CN112612594B - Execution body scheduling method and related device - Google Patents

Execution body scheduling method and related device Download PDF

Info

Publication number
CN112612594B
CN112612594B CN202011606051.0A CN202011606051A CN112612594B CN 112612594 B CN112612594 B CN 112612594B CN 202011606051 A CN202011606051 A CN 202011606051A CN 112612594 B CN112612594 B CN 112612594B
Authority
CN
China
Prior art keywords
layer
scheduling
executable
preset
attacked
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011606051.0A
Other languages
Chinese (zh)
Other versions
CN112612594A (en
Inventor
韩首魁
张高举
李昂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Angshi Information Technology Co ltd
Original Assignee
Zhengzhou Angshi Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Angshi Information Technology Co ltd filed Critical Zhengzhou Angshi Information Technology Co ltd
Priority to CN202011606051.0A priority Critical patent/CN112612594B/en
Publication of CN112612594A publication Critical patent/CN112612594A/en
Application granted granted Critical
Publication of CN112612594B publication Critical patent/CN112612594B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5027Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides an executable scheduling method and a related device, wherein the method comprises the following steps: scheduling target executives in a preset heterogeneous executable set to a preset set to form an executable set; the target execution body is an execution body which satisfies isomerism on a target layer in the isomerism execution body set; the target layer refers to: the method comprises the steps that among a layer set formed by a hardware layer of an executive body and a plurality of preset software layers, a layer matched with preset service is formed; under the condition that an attack instruction for representing that any execution body in the execution body set is attacked is received, acquiring an attacked layer of the execution body; determining an executive body meeting preset conditions from the heterogeneous executive body set; the preset conditions comprise: different from the executing body in the attacked layer; scheduling the execution body offline and scheduling the execution body online meeting the preset condition. The method and the device can solve the problems of more consumed resources and low scheduling accuracy in the scheduling process because the executor is purposefully scheduled.

Description

Execution body scheduling method and related device
Technical Field
The present disclosure relates to the field of network security, and in particular, to a method and an apparatus for scheduling an executable.
Background
With the rapid development of network technology and the advent of the information age, networks have been incorporated into aspects of people's lives. Networks offer efficiency and convenience to people's work and life, but are often related to valuable or private information, and have been the target of hacking. Hackers can use SQL injection, webShell, DDoS and other attack modes to achieve the purposes of illegally stealing user privacy, disturbing normal work of a network system and the like, and the security of the network system faces serious challenges.
At present, the mimicry defense architecture can schedule an execution body according to the characteristic of self dynamic heterogeneous redundancy, so that an attack communication chain is cut off, and attack behaviors aiming at a system are invalid.
However, the current mimicry defense architecture has the problems of more consumed resources and low scheduling accuracy in the process of scheduling an execution body.
Disclosure of Invention
The applicant finds that the current mimicry defense architecture adopts random scheduling in the scheduling execution body process, so that scheduling is not targeted, namely scheduling is not performed on a service or a specific attacked layer of the execution body, and therefore scheduling is performed in a place where scheduling is not needed, and further the problems of large scheduling consumption resources and low scheduling accuracy are caused.
The application provides an executable scheduling method and a related device, and aims to solve the problems of more consumed resources and low scheduling accuracy in the existing scheduling executable scheduling process of a mimicry defense architecture.
In order to achieve the above object, the present application provides the following technical solutions:
the application provides an executable scheduling method, which is applied to a scheduler and comprises the following steps:
scheduling target executives in a preset heterogeneous executable set to a preset set to form an executable set; the target executor is an executor which meets isomerism on a target layer in the isomerism executor set; the target layer refers to: the method comprises the steps that among a layer set formed by a hardware layer of an executive body and a plurality of preset software layers, a layer matched with preset service is formed;
under the condition that an attack instruction for representing that any executing body in the executing body set is attacked is received, acquiring an attacked layer of the executing body;
determining an executive body meeting preset conditions from the heterogeneous executive body set; the preset conditions include: different from the executable on the attacked layer;
and scheduling the execution body offline and scheduling the execution body online meeting the preset condition.
Optionally, the preset conditions further include: the degree of isomerism of the executing body set with other executing bodies in the executing body set on the attacked layer is larger than the degree of isomerism of the executing body set with other executing bodies in the executing body set on the attacked layer.
Optionally, the plurality of preset software layers includes: an operating system layer, a virtual technology layer, a kernel driver layer, and an application and protocol layer.
Optionally, the application and protocol layer includes: an application device layer, a communication technology layer and an application software layer.
The application also provides an executable scheduling device, which is applied to a scheduler and comprises:
the first scheduling module is used for scheduling target executors in a preset heterogeneous executable set to the preset set to form an executable set; the target executor is an executor which meets isomerism on a target layer in the isomerism executor set; the target layer refers to: the method comprises the steps that among a layer set formed by a hardware layer of an executive body and a plurality of preset software layers, a layer matched with preset service is formed;
the acquisition module is used for acquiring an attacked layer of any executable in the executable set under the condition of receiving an attack instruction for representing the attack of the executable;
the determining module is used for determining an executable body meeting a preset condition from the heterogeneous executable body set; the preset conditions include: different from the executable on the attacked layer;
and the second scheduling module is used for scheduling the execution body to be offline and scheduling the execution body to be online which meets the preset condition.
Optionally, the preset conditions further include: the degree of isomerism of the executing body set with other executing bodies in the executing body set on the attacked layer is larger than the degree of isomerism of the executing body set with other executing bodies in the executing body set on the attacked layer.
Optionally, the plurality of preset software layers includes: an operating system layer, a virtual technology layer, a kernel driver layer, and an application and protocol layer.
Optionally, the application and protocol layer includes: an application device layer, a communication technology layer and an application software layer.
The application also provides a storage medium, which comprises a stored program, wherein the program executes any one of the execution body scheduling methods.
The application also provides a scheduler, the device comprises at least one processor, and at least one memory and a bus connected with the processor; the processor and the memory complete communication with each other through the bus; the processor is configured to invoke the program instructions in the memory to execute any of the methods for executing the execution volume scheduling described above.
According to the executable scheduling method and the related device, on one hand, a target executable in a preset heterogeneous executable set is scheduled to a preset set to form an executable set; the target execution body is an execution body meeting isomerism on a target layer in the isomerism execution body set, and the target layer refers to: and the layer matched with the preset service is in a layer set formed by a hardware layer of the executive body and a plurality of preset software layers. I.e. the executives in the set of executives satisfy isomerism on the software and hardware layers that match the traffic. Therefore, aiming at the preset service required by the user, the executive body set built by the method meets the requirement of the preset service on the isomerism of the executive body, thereby ensuring the accuracy of the selected executive body and avoiding the scheduling of the executive body which does not need to be scheduled, and further ensuring the problems of more consumed resources and low scheduling accuracy in the process of scheduling the executive body.
On the other hand, under the condition that an attack instruction for representing that any executing body in the executing body set is attacked is received, the attacked layer of the executing body is obtained. From the heterogeneous set of executives, an execution volume that differs from the execution volume at the attacked layer is scheduled. The method and the device aim at an attacked layer to purposefully schedule the execution body, thereby ensuring the accuracy of the scheduled execution body and avoiding the scheduling of the execution body which does not need to be scheduled.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of a classical mimicry architecture based on mimicry defense technology in the prior art;
FIG. 2 is a flowchart of an executable scheduling method disclosed in an embodiment of the present application;
FIG. 3 is a schematic diagram of an executable scheduling process disclosed in an embodiment of the present application;
FIGS. 4 (a) and 4 (b) are schematic diagrams of the principle architecture of the scheduling hardware layer and the software layer disclosed in the embodiments of the present application;
fig. 5 is a schematic structural diagram of an executable scheduling device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a scheduler according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
Fig. 1 is a schematic diagram of a classical mimicry architecture based on mimicry defense technology in the prior art, and in fig. 1, specific implementation logic of a dynamic selection algorithm, a proxy module, a arbitration module, a countercheck module, and a scheduler are in the prior art, and are not described herein again.
In this embodiment, the scheduling flow of the scheduler in fig. 1 is modified to obtain the executable scheduling method of the present application, and the specific executable scheduling method flow is shown in fig. 2, and may include the following steps:
s201, scheduling target executors in a preset heterogeneous executable set to the preset set to form an executable set.
In this embodiment, the target executor refers to: heterogeneous executives are satisfied on the target layer in the heterogeneous executable set. Wherein, the target layer refers to: and the layer matched with the preset service is in a layer set formed by a hardware layer of the executive body and a plurality of preset software layers. It should be noted that, the hardware component of the executable and the "executable" in the plurality of preset software layers refer to the executable generally. That is, generally, any executable includes a hardware layer and a plurality of software layers.
In this step, the specific scheduling process is the prior art, and will not be described herein.
Optionally, in this embodiment, the hardware layer may include: x86, ARM, shenwei, etc.
Optionally, in this embodiment, the plurality of preset software layers may include: an operating system layer, a virtual technology layer, a kernel driver layer, and an application and protocol layer. The operating system layer may include Windows, linux, unix, among others. The virtual technology layer may include: VMware, KVM, docker, etc. The kernel driver layer may include: CPU driver, memory driver, etc.
Wherein, the application and protocol layer may include: the application device layer (which may include mimicry Web servers, mimicry routers, mimicry firewalls, etc.), the communication technology layer (which may include information management, service distribution, message forwarding, data types, etc.), and the application software layer (which may include mimicry websites, mimicry APP, mimicry PC software, etc.).
For a clearer description of the present embodiment, an execution volume scheduling process shown in fig. 3 is taken as an example. In fig. 3, "executable set" means the executable set established in the present embodiment. The "heterogeneous execution pool" in fig. 3 represents a preset heterogeneous execution set in the present embodiment. Where "heterogeneous execution pool" is a subset of the "heterogeneous resource pool" in FIG. 1. The "multi-level scheduling system" in fig. 3 represents the execution body scheduler of the present embodiment.
S202, under the condition that an attack instruction for representing that any execution body in the execution body set is attacked is received, obtaining an attacked layer of the execution body.
In this embodiment, when an attacker attacks a certain executable in the executable set successfully, the scheduler may receive an attack instruction, where the attack instruction is used to indicate an attacked executable, and the attack instruction may also include an attacked layer of the attacked executable.
Also taking fig. 3 as an example, in the case where an executing body X in the executing body set is attacked, the multi-level scheduling system (scheduler) receives alarm information (attack instruction), where the alarm information may include an attacked layer of the attacked executing body. For example, the attacked layer is an operating system layer.
S203, determining an execution body meeting a preset condition from the heterogeneous execution body set.
In this embodiment, the preset conditions may include: different from the executable on the attacked layer.
In this embodiment, in order to further ensure the reliability of the determined execution body, the preset conditions may further include: the degree of isomerism on the attacked layer with other executives in the executable set is greater than the degree of isomerism on the attacked layer with other executives in the attacked executable set.
Also taking fig. 3 as an example, assuming that the attacked layer is an operating system layer, in this step, an execution body (for example, execution body n) different from the attacked execution body in the operating system layer may be determined from the heterogeneous execution body pool, and then the execution body n is different from the operating system layer of the attacked execution body.
And if the preset condition further comprises the isomerism degree, indicating that the isomerism degree of the execution body n and other execution bodies in the execution body set on the operating system layer is larger than the isomerism degree of the execution body X and other execution bodies in the execution body set on the operating system.
S204, scheduling the attacked execution body to be offline and scheduling the execution body meeting the preset condition to be online.
In this step, the attacked execution body is scheduled to be offline, and the execution body that satisfies the preset condition is scheduled to be online.
Also taking fig. 3 as an example, in this step, the execution body X is scheduled to be offline and the execution body that satisfies the preset condition is scheduled to be online. The specific scheduling manner is the prior art, and is not described herein.
In this embodiment, the execution time of the attacked execution body is scheduled to be offline, and the attacked execution body can be scheduled to be offline only after the attack instruction is received and the attack instruction is determined to indicate which execution body the attacked execution body is. The embodiment does not limit the specific scheduling time for scheduling the offline of the attacked executable.
In the present embodiment, the above-described processes S202 to S204 can be described by taking fig. 4 (a) and 4 (b) as an example. Fig. 4 (a) and fig. 4 (b) show that the scheduler can acquire the attacked layer when receiving the arbitration log sent by the arbitration model. After the scheduler acquires the attacked layer, a scheduling algorithm corresponding to the attacked layer is called, an execution subject meeting preset conditions is determined, and the execution subject meeting the preset conditions is scheduled to be online.
Fig. 5 is a block diagram of an executable scheduling apparatus according to an embodiment of the present application, which may include: a first scheduling module 501, an acquisition module 502, a determination module 503, and a second scheduling module 504, wherein,
a first scheduling module 501, configured to schedule a target executable in a preset heterogeneous executable set to a preset set to form an executable set; the target executor is an executor which meets isomerism on a target layer in the isomerism executor set; the target layer refers to: the method comprises the steps that among a layer set formed by a hardware layer of an executive body and a plurality of preset software layers, a layer matched with preset service is formed;
an obtaining module 502, configured to obtain an attacked layer of any one of the execution bodies in the execution body set under the condition that an attack instruction for characterizing the attack of the execution body is received;
a determining module 503, configured to select an executable that meets a preset condition from the heterogeneous executable set; the preset conditions include: different from the executable on the attacked layer;
the second scheduling module 504 is configured to schedule the execution body offline and schedule the execution body online that satisfies a preset condition.
Optionally, the preset conditions further include: the degree of isomerism of the executing body set with other executing bodies in the executing body set on the attacked layer is larger than the degree of isomerism of the executing body set with other executing bodies in the executing body set on the attacked layer.
Optionally, the plurality of preset software layers includes: an operating system layer, a virtual technology layer, a kernel driver layer, and an application and protocol layer.
Optionally, the application and protocol layer includes: an application device layer, a communication technology layer and an application software layer.
The executable scheduling device comprises a processor and a memory, wherein the processor is used for: the first scheduling module 501, the acquiring module 502, the determining module 503, the second scheduling module 504, and the like are stored as program units in a memory, and the processor executes the program units stored in the memory to realize corresponding functions.
The processor includes a kernel, and the kernel fetches the corresponding program unit from the memory. The kernel can be provided with one or more than one kernel, and the problems of large consumption resources and low scheduling accuracy in the process of scheduling an execution body are solved by adjusting kernel parameters.
The embodiment of the invention provides a storage medium, on which a program is stored, which when executed by a processor, implements the executable scheduling method.
The embodiment of the invention provides a processor which is used for running a program, wherein the execution body scheduling method is executed when the program runs.
An embodiment of the present invention provides a scheduler, as shown in fig. 6, where an apparatus includes at least one processor, and at least one memory and a bus connected to the processor; the processor and the memory complete communication with each other through a bus; the processor is used for calling the program instructions in the memory to execute the execution body scheduling method. The device herein may be a server, PC, PAD, cell phone, etc.
The present application also provides a computer program product adapted to perform, when executed on a data processing device, a program initialized with the method steps of:
scheduling target executives in a preset heterogeneous executable set to a preset set to form an executable set; the target executor is an executor which meets isomerism on a target layer in the isomerism executor set; the target layer refers to: the method comprises the steps that among a layer set formed by a hardware layer of an executive body and a plurality of preset software layers, a layer matched with preset service is formed;
under the condition that an attack instruction for representing that any executing body in the executing body set is attacked is received, acquiring an attacked layer of the executing body;
determining an executive body meeting preset conditions from the heterogeneous executive body set; the preset conditions include: different from the executable on the attacked layer;
and scheduling the execution body offline and scheduling the execution body online meeting the preset condition.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, the device includes one or more processors (CPUs), memory, and a bus. The device may also include input/output interfaces, network interfaces, and the like.
The memory may include volatile memory, random Access Memory (RAM), and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM), among other forms in computer readable media, the memory including at least one memory chip. Memory is an example of a computer-readable medium.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises an element.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and changes may be made to the present application by those skilled in the art. Any modifications, equivalent substitutions, improvements, etc. which are within the spirit and principles of the present application are intended to be included within the scope of the claims of the present application.
The functions described in the methods of the present application, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computing device readable storage medium. Based on such understanding, a portion of the embodiments of the present application that contributes to the prior art or a portion of the technical solution may be embodied in the form of a software product stored in a storage medium, comprising several instructions for causing a computing device (which may be a personal computer, a server, a mobile computing device or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Features described in the various embodiments of the present disclosure may be interchanged or combined, each having a particular emphasis on illustrating differences from other embodiments, and the same or similar elements of the various embodiments may be used in conjunction with each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (8)

1. An executable scheduling method, applied to a scheduler, comprising:
scheduling target executives in a preset heterogeneous executable set to a preset set to form an executable set; the target executor is an executor which meets isomerism on a target layer in the isomerism executor set; the target layer refers to: the method comprises the steps that among a layer set formed by a hardware layer of an executive body and a plurality of preset software layers, a layer matched with preset service is formed;
under the condition that an attack instruction for representing that any executing body in the executing body set is attacked is received, acquiring an attacked layer of the executing body;
determining an executive body meeting preset conditions from the heterogeneous executive body set; the preset conditions include: different from the executable on the attacked layer;
scheduling the execution body to be offline and scheduling the execution body meeting the preset condition to be online;
wherein, the preset conditions further include: the degree of isomerism of the executing body set with other executing bodies in the executing body set on the attacked layer is larger than the degree of isomerism of the executing body set with other executing bodies in the executing body set on the attacked layer.
2. The method of claim 1, wherein the plurality of pre-set software layers comprises: an operating system layer, a virtual technology layer, a kernel driver layer, and an application and protocol layer.
3. The method of claim 2, wherein the application and protocol layer comprises: an application device layer, a communication technology layer and an application software layer.
4. An executable scheduling apparatus, applied to a scheduler, comprising:
the first scheduling module is used for scheduling target executors in a preset heterogeneous executable set to the preset set to form an executable set; the target executor is an executor which meets isomerism on a target layer in the isomerism executor set; the target layer refers to: the method comprises the steps that among a layer set formed by a hardware layer of an executive body and a plurality of preset software layers, a layer matched with preset service is formed;
the acquisition module is used for acquiring an attacked layer of any executable in the executable set under the condition of receiving an attack instruction for representing the attack of the executable;
the determining module is used for determining an executable body meeting a preset condition from the heterogeneous executable body set; the preset conditions include: different from the executable on the attacked layer;
the second scheduling module is used for scheduling the execution body to be offline and scheduling the execution body to be online which meets the preset conditions;
wherein, the preset conditions further include: the degree of isomerism of the executing body set with other executing bodies in the executing body set on the attacked layer is larger than the degree of isomerism of the executing body set with other executing bodies in the executing body set on the attacked layer.
5. The apparatus of claim 4, wherein the plurality of pre-set software layers comprises: an operating system layer, a virtual technology layer, a kernel driver layer, and an application and protocol layer.
6. The apparatus of claim 5, wherein the application and protocol layer comprises: an application device layer, a communication technology layer and an application software layer.
7. A storage medium comprising a stored program, wherein the program executes the executable scheduling method of any one of claims 1 to 3.
8. A scheduler, characterized in that it comprises at least one processor, and at least one memory, bus, connected to said processor; the processor and the memory complete communication with each other through the bus; the processor is configured to invoke program instructions in the memory to execute the executable scheduling method according to any one of claims 1-3.
CN202011606051.0A 2020-12-30 2020-12-30 Execution body scheduling method and related device Active CN112612594B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011606051.0A CN112612594B (en) 2020-12-30 2020-12-30 Execution body scheduling method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011606051.0A CN112612594B (en) 2020-12-30 2020-12-30 Execution body scheduling method and related device

Publications (2)

Publication Number Publication Date
CN112612594A CN112612594A (en) 2021-04-06
CN112612594B true CN112612594B (en) 2024-03-29

Family

ID=75249149

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011606051.0A Active CN112612594B (en) 2020-12-30 2020-12-30 Execution body scheduling method and related device

Country Status (1)

Country Link
CN (1) CN112612594B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107145376A (en) * 2016-03-01 2017-09-08 中兴通讯股份有限公司 A kind of active defense method and device
CN109218440A (en) * 2018-10-12 2019-01-15 上海拟态数据技术有限公司 A kind of mimicry web server isomery execution body dynamic dispatching method of displaying
CN111343176A (en) * 2020-01-16 2020-06-26 郑州昂视信息科技有限公司 Network attack countering device, method, storage medium and computer equipment
CN111641661A (en) * 2020-06-12 2020-09-08 深圳供电局有限公司 Construction method and system of heterogeneous executer
CN111858165A (en) * 2020-07-06 2020-10-30 河南信大网御科技有限公司 Rapid recovery method, system and framework for heterogeneous executer
CN112153024A (en) * 2020-09-11 2020-12-29 华东计算技术研究所(中国电子科技集团公司第三十二研究所) Mimicry defense system based on SaaS platform
CN114116150A (en) * 2020-08-25 2022-03-01 华为技术有限公司 Task scheduling method and device and related equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107145376A (en) * 2016-03-01 2017-09-08 中兴通讯股份有限公司 A kind of active defense method and device
CN109218440A (en) * 2018-10-12 2019-01-15 上海拟态数据技术有限公司 A kind of mimicry web server isomery execution body dynamic dispatching method of displaying
CN111343176A (en) * 2020-01-16 2020-06-26 郑州昂视信息科技有限公司 Network attack countering device, method, storage medium and computer equipment
CN111641661A (en) * 2020-06-12 2020-09-08 深圳供电局有限公司 Construction method and system of heterogeneous executer
CN111858165A (en) * 2020-07-06 2020-10-30 河南信大网御科技有限公司 Rapid recovery method, system and framework for heterogeneous executer
CN114116150A (en) * 2020-08-25 2022-03-01 华为技术有限公司 Task scheduling method and device and related equipment
CN112153024A (en) * 2020-09-11 2020-12-29 华东计算技术研究所(中国电子科技集团公司第三十二研究所) Mimicry defense system based on SaaS platform

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
《A formalization research on Web server and scheduling strategy for heterogeneity》;Bolin Ma;《Advanced Information Management, Communicates, Electronic and Automation Control Conference》;全文 *
《基于BSG 的拟态Web 服务器调度策略研究》;王晓梅;《通信学报》;全文 *
《基于数据层的动态攻击面防御技术》;洪海诚;《中国优秀硕士学位论文全文数据库信息科技辑》;全文 *

Also Published As

Publication number Publication date
CN112612594A (en) 2021-04-06

Similar Documents

Publication Publication Date Title
AU2016369460B2 (en) Dual memory introspection for securing multiple network endpoints
EP3111364B1 (en) Systems and methods for optimizing scans of pre-installed applications
US10050999B1 (en) Security threat based auto scaling
US11108793B2 (en) Preemptive alerts in a connected environment
US20220279012A1 (en) Methods and apparatus to identify and report cloud-based security vulnerabilities
US9111089B1 (en) Systems and methods for safely executing programs
US20130097203A1 (en) System and method for providing threshold levels on privileged resource usage in a mobile network environment
Canfora et al. Composition-malware: building android malware at run time
US10691475B2 (en) Security application for a guest operating system in a virtual computing environment
EP3270317B1 (en) Dynamic security module server device and operating method thereof
US11233823B1 (en) Efficient implementation of honeypot devices to detect wide-scale network attacks
US8402539B1 (en) Systems and methods for detecting malware
US20210266181A1 (en) Data security processing method and terminal thereof, and server
Ramachandran et al. Android anti-virus analysis
US20140308919A1 (en) Application-level trusted third party solution based on an antiviral mobile client
CN112612594B (en) Execution body scheduling method and related device
US20230177148A1 (en) Liveness guarantees in secure enclaves using health tickets
CN105653948B (en) Method and device for preventing malicious operation
US11240268B1 (en) Dynamic honeypots for computer program execution environments
CN111222130B (en) Page response method, page request method and page request device
GB2548147A (en) Self-propagating cloud-aware distributed agents for benign cloud exploitation
CN113849558A (en) Method and device for deploying data sharing service
CN112685741A (en) Static measurement method of trusted computing platform with parallel computing and protection in smart grid environment
Jarabek Towards cloud-based anti-malware protection for desktop and mobile platforms

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant