient neural control mechanism of the human body and constructing the neural system control architecture" means simulating the main composition and internal feedback principle of the neural control system to form a set of neural control flow of the information system, dividing the neural system hierarchical architecture into neurons, spinal nerves and brain roughly, and constructing a system architecture penetrating through the information system terminal, network layer and core network layer.
3. The information system safety protection method based on the bionic control mechanism as claimed in claim 1, wherein the layering method in step (1) is as follows:
(1.1) the terminal is mainly responsible for perception, feedback and calibration, it contains a large number of safe neurons, through the neuron perception and control each terminal system activity, monitor and maintain the application task normal going on, the terminal running various application module is the effect part, the neuron extends to each effect part, at the same time in order to reduce the terminal burden, the neuron only executes the strategy issue, environment perception, action calibration function such as low power consumption operation, does not do large-scale operation, the terminal application is executed in the way of task, according to the predetermined strategy calls the corresponding module and executes the task, in the execution process perception various operation parameters and feeds back to the spinal nerve, if the deviation appears, the terminal neuron then according to the calibration strategy command the effect to calibrate,
(1.2) the network layer comprises terminal nodes with interaction requirements at a higher layer, shares a large number of resources, is communicated by a local or wide area network and supports the same organization network, the network layer spinal nerves are utilized to coordinate the work of terminal neurons and transmit information between a terminal and a brain, the spinal nerves are mainly responsible for receiving execution information transmitted by the terminal neurons, so that the task execution effect is judged, the effect is classified, execution flow information is matched with a behavior library, if deviation occurs, whether a corresponding calibration strategy exists or not is searched, the spinal nerves report the calibration strategy and the effect to the brain, the brain optimizes the calibration strategy and improves the calibration efficiency;
(1.3) the core network layer is the top of the framework, is equivalent to the brain, can generate and self-adaptively calibrate strategy resources and transfer the strategy resources to the network layer, and meanwhile, can complete the structure and function of security defense through learning, control and process the whole data through brain-like security, realize multitask integration, induction and decision making, and improve the security performance through autonomous learning.
4. The information system safety protection method based on the bionic control mechanism as claimed in claim 2, wherein the "omnibearing deployment of the safety neurons" in the step (1) means that a large number of sensors need to be arranged in the information system to sense environmental changes.
5. The information system security protection method based on bionic control mechanism as claimed in claim 3, wherein in the step (2), "merging functional elements and security elements into basic functional modules" refers to reconstructing an execution architecture of the information system, the reconstructed architecture includes a public module and a private module for completing a specific task, "constructing a task-oriented fine-grained monitoring mechanism for execution actions" refers to that each basic functional module corresponds to a basic action and the execution effect of the module is reflected by the output generated by the action, when a task is submitted, the task is analyzed to determine the module and execution order required for completing the task, the execution effect of the basic module is monitored during execution, real-time feedback is given and execution deviation is calibrated, and meanwhile, a secure part needs to be merged into the divided functional modules, the sensing and calibration of the neuron-like elements are realized, and the function operation condition is monitored and configured and adjusted.
6. The information system safety protection method based on the bionic control mechanism according to claim 3 or 4, wherein in the step (3), "calling the basic module to execute the operation according to the task execution condition, sensing the execution path in the execution process, finding the environmental change through feedback, and calibrating according to the strategy" means that after the safety function is fused on the basis of the original function part, each parameter can be monitored while the basic task is completed in the task execution process, and then the monitored parameters are reported and the issued adjustment strategy is received to reconfigure the function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011413094.7A CN112488300B (en) | 2020-12-04 | 2020-12-04 | Information system safety protection method based on bionic control mechanism |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011413094.7A CN112488300B (en) | 2020-12-04 | 2020-12-04 | Information system safety protection method based on bionic control mechanism |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112488300A true CN112488300A (en) | 2021-03-12 |
CN112488300B CN112488300B (en) | 2024-04-12 |
Family
ID=74939898
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011413094.7A Active CN112488300B (en) | 2020-12-04 | 2020-12-04 | Information system safety protection method based on bionic control mechanism |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112488300B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100269112A1 (en) * | 2008-11-21 | 2010-10-21 | Thales | System and method for the dynamic deployment of distributed treatments |
CN108492021A (en) * | 2018-03-16 | 2018-09-04 | 前海梧桐(深圳)数据有限公司 | Enterprise factor group representation method and its system based on human brain neural network's model |
CN109587174A (en) * | 2019-01-10 | 2019-04-05 | 广东电网有限责任公司信息中心 | Composite defense method and system for network protection |
CN109617873A (en) * | 2018-12-06 | 2019-04-12 | 中山大学 | A kind of flow attacking system of defense based on SDN cloud security function services tree-model |
-
2020
- 2020-12-04 CN CN202011413094.7A patent/CN112488300B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100269112A1 (en) * | 2008-11-21 | 2010-10-21 | Thales | System and method for the dynamic deployment of distributed treatments |
CN108492021A (en) * | 2018-03-16 | 2018-09-04 | 前海梧桐(深圳)数据有限公司 | Enterprise factor group representation method and its system based on human brain neural network's model |
CN109617873A (en) * | 2018-12-06 | 2019-04-12 | 中山大学 | A kind of flow attacking system of defense based on SDN cloud security function services tree-model |
CN109587174A (en) * | 2019-01-10 | 2019-04-05 | 广东电网有限责任公司信息中心 | Composite defense method and system for network protection |
Also Published As
Publication number | Publication date |
---|---|
CN112488300B (en) | 2024-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Singh et al. | Blockiotintelligence: A blockchain-enabled intelligent IoT architecture with artificial intelligence | |
Aïvodji et al. | IOTFLA: A secured and privacy-preserving smart home architecture implementing federated learning | |
Ahmed et al. | An energy-efficient data aggregation mechanism for IoT secured by blockchain | |
Deng et al. | Task scheduling for smart city applications based on multi-server mobile edge computing | |
US20220345484A1 (en) | Zero trust architecture for networks employing machine learning engines | |
CN110417849A (en) | Insertion type industrial equipment edge calculations system | |
DE102021206841A1 (en) | METHOD OF ENCRYPTING DATA-AT-REST FOR DATA RESIDING ON KUBERNETES PERSISTENT VOLUMES | |
Zhang et al. | Interpreting AI for networking: Where we are and where we are going | |
Nayak et al. | Ml-mds: Machine learning based misbehavior detection system for cognitive software-defined multimedia vanets (csdmv) in smart cities | |
CN116781423B (en) | Sharing method and system for industrial Internet data | |
Awaysheh et al. | Big data security frameworks meet the intelligent transportation systems trust challenges | |
Dai et al. | Digital twin envisioned secure air-ground integrated networks: A blockchain-based approach | |
Abuseta | A fog computing based architecture for IoT services and applications development | |
CN114338753A (en) | Vehicle cloud cooperative computing system, equipment and storage medium | |
da Silva et al. | Multichannel ALOHA optimization for federated learning with multiple models | |
Kumar et al. | Blockchain technology with applications to distributed control and cooperative robotics | |
CN112488300A (en) | Information system safety protection method based on bionic control mechanism | |
Pivoto et al. | A detailed relevance analysis of enabling technologies for 6G architectures | |
DE112021003656T5 (en) | ROLE DELEGATION IN ATTESTATION VERIFIERS | |
CN102238571B (en) | Apparatus of Internet of Things machine to machine/man (M2M) business processing, system and method thereof | |
Hinchey et al. | Modeling for NASA autonomous nano-technology swarm missions and model-driven autonomic computing | |
Singh et al. | Security and Privacy in Fog/Cloud-based IoT Systems for AI and Robotics | |
Maksymyuk et al. | Deep learning based mobile network management for 5G and beyond | |
Yassein et al. | Combining software-defined networking with Internet of Things: Survey on security and performance aspects | |
Alharasees et al. | Human Factors in the Age of Autonomous UAVs: Impact of Artificial Intelligence on Operator Performance and Safety |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |