WO2021103930A1 - 拟态交换机中异构执行体的清洗恢复方法、装置和拟态交换机 - Google Patents

拟态交换机中异构执行体的清洗恢复方法、装置和拟态交换机 Download PDF

Info

Publication number
WO2021103930A1
WO2021103930A1 PCT/CN2020/125201 CN2020125201W WO2021103930A1 WO 2021103930 A1 WO2021103930 A1 WO 2021103930A1 CN 2020125201 W CN2020125201 W CN 2020125201W WO 2021103930 A1 WO2021103930 A1 WO 2021103930A1
Authority
WO
WIPO (PCT)
Prior art keywords
mimic
heterogeneous
scheduler
cleaning
executor
Prior art date
Application number
PCT/CN2020/125201
Other languages
English (en)
French (fr)
Inventor
武彦平
于波
李彧
Original Assignee
网络通信与安全紫金山实验室
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 网络通信与安全紫金山实验室 filed Critical 网络通信与安全紫金山实验室
Priority to US17/780,174 priority Critical patent/US20230007044A1/en
Publication of WO2021103930A1 publication Critical patent/WO2021103930A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/215Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/084Configuration by using pre-existing information, e.g. using templates or copying from other elements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/84Using snapshots, i.e. a logical point-in-time copy of the data

Definitions

  • This application relates to the technical field of network security protection, and in particular to a method and device for cleaning and restoring heterogeneous executors in a mimic switch, and a mimic switch.
  • Mimic defense technology realizes effective response to unknown threats by creating an architecture with dynamic heterogeneous redundancy as the core, and provides a good solution for solving cyberspace security issues. Guidelines.
  • the mimic switch is a typical application of mimic defense technology.
  • Mimic switches usually use multiple heterogeneous processors as heterogeneous executives, and the mimic switch system includes a hardware-implemented mimic scheduler to realize the decision screening of the downstream data of the heterogeneous executives and the distribution of the upstream data.
  • the present application provides a method and device for cleaning and restoring heterogeneous executors in a mimic switch, and a mimic switch.
  • this application provides a method for cleaning and restoring heterogeneous actors in a mimic switch, including:
  • the mimic scheduler determines the designated heterogeneous executor that needs to be cleaned; S220.
  • the mimic scheduler marks the designated heterogeneous executor that needs to be cleaned as a cleaning state, and sends a cleaning instruction to the designated heterogeneous executor S230, the designated heterogeneous executor sends a normal protocol negotiation message to the mimic scheduler to try to interact with the mimic scheduler; S240, the mimic scheduler receives the protocol negotiation message, and Detect whether the designated heterogeneous executor is in the cleaning state, and if the mimic scheduler detects that the designated heterogeneous executor is in the cleaning state, it constructs a training message and sends the training message to the designated The heterogeneous executors perform protocol training; S250, repeat S230-S240, until the designated heterogeneous executor returns to a normal state.
  • this application provides a method for cleaning and restoring heterogeneous actors in a mimic switch, including:
  • the mimic scheduler judges the downlink data from multiple heterogeneous executors, and decides whether to clean the heterogeneous executors with abnormal output;
  • S320 the designated heterogeneous executors that need to be cleaned are marked by the mimic scheduler It is in a cleaning state and does not participate in mimicry judgments, and sends a cleaning instruction to it;
  • S330 the designated heterogeneous executor restarts;
  • S340 the designated heterogeneous executor sends a normal protocol negotiation message to try to schedule with the mimicry S350, the mimetic scheduler receives the protocol negotiation message, detects whether the designated heterogeneous executor is in the cleaning state, and if so, constructs a training message and sends it to the designated heterogeneous executor for agreement Training; otherwise, determine whether the designated heterogeneous executor participates in the judgment according to the pre-established mimic strategy; S360, repeat S340-S350 until the state of the designated heterogeneous executor is restored, and notify the mimic scheduler; S370, the
  • the mimic scheduler in S310 makes a decision on downlink data from multiple heterogeneous executives specifically as follows: the mimic The mimic decision module in the scheduler receives the downlink data of multiple heterogeneous executors, marks the output of each heterogeneous executor as normal or abnormal according to the mimic strategy, and selects any one of the heterogeneous executors with normal output to deliver As the correct data, the correct data is sent to the switching chip and also sent to the mimic recovery module of the mimic scheduler; the mimic recovery module analyzes the correct data, and updates the operating status and backup data of the corresponding protocol .
  • the mimic strategy includes a majority decision based on empirical credibility, a majority decision based on weight, and a composite single selection decision based on sampling majority.
  • the decision in S310 to determine whether to clean the heterogeneous executors with abnormal output is specifically: the mimic decision module in the mimic scheduler Analyze the current status and historical judgment data of the heterogeneous executor with abnormal output. If the number of times that the heterogeneous executor with abnormal output is judged as abnormal reaches the specified threshold, it is determined that the heterogeneous executor with abnormal output needs to be cleaned. .
  • the constructing training message in S350 is specifically: the mimic recovery module of the mimic scheduler parses the protocol negotiation report
  • the training message is constructed according to the state of the heterogeneous executive bodies reflected in the protocol negotiation message and its backup data.
  • the mimic controller also receives uplink data from the switching chip, and processes the uplink data as follows: The data is copied and distributed to each of the heterogeneous executive bodies and the mimic recovery module, and the mimic recovery module analyzes the uplink data and updates the running status and backup data of the corresponding protocol.
  • an embodiment of the present application also provides a cleaning and restoring device for heterogeneous executors in a mimic switch, which is used in a mimic switch.
  • the mimic switch includes a plurality of heterogeneous executors, a mimic scheduler, and a switching chip.
  • the cleaning recovery device is located in the mimic scheduler, and includes a mimic decision module and a mimic recovery module,
  • the mimetic decision module is connected to multiple heterogeneous executors through a data communication interface, and is used to make a decision on the downlink data from the heterogeneous executors, and send it to any heterogeneous executor with normal output
  • the correct data is sent to the switching chip; for the heterogeneous executor with abnormal output, it is decided whether to clean it according to its current state and historical judgment data;
  • the mimetic recovery module is connected to the switching chip through a data communication interface, and is used to receive uplink data from the switching chip and the judged downlink data, maintain and update the data backup of the current operating status of each heterogeneous executive body, and provide information for those that need to be cleaned. Specify a heterogeneous executor for state restoration.
  • the embodiments of the present application provide the first possible implementation manner of the third aspect, wherein the data communication interface is at least one of PCIE, SGMII, UART, GPIO, XAUI, IIC, SPI, and AXI Or use any of them at the same time.
  • the data communication interface is at least one of PCIE, SGMII, UART, GPIO, XAUI, IIC, SPI, and AXI Or use any of them at the same time.
  • an embodiment of the present application also provides a mimic switch, including multiple heterogeneous executive bodies, a mimic scheduler, and a switching chip;
  • the mimic scheduler includes a mimic decision module and a mimic recovery module, and the mimic decision module is connected
  • the mimic recovery module is connected to the switch chip;
  • the mimic switch is configured to perform the following steps:
  • the mimic scheduler determines the designated heterogeneous executor that needs to be cleaned; S220.
  • the mimic scheduler marks the designated heterogeneous executor that needs to be cleaned as a cleaning state, and sends a cleaning instruction to the designated heterogeneous executor S230, the designated heterogeneous executor sends a normal protocol negotiation message to the mimic scheduler to try to interact with the mimic scheduler; S240, the mimic scheduler receives the protocol negotiation message, and Detect whether the designated heterogeneous executor is in the cleaning state, and if the mimic scheduler detects that the designated heterogeneous executor is in the cleaning state, it constructs a training message and sends the training message to the designated The heterogeneous executors perform protocol training; S250, repeat S230-S240, until the designated heterogeneous executor returns to a normal state.
  • FIG. 1 is a schematic structural diagram of a mimic switch provided by an embodiment of this application.
  • FIG. 2 is a flowchart of a method for cleaning and restoring heterogeneous executors in a mimic switch provided by an embodiment of the application.
  • FIG. 3 is a flowchart of a method for cleaning and restoring heterogeneous executors in a mimic switch provided by another embodiment of the application.
  • FIG. 4 is a flowchart of a method for processing downlink data in a method for cleaning and recovering heterogeneous executors in a mimic switch provided by an embodiment of the application.
  • FIG. 5 is a flowchart of an uplink data processing method in a method for cleaning and recovering heterogeneous executors in a mimic switch provided by an embodiment of the application.
  • FIG. 6 is a schematic structural diagram of a cleaning and restoring device for heterogeneous executors in a mimic switch provided by an embodiment of the application.
  • the method for cleaning and restoring heterogeneous executors provided in this application can be applied to a mimic switch 10 with a heterogeneous multi-mode architecture as shown in FIG. 1.
  • the mimic switch 10 includes a switching chip 110, a mimic scheduler 120, and multiple heterogeneous executors 130 (heterogeneous executor 1, heterogeneous executor 2, ..., heterogeneous executor N shown in FIG. 1).
  • the mimic scheduler 120 determines whether each heterogeneous executor 130 needs to be cleaned and restored according to the mimic decision result and the mimic decision strategy, and informs the designated heterogeneous executor 130 to clean and assist it to complete the state restoration, that is, to restore to the normal state.
  • the heterogeneous executive body 130 may include multiple processors of different architectures (for example, X86, ARM, RISC-V, MIPS, etc.), and the heterogeneous executive body 130 runs the control plane software of the corresponding protocol.
  • the mimic scheduler 120 includes a mimic decision module 121, a mimic recovery module 122, and a plurality of data communication interfaces 123, so that the mimic scheduler 120 communicates with the heterogeneous executive body 130 and the switching chip 110 through the plurality of data communication interfaces 123.
  • the switching chip 110 is configured to complete the forwarding of the data plane of the switch according to the configuration issued by the heterogeneous executive body 130, and upload the message to the heterogeneous executive body 130 when a protocol control message is received.
  • a method for cleaning and restoring heterogeneous actors in a mimic switch is provided.
  • the method can be applied to the mimic switch 10 in FIG. 1, and the method includes the following steps:
  • step S210 the mimic scheduler determines the designated heterogeneous executors that need to be cleaned
  • step S220 the mimic scheduler marks the designated heterogeneous executor that needs to be cleaned as a cleaning state, and sends a cleaning instruction to the designated heterogeneous executor;
  • step S230 the designated heterogeneous executor sends a normal protocol negotiation message to the mimic scheduler to try to interact with the mimic scheduler;
  • step S240 the mimic scheduler receives the protocol negotiation message and detects whether the designated heterogeneous executor is in the cleaning state. If the mimic scheduler detects that the designated heterogeneous executor is in the cleaning state, it constructs a training message and sends the training message The document is sent to the designated heterogeneous executor for protocol training;
  • step S250 steps S230 to S240 are repeated until the designated heterogeneous executor returns to a normal state.
  • a method for cleaning and restoring heterogeneous executors in a mimic switch includes the following steps:
  • step S310 the mimic scheduler judges the downlink data from multiple heterogeneous executors to determine the heterogeneous executor with abnormal output, and decides whether the heterogeneous executor with abnormal output needs to be cleaned.
  • the mimic scheduler in step S310 judges the downlink data from multiple heterogeneous executors to determine the heterogeneous executor with abnormal output, which may include: in step S311, The mimic decision module in the mimic scheduler receives downlink data of multiple heterogeneous executors. In step S312, the mimic decision module in the mimic scheduler marks each heterogeneous executor with normal output or abnormal output according to the mimic strategy.
  • the mimic scheduler in step S310 determines whether the heterogeneous executors that output abnormalities need to be cleaned.
  • the mimic decision module in the mimic scheduler analyzes the heterogeneous output abnormalities. The current status and historical judgment data of the executor. If the number of times the heterogeneous executor with abnormal output is judged to be abnormal reaches the specified threshold, it is determined that the heterogeneous executor with abnormal output needs to be cleaned.
  • the isomeric executors that need to be cleaned are correspondingly determined as the designated isomeric executors.
  • the indicators for judging abnormalities and corresponding thresholds in different embodiments may be different. Common indicators include the number of errors or the percentage of errors, etc., but all must reach a specified threshold to trigger cleaning.
  • the method may further include: in step S313, selecting any data issued by the heterogeneous executor with normal output as the correct data , The correct data is sent to the switching chip, and the correct data is also sent to the mimic recovery module of the mimic scheduler; the mimic recovery module analyzes the correct data and updates the running status and backup data of the corresponding protocol.
  • the decision strategy includes, but is not limited to, one or more of a majority decision based on empirical credibility, a majority decision based on weight, and a composite single choice decision based on a majority of sampling.
  • step S320 for the designated heterogeneous executor that needs to be cleaned, the mimic scheduler marks it as a clean state, it does not participate in mimicry judgment, and sends a clean instruction to it.
  • step S330 the designated heterogeneous executor is restarted.
  • step S340 the designated heterogeneous executor sends a normal protocol negotiation message to the mimic scheduler to try to interact with the mimic scheduler.
  • step S350 the mimetic scheduler receives the protocol negotiation message, detects whether the designated heterogeneous executor is in the cleaning state, and if so, constructs a training message and sends it to the designated heterogeneous executor for protocol training; otherwise, the heterogeneous The executor is not in a clean state, and it is necessary to further determine whether the heterogeneous executor participates in the judgment according to the mimic strategy.
  • Mimic strategies can be multiple, for example: mimic strategy can select all non-cleaning heterogeneous executors to participate in the decision; it can also select part of the non-cleaning heterogeneous executors to participate in the decision, and the other part to join the decision
  • the timing of the decision can also be different. It can be added to the judgment when the number of times the downlink data of the newly restored heterogeneous executors are consistent with the correct data of the judgment reaches the threshold, or it can be that the heterogeneous executors participating in the judgment are less than a certain number of times. Add when the value is.
  • the specific mimicry strategy can be implemented by the existing technology, which can be configured according to the actual situation. Those skilled in the art can understand how to select a suitable mimic strategy for corresponding processing of heterogeneous executors based on the above example description.
  • Constructing the training message in step S350 includes: the mimic recovery module of the mimic scheduler parses the protocol negotiation message, and constructs the training message according to the status of the heterogeneous executive bodies reflected in the protocol negotiation message and its backup data.
  • step S360 steps S340 to S350 are repeated until the designated heterogeneous executor returns to the normal state, and the mimic scheduler is notified that the designated heterogeneous executor has returned to the normal state.
  • step S370 the mimic scheduler marks the designated heterogeneous executor as a normal state, and determines whether it participates in the decision according to the mimic strategy.
  • the method further includes the following steps:
  • step S510 the mimic controller receives uplink data from the switching chip.
  • step S520 the mimic controller copies and distributes the uplink data to each heterogeneous executive body and mimic recovery module.
  • step S530 the mimic recovery module parses the uplink data, and updates the running status and backup data of the corresponding protocol.
  • a cleaning and restoring device 60 for heterogeneous executive bodies in a mimic switch is provided, which can be used in the mimic switch 10 shown in FIG.
  • the cleaning and restoration device 60 is located in the mimic scheduler 120, and includes a mimic decision module 121 and a mimic restoration module 122.
  • the mimic decision module 121 connects multiple heterogeneous executors 130 through the data communication interface 123, and is used to judge the downlink data from the heterogeneous executors 130. For any heterogeneous executor 130 with normal output, it will be issued The correct data is sent to the switching chip 110; for the heterogeneous executive body 130 with abnormal output, it is decided whether to clean it according to its current state and historical judgment data;
  • the mimic recovery module 122 is connected to the switch chip 110 through the data communication interface 123, and is used to receive the uplink data from the switch chip 110 and the judged downlink data, maintain and update the data backup of the current operating state of each heterogeneous executive body 130, and provide The designated heterogeneous executor 130 that needs to be cleaned performs state restoration.
  • the data communication interface 123 can also be different according to the different operating protocols of the heterogeneous executive bodies, and it is at least one or any of PCIE, SGMII, UART, GPIO, XAUI, IIC, SPI, and AXI. Several kinds are used at the same time.
  • This application provides a device for cleaning and restoring heterogeneous executors in a mimetic switch.
  • a recovery agent for each protocol in the mimic scheduler it assists the restoration of the state of the heterogeneous executors in a way of training when cleaning is not required.
  • a single or multiple heterogeneous executors can quickly recover to normal working conditions when they are attacked by external attacks or their internal exceptions, ensuring the safety and reliability of the services provided by the system, and improving the overall reliability of the network architecture Performance and stability have important guiding significance for the cleaning and recovery technology of multi-mode heterogeneous executive body architecture system.
  • a mimic switch 10 which includes a plurality of heterogeneous execution bodies 130, a mimic scheduler 120, and a switch chip 110;
  • the mimic scheduler 120 includes a mimic decision module 121 and a mimic recovery module 122.
  • the mimic judgment module 121 is connected to multiple heterogeneous executives 130, and the mimic recovery module 122 is connected to the switching chip 110;
  • the mimic switch 10 is configured to perform the following steps:
  • the mimic scheduler determines the designated heterogeneous executors that need to be cleaned
  • the mimic scheduler marks the designated heterogeneous executor that needs to be cleaned as a cleaning state, and sends a cleaning instruction to the designated heterogeneous executor;
  • the designated heterogeneous executor sends a normal protocol negotiation message to the mimic scheduler to try to interact with the mimic scheduler;
  • the mimic scheduler receives the protocol negotiation message and detects whether the designated heterogeneous executor is in the cleaning state. If the mimic scheduler detects that the designated heterogeneous executor is in the cleaning state, it constructs a training message and sends the training message To the designated heterogeneous executive body for agreement training;
  • the mimic switch 10 is further configured to execute the steps of the method for cleaning and restoring heterogeneous actors in any of the foregoing embodiments, and has the same beneficial effects.
  • each block in the flowchart or block diagram may represent a module, program segment, or part of the code, and the module, program segment, or part of the code contains one or more functions for realizing the specified logical function.
  • Executable instructions may also occur in a different order from the order marked in the drawings. For example, two consecutive blocks can actually be executed in parallel, or they can sometimes be executed in the reverse order, depending on the functions involved.
  • each block in the block diagram and/or flowchart, and the combination of the blocks in the block diagram and/or flowchart can be implemented by a dedicated hardware-based system that performs the specified functions or actions Or it can be realized by a combination of dedicated hardware and computer instructions.
  • the computer program product of the method for cleaning and restoring heterogeneous actors in a mimic switch includes a computer-readable storage medium storing program code.
  • the instructions included in the program code can be used to execute the previous method embodiments. For the specific implementation of the method, please refer to the method embodiment, which will not be repeated here.
  • connection should be interpreted broadly. For example, they may be fixedly connected, detachably connected, or integrally connected. Connection; it can be a mechanical connection or an electrical connection; it can be directly connected, or indirectly connected through an intermediate medium, and it can be the internal communication between two components.
  • connection can be a mechanical connection or an electrical connection; it can be directly connected, or indirectly connected through an intermediate medium, and it can be the internal communication between two components.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本申请提供一种拟态交换机中异构执行体的清洗恢复方法、装置和拟态交换机,方法包括:拟态调度器确定需要清洗的指定异构执行体;拟态调度器将需要清洗的指定异构执行体标记为清洗状态,并向指定异构执行体发送清洗指令;指定异构执行体发送正常的协议协商报文至拟态调度器,以尝试与拟态调度器交互;拟态调度器接收协议协商报文,并检测指定异构执行体是否处于清洗状态,如果拟态调度器检测到指定异构执行体处于清洗状态,则构造训练报文,并将训练报文发送至指定异构执行体进行协议训练;重复发送和接收处理协议协商报文的步骤,直至指定异构执行体恢复至正常状态。

Description

拟态交换机中异构执行体的清洗恢复方法、装置和拟态交换机
相关申请的交叉引用
本申请要求于2019年11月27日提交中国专利局、申请号为201911179831.9、发明名称为“拟态交换机异构执行体的清洗恢复方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及网络安全防护技术领域,特别涉及一种拟态交换机中异构执行体的清洗恢复方法、装置和拟态交换机。
背景技术
当前,网络空间的安全问题成为信息时代最严峻的挑战之一,拟态防御技术通过创造以动态异构冗余为核心的架构实现对未知威胁的有效应对,为解决网络空间安全问题提供了良好的指引。
拟态交换机是拟态防御技术的一种典型应用。拟态交换机通常使用多个异构处理器作为异构执行体,拟态交换机系统中包含硬件实现的拟态调度器,以实现对异构执行体下行数据的判决筛选以及上行数据的分发。
外部攻击或内部错误可能导致异构执行体出现异常,虽然该异常未必会影响判决输出的数据,但不及时清洗恢复该异构执行体仍会使系统的安全性显著下降。可以采用数据备份恢复的方式对异构执行体进行清洗恢复。然而,由于不同异构执行体上运行的同一种协议的具体实现可能并不完全相同,需要针对该协议定义统一的数据备份恢复结构,进而需要对每个异构执行体的协议栈做很大的改动,来完成数据的备份和同步。
发明内容
基于此,本申请提供一种拟态交换机中异构执行体清洗恢复方法、装置和拟态交换机。
第一方面,本申请提供了一种拟态交换机中异构执行体清洗恢复方法,包括:
S210、拟态调度器确定需要清洗的指定异构执行体;S220、所述拟态调度器将所述需要清洗的指定异构执行体标记为清洗状态,并向所述指定异构执行体发送清洗指令;S230、所述指定异构执行体发送正常的协议协商报文至所述拟态调度器,以尝试与所述拟态调度器交互;S240、所述拟态调度器接收所述协议协商报文,并检测所述指定异构执行体是否处于清洗状态,如果所述拟态调度器检测到所述指定异构执行体处于清洗状态,则构造训练报文,并将所述训练报文发送至所述指定异构执行体进行协议训练;S250、重复S230~S240,直至所述指定异构执行体恢复至正常状态。
第二方面,本申请提供了一种拟态交换机中异构执行体清洗恢复方法,包括:
S310、拟态调度器对来自多个异构执行体的下行数据进行判决,决定是否对输出异常的异构执行体进行清洗;S320、对需要清洗的指定异构执行体,所述拟态调度器标记其为清洗状态,不参与拟态判决,并向其发送清洗指令;S330、所述指定异构执行体重启;S340、所述指定异构执行体发送正常的协议协商报文尝试与所述拟态调度器交互;S350、拟态调度器接收到所述协议协商报文,检测所述指定异构执行体是否处于清洗状态,如果是,则构造训练报文,发送给所述指定异构执行体进行协议训练;否则根据预先制订的拟态策略决定所述指定异构执行体是否参与判决;S360、重复S340~S350直至所述指定异构执行体状态恢复,并通知所述拟态调度器;S370、所述拟态调度器标记所述指定异构执行体为正常状态,根据所述拟态策略决定其是否参与判决。
结合第二方面,本申请实施例提供了第二方面的第一种可能的实施方式,S310中所述的拟态调度器对来自多个异构执行体的下行数据进行判决具体为: 所述拟态调度器中的拟态判决模块接收多个异构执行体的下行数据,根据拟态策略标记每个所述异构执行体输出为正常或异常,选择任一输出正常的所述异构执行体下发的数据作为正确数据,将所述正确数据发送至交换芯片,同时也发送给所述拟态调度器的拟态恢复模块;所述拟态恢复模块解析所述正确数据,更新对应协议的运行状态和备份数据。
其中作为优选的,所述拟态策略包括基于经验可信度的择多判决、基于权重的择多判决、基于抽样择多的复合单选判决。
结合第二方面,本申请实施例提供了第二方面的第二种可能的实施方式,S310中决定是否对输出异常的异构执行体进行清洗具体为:所述拟态调度器中的拟态判决模块分析输出异常的异构执行体的当前状态以及历史判决数据,如果所述输出异常的异构执行体被判决为异常的次数达到指定的阈值,则确定所述输出异常的异构执行体需要清洗。
结合第二方面,本申请实施例提供了第二方面的第三种可能的实施方式,S350中所述的构造训练报文具体为:所述拟态调度器的拟态恢复模块解析所述协议协商报文,根据所述协议协商报文反映的异构执行体的状态和其备份数据构造训练报文。
结合第二方面,本申请实施例提供了第二方面的第四种可能的实施方式,所述拟态控制器还接收来自交换芯片的上行数据,并对所述上行数据进行如下处理:所述上行数据被复制分发给各个所述异构执行体和拟态恢复模块,所述拟态恢复模块解析所述上行数据,并更新对应协议的运行状态和备份数据。
第三方面,本申请实施例还提供一种拟态交换机中异构执行体的清洗恢复装置,用于拟态交换机,所述拟态交换机包含多个异构执行体、拟态调度器和交换芯片,所述清洗恢复装置位于所述拟态调度器内,包括拟态判决模块和拟态恢复模块,
所述拟态判决模块通过数据通信接口连接多个所述异构执行体,用于对来自所述异构执行体的下行数据进行判决,对于任一输出正常的异构执行体,将其下发的正确数据发送至交换芯片;对于输出异常的异构执行体,根据其当前 状态以及历史判决数据,决定是否对其进行清洗;
所述拟态恢复模块通过数据通信接口连接交换芯片,用于接收来自交换芯片的上行数据和经判决后的下行数据,维护和更新各异构执行体当前运行状态的数据备份,并对需要清洗的指定异构执行体进行状态恢复。
结合第三方面,本申请实施例提供了第三方面的第一种可能的实施方式,其中所述数据通信接口至少为PCIE、SGMII、UART、GPIO、XAUI、IIC、SPI、AXI中的一种或任意几种同时使用。
第四方面,本申请实施例还提供一种拟态交换机,包括多个异构执行体、拟态调度器和交换芯片;所述拟态调度器包括拟态判决模块和拟态恢复模块,所述拟态判决模块连接多个所述异构执行体,所述拟态恢复模块连接所述交换芯片;所述拟态交换机配置为执行如下步骤:
S210、拟态调度器确定需要清洗的指定异构执行体;S220、所述拟态调度器将所述需要清洗的指定异构执行体标记为清洗状态,并向所述指定异构执行体发送清洗指令;S230、所述指定异构执行体发送正常的协议协商报文至所述拟态调度器,以尝试与所述拟态调度器交互;S240、所述拟态调度器接收所述协议协商报文,并检测所述指定异构执行体是否处于清洗状态,如果所述拟态调度器检测到所述指定异构执行体处于清洗状态,则构造训练报文,并将所述训练报文发送至所述指定异构执行体进行协议训练;S250、重复S230~S240,直至所述指定异构执行体恢复至正常状态。
本申请的一个或多个实施例的细节在下面的附图和描述中提出。本申请的其它特征、目的和优点将从说明书、附图以及权利要求书变得明显。
附图说明
为了更清楚地说明本申请具体实施方式中的技术方案,下面将对具体实施方式描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本申请的一些实施方式,对于本领域普通技术人员来讲,在不付出创造性劳 动的前提下,还可以根据这些附图获得其他的附图。
图1为本申请一实施例提供的拟态交换机的结构示意图。
图2为本申请一实施例提供的拟态交换机中异构执行体的清洗恢复方法的流程图。
图3为本申请另一实施例提供的拟态交换机中异构执行体的清洗恢复方法的流程图。
图4为本申请一实施例提供的拟态交换机中异构执行体的清洗恢复方法中下行数据处理方法的流程图。
图5为本申请一实施例提供的拟态交换机中异构执行体的清洗恢复方法中上行数据处理方法的流程图。
图6为本申请一实施例提供的拟态交换机中异构执行体的清洗恢复装置的结构示意图。
具体实施方式
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合附图对本申请的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请提供的异构执行体清洗恢复方法,可以应用于如图1所示的异构多模架构的拟态交换机10中。该拟态交换机10包括交换芯片110、拟态调度器120和多个异构执行体130(图1中所示的异构执行体1、异构执行体2、……、异构执行体N)。拟态调度器120根据拟态判决结果和拟态判决策略确定各个异构执行体130是否需要清洗恢复,以及通知指定的异构执行体130进行清洗并协助其完成状态恢复,即恢复至正常状态。
其中,异构执行体130可以包括多个不同架构的处理器(例如,X86、ARM、 RISC-V、MIPS等),异构执行体130上运行相应协议的控制面软件。拟态调度器120包括拟态判决模块121、拟态恢复模块122以及多个数据通信接口123,以便拟态调度器120通过多个数据通信接口123与异构执行体130和交换芯片110进行通信。交换芯片110用于根据异构执行体130下发的配置完成交换机数据面的转发,以及当接收到协议控制报文时将报文上传给异构执行体130。
在一个实施例中,如图2所示,提供一种拟态交换机中异构执行体的清洗恢复方法,该方法可以应用于图1中的拟态交换机10中,该方法包括以下步骤:
在步骤S210,拟态调度器确定需要清洗的指定异构执行体;
在步骤S220,拟态调度器将需要清洗的指定异构执行体标记为清洗状态,并向指定异构执行体发送清洗指令;
在步骤S230,指定异构执行体发送正常的协议协商报文至拟态调度器,以尝试与拟态调度器交互;
在步骤S240,拟态调度器接收协议协商报文,并检测指定异构执行体是否处于清洗状态,如果拟态调度器检测到指定异构执行体处于清洗状态,则构造训练报文,并将训练报文发送至指定异构执行体进行协议训练;
在步骤S250,重复步骤S230~S240,直至指定异构执行体恢复至正常状态。
在一个实施例中,如图3所示,提供一种拟态交换机中异构执行体的清洗恢复方法,包括以下步骤:
在步骤S310,拟态调度器对来自多个异构执行体的下行数据进行判决,以确定输出异常的异构执行体,并决定输出异常的异构执行体是否需要清洗。
如图4所示,在一个实施例中,步骤S310中的拟态调度器对来自多个异构执行体的下行数据进行判决,以确定输出异常的异构执行体,可以包括:在步骤S311,拟态调度器中的拟态判决模块接收多个异构执行体的下行数据,在步骤S312,拟态调度器中的拟态判决模块根据拟态策略标记每个异构执行体输出正常或输出异常。
如图4所示,在一个实施例中,步骤S310中的拟态调度器决定输出异常的异构执行体是否需要清洗包括:在步骤S314,拟态调度器中的拟态判决模块分析输出异常的异构执行体的当前状态以及历史判决数据,如果输出异常的异构执行体被判决为异常的次数达到指定的阈值,则确定输出异常的异构执行体需要清洗。需要清洗的异构执行体即相应地确定为指定异构执行体。根据不同拟态策略,不同实施例中的判决异常的指标及相应阈值可能不同,常见指标有出错次数或出错的百分比等,但都必须达到指定的阈值后触发清洗。
进一步地,在一个实施例中,当在步骤S312中异构执行体标记为输出正常时,方法还可以包括:在步骤S313,选择任一输出正常的异构执行体下发的数据作为正确数据,将正确数据发送至交换芯片,同时也将正确数据发送给拟态调度器的拟态恢复模块;拟态恢复模块解析正确数据,更新对应协议的运行状态和备份数据。
在一个实施例中,判决策略包括但不限于基于经验可信度的择多判决、基于权重的择多判决、基于抽样择多的复合单选判决中的一种或多种。
在步骤S320,对需要清洗的指定异构执行体,拟态调度器标记其为清洗状态,其不参与拟态判决,并向其发送清洗指令。
在步骤S330,指定异构执行体重启。
在步骤S340,指定异构执行体发送正常的协议协商报文至拟态调度器,以尝试与拟态调度器交互。
在步骤S350,拟态调度器接收到协议协商报文,检测指定异构执行体是否处于清洗状态,如果是,则构造训练报文,发送给指定异构执行体进行协议训练;否则,该异构执行体不处于清洗状态,需要进一步根据拟态策略决定该异构执行体是否参与判决。
拟态策略可以是多种的,例如:拟态策略可以是选取所有非清洗状态的异构执行体参与判决;也可以是选择非清洗状态的异构执行体中的一部分参与判决,而另一部分加入判决的时机也可以不同,可以是等新恢复至正常状态的异构执行体的下行数据与判决正确数据一致的次数达到阈值时就加入判决,也可 以是参与判决的异构执行体少于某个数值时加入。具体拟态策略可以通过现有技术来实现,其可以根据实际情况配置。本领域技术人员可以根据上述举例描述,了解如何选取合适的拟态策略对异构执行体进行相应处理。
步骤S350中的构造训练报文包括:拟态调度器的拟态恢复模块解析协议协商报文,根据协议协商报文反映的异构执行体的状态和其备份数据构造训练报文。
在步骤S360,重复步骤S340~S350,直至指定异构执行体恢复至正常状态,并通知拟态调度器指定异构执行体已恢复至正常状态。
在步骤S370,拟态调度器标记指定异构执行体为正常状态,根据拟态策略决定其是否参与判决。
在一个实施例中,如图5所示,本方法还包括如下步骤:
在步骤S510,拟态控制器接收来自交换芯片的上行数据。
在步骤S520,拟态控制器将上行数据复制并分发给各个异构执行体和拟态恢复模块。
在步骤S530,拟态恢复模块解析上行数据,并更新对应协议的运行状态和备份数据。
本申请以上各个实施例提供的异构执行体清洗恢复方法,通过在拟态调度器中对每种协议设置拟态恢复代理,以训练的方式协助异构执行体清洗时完成状态的恢复,能够在无需修改异构执行体上协议栈的情况下,使得单个或多个异构执行体受到外部攻击或自身内部异常时快速恢复正常工作状态,保证系统提供服务的安全可靠性,提升网络架构整体的可靠性和稳定性。
应该理解的是,虽然图2-5的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,图2-5中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些子步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或 者其它步骤的子步骤或者阶段的至少一部分轮流或者交替地执行。
在一个实施例中,如图6所示,提供一种拟态交换机中异构执行体的清洗恢复装置60,其可以用于如图1中所示的拟态交换机10中,该拟态交换机10包括多个异构执行体130、拟态调度器120和交换芯片110,清洗恢复装置60位于拟态调度器120内,包括拟态判决模块121和拟态恢复模块122,其中
拟态判决模块121通过数据通信接口123连接多个异构执行体130,用于对来自异构执行体130的下行数据进行判决,对于任一输出正常的异构执行体130,将其下发的正确数据发送至交换芯片110;对于输出异常的异构执行体130,根据其当前状态以及历史判决数据,决定是否对其进行清洗;
拟态恢复模块122通过数据通信接口123连接交换芯片110,用于接收来自交换芯片110的上行数据和经判决后的下行数据,维护和更新各异构执行体130当前运行状态的数据备份,并对需要清洗的指定异构执行体130进行状态恢复。
在一些实施方式中,根据异构执行体运行协议的不同,数据通信接口123也可有所不同,其至少为PCIE、SGMII、UART、GPIO、XAUI、IIC、SPI、AXI中的一种或任意几种同时使用。
本申请提供的一种拟态交换机中异构执行体清洗恢复装置,通过在拟态调度器中对每种协议设置恢复代理,以训练的方式协助异构执行体清洗时完成状态的恢复,能够在无需修改异构执行体上协议栈的情况下,使得单个或多个异构执行体受到外部攻击或自身内部异常时快速恢复正常工作状态,保证系统提供服务的安全可靠性,提升网络架构整体的可靠性和稳定性,对多模异构执行体架构系统清洗恢复技术具有重要的指导意义。
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关方法的实施例中进行了详细描述,两个实施例可互相参见,此处将不做详细阐述说明。
在一个实施例中,如图1所示,提供一种拟态交换机10,包括多个异构执 行体130、拟态调度器120和交换芯片110;
拟态调度器120包括拟态判决模块121和拟态恢复模块122,拟态判决模块121连接多个异构执行体130,拟态恢复模块122连接交换芯片110;
拟态交换机10配置为执行如下步骤:
S210、拟态调度器确定需要清洗的指定异构执行体;
S220、拟态调度器将需要清洗的指定异构执行体标记为清洗状态,并向指定异构执行体发送清洗指令;
S230、指定异构执行体发送正常的协议协商报文至拟态调度器,以尝试与拟态调度器交互;
S240、拟态调度器接收协议协商报文,并检测指定异构执行体是否处于清洗状态,如果拟态调度器检测到指定异构执行体处于清洗状态,则构造训练报文,并将训练报文发送至指定异构执行体进行协议训练;
S250、重复S230~S240,直至指定异构执行体恢复至正常状态。
在其他实施例中,拟态交换机10还配置为执行上述任一实施例的异构执行体清洗恢复方法的步骤,并具有相同的有益效果。
除非另外具体说明,否则在这些实施例中阐述的部件、步骤的相对步骤和数值并不限制本申请的范围。
附图中的流程图和框图显示了根据本申请的多个实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段或代码的一部分,所述模块、程序段或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或动作的专用的基于硬件的系统来实现,或者可以用专用硬件与 计算机指令的组合来实现。
本申请实施例所提供的拟态交换机中异构执行体的清洗恢复方法的计算机程序产品,包括存储了程序代码的计算机可读存储介质,所述程序代码包括的指令可用于执行前面方法实施例中所述的方法,具体实现可参见方法实施例,在此不再赘述。
另外,在本申请实施例的描述中,除非另有明确的规定和限定,术语“相连”、“连接”应做广义理解,例如,可以是固定连接,也可以是可拆卸连接,或一体地连接;可以是机械连接,也可以是电连接;可以是直接相连,也可以通过中间媒介间接相连,可以是两个元件内部的连通。对于本领域的普通技术人员而言,可以具体情况理解上述术语在本申请中的具体含义。
以上所述实施例,仅为本申请的具体实施方式,用以说明本申请的技术方案,而非对其限制,本申请的保护范围并不局限于此,尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,其依然可以对前述实施例所记载的技术方案进行修改或可轻易想到变化,或者对其中部分技术特征进行等同替换;而这些修改、变化或者替换,并不使相应技术方案的本质脱离本申请实施例技术方案的精神和范围,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。

Claims (15)

  1. 一种拟态交换机中异构执行体的清洗恢复方法,包括:
    S210、拟态调度器确定需要清洗的指定异构执行体;
    S220、所述拟态调度器将所述需要清洗的指定异构执行体标记为清洗状态,并向所述指定异构执行体发送清洗指令;
    S230、所述指定异构执行体发送正常的协议协商报文至所述拟态调度器,以尝试与所述拟态调度器交互;
    S240、所述拟态调度器接收所述协议协商报文,并检测所述指定异构执行体是否处于清洗状态,如果所述拟态调度器检测到所述指定异构执行体处于清洗状态,则构造训练报文,并将所述训练报文发送至所述指定异构执行体进行协议训练;
    S250、重复S230~S240,直至所述指定异构执行体恢复至正常状态。
  2. 根据权利要求1所述的清洗恢复方法,其中,在所述拟态调度器向所述指定异构执行体发送清洗指令之后,所述指定异构执行体发送协议协商报文至所述拟态调度器之前,还包括:
    所述指定异构执行体重启。
  3. 根据权利要求1所述的清洗恢复方法,其中,所述拟态调度器确定需要清洗的指定异构执行体包括:
    拟态调度器对来自多个异构执行体的下行数据进行判决,以确定输出异常的异构执行体;
    拟态调度器决定所述输出异常的异构执行体是否需要清洗;
    拟态调度器将需要清洗的所述输出异常的异构执行体,作为所述指定异构执行体。
  4. 根据权利要求3所述的清洗恢复方法,其中,当所述异构执行体被标记 为清洗状态时,不参与所述判决。
  5. 根据权利要求3所述的清洗恢复方法,其中,所述方法还包括:
    如果所述拟态调度器检测到所述指定异构执行体不处于清洗状态,则根据预先制订的拟态策略决定所述指定异构执行体是否参与所述判决。
  6. 根据权利要求5所述的清洗恢复方法,其中,在所述指定异构执行体恢复正常状态后,还包括:
    所述指定异构执行体通知所述拟态调度器所述指定异构执行体已恢复正常状态;
    所述拟态调度器标记所述指定异构执行体为正常状态,并根据所述拟态策略决定所述指定异构执行体是否参与所述判决。
  7. 根据权利要求5所述的清洗恢复方法,其中,所述拟态调度器对来自多个异构执行体的下行数据进行拟态判决,以确定输出异常的异构执行体,包括:
    所述拟态调度器中的拟态判决模块接收多个异构执行体的下行数据,根据所述拟态策略标记每个所述异构执行体输出正常或输出异常。
  8. 根据权利要求7所述的清洗恢复方法,其中,还包括:
    选择任一输出正常的所述异构执行体下发的数据作为正确数据,将所述正确数据发送至交换芯片,同时也将所述正确数据发送给所述拟态调度器的拟态恢复模块;
    所述拟态恢复模块解析所述正确数据,更新对应协议的运行状态和备份数据。
  9. 根据权利要求5所述的清洗恢复方法,其中,所述拟态策略包括基于经验可信度的择多判决、基于权重的择多判决和基于抽样择多的复合单选判决中 的一种或多种。
  10. 根据权利要求3所述的清洗恢复方法,其中,所述拟态调度器决定所述输出异常的异构执行体是否需要清洗包括:
    所述拟态调度器中的拟态判决模块分析所述输出异常的异构执行体的当前状态以及历史判决数据,如果所述输出异常的异构执行体被判决为输出异常的次数达到指定的阈值,则确定所述输出异常的异构执行体需要清洗。
  11. 根据权利要求1所述的清洗恢复方法,其中,所述构造训练报文包括:
    所述拟态调度器的拟态恢复模块解析所述协议协商报文,根据所述协议协商报文反映的异构执行体的状态和异构执行体的备份数据构造训练报文。
  12. 根据权利要求1所述的清洗恢复方法,其中,还包括:
    所述拟态控制器接收来自交换芯片的上行数据,并将所述上行数据复制和分发给各个所述异构执行体和拟态恢复模块;
    所述拟态恢复模块解析所述上行数据,并更新对应协议的运行状态和备份数据。
  13. 一种拟态交换机中异构执行体的清洗恢复装置,用于拟态交换机,所述拟态交换机包括多个异构执行体、拟态调度器和交换芯片,其中,所述清洗恢复装置位于所述拟态调度器内,所述清洗恢复装置包括拟态判决模块和拟态恢复模块,
    所述拟态判决模块通过数据通信接口连接多个所述异构执行体,用于对来自所述异构执行体的下行数据进行判决,对于任意一个输出正常的异构执行体,将其下发的正确数据发送至交换芯片;对于输出异常的异构执行体,根据其当前状态以及历史判决数据,决定是否对其进行清洗;
    所述拟态恢复模块通过数据通信接口连接交换芯片,用于接收来自交换芯 片的上行数据和经判决后的下行数据,维护和更新各异构执行体当前运行状态的数据备份,并对需要清洗的指定异构执行体进行状态恢复。
  14. 根据权利要求13所述的清洗恢复装置,其中,所述数据通信接口至少为PCIE、SGMII、UART、GPIO、XAUI、IIC、SPI、AXI中的一种或多种。
  15. 一种拟态交换机,包括多个异构执行体、拟态调度器和交换芯片;
    所述拟态调度器包括拟态判决模块和拟态恢复模块,所述拟态判决模块连接多个所述异构执行体,所述拟态恢复模块连接所述交换芯片;
    所述拟态交换机配置为执行如权利要求1-12中任意一项所述的拟态交换机中异构执行体的清洗恢复方法。
PCT/CN2020/125201 2019-11-27 2020-10-30 拟态交换机中异构执行体的清洗恢复方法、装置和拟态交换机 WO2021103930A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/780,174 US20230007044A1 (en) 2019-11-27 2020-10-30 Cleaning recovery method and device for heterogeneous executor in mimicry switch, and mimicry switch

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911179831.9 2019-11-27
CN201911179831.9A CN111049677B (zh) 2019-11-27 2019-11-27 拟态交换机异构执行体的清洗恢复方法和装置

Publications (1)

Publication Number Publication Date
WO2021103930A1 true WO2021103930A1 (zh) 2021-06-03

Family

ID=70233808

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/125201 WO2021103930A1 (zh) 2019-11-27 2020-10-30 拟态交换机中异构执行体的清洗恢复方法、装置和拟态交换机

Country Status (3)

Country Link
US (1) US20230007044A1 (zh)
CN (1) CN111049677B (zh)
WO (1) WO2021103930A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113378151A (zh) * 2021-06-23 2021-09-10 上海红阵信息科技有限公司 基于拟态构造的统一身份认证系统及认证方法
CN115658983A (zh) * 2022-12-13 2023-01-31 井芯微电子技术(天津)有限公司 一种判决验证的方法及系统

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111049677B (zh) * 2019-11-27 2021-11-23 网络通信与安全紫金山实验室 拟态交换机异构执行体的清洗恢复方法和装置
CN111624869B (zh) * 2020-04-25 2023-03-28 中国人民解放军战略支援部队信息工程大学 自动感知攻击行为方法、系统及以太网交换机
CN113630264B (zh) * 2020-05-08 2024-02-27 中国人民解放军61062部队 一种拟态网络设备现网部署的组网方法及系统
CN111314214B (zh) * 2020-05-11 2020-08-18 之江实验室 一种拟态工业边缘网关及拟态处理方法
CN111371907B (zh) * 2020-05-26 2020-08-14 网络通信与安全紫金山实验室 一种基于stp协议的数据同步方法、装置和拟态交换机
CN111884996B (zh) * 2020-06-12 2022-04-08 中国人民解放军战略支援部队信息工程大学 一种基于可信度量的拟态交换机裁决系统及方法
CN111885022B (zh) * 2020-07-09 2023-06-20 河南信大网御科技有限公司 基于通信接口的拟态通信方法、通信系统及终端设备
CN111885021A (zh) * 2020-07-09 2020-11-03 河南信大网御科技有限公司 基于传输协议的拟态通信方法、通信架构及可读存储介质
CN112118219B (zh) * 2020-07-29 2023-03-24 天津芯海创科技有限公司 拟态判决方法、装置、电子设备及计算机可读存储介质
CN112134850B (zh) * 2020-08-28 2022-12-13 河南信大网御科技有限公司 一种拟态执行体命令行状态恢复方法
CN111752730B (zh) * 2020-08-31 2020-12-04 网络通信与安全紫金山实验室 一种拟态调度判决方法、拟态调度器及可读存储介质
CN112162866B (zh) * 2020-08-31 2023-02-24 中国人民解放军战略支援部队信息工程大学 基于相对时间的异构执行体程序同步方法及装置
CN111866030B (zh) * 2020-09-21 2021-01-05 之江实验室 一种拟态边缘网关的工业协议识别装置及方法
CN112383527B (zh) * 2020-11-09 2021-12-17 浙江大学 一种拟态waf的执行体自愈方法
CN112491905B (zh) * 2020-12-01 2023-05-05 郑州昂视信息科技有限公司 网络设备的性能测试方法、装置及系统
CN112615862B (zh) * 2020-12-18 2022-08-05 网络通信与安全紫金山实验室 一种基于拟态防御的攻击防御装置、方法、设备和介质
CN112615880B (zh) * 2020-12-27 2022-11-08 郑州昂视信息科技有限公司 执行体的负反馈调度方法以及调度系统
CN112929208B (zh) * 2021-01-25 2022-02-11 浙江大学 一种拟态虚拟交换机的同分异构体裁决方法
CN113973008B (zh) * 2021-09-28 2023-06-02 佳源科技股份有限公司 基于拟态技术和机器学习的检测系统、方法、设备及介质
CN113839823B (zh) * 2021-11-25 2022-03-25 之江实验室 一种异构运算单元运行管理的方法
CN116893663B (zh) * 2023-09-07 2024-01-09 之江实验室 一种主控异常检测方法、装置、存储介质及电子设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1229448A2 (en) * 2001-01-31 2002-08-07 Hewlett-Packard Company Redundant backup device and method
CN109932891A (zh) * 2019-03-12 2019-06-25 天津芯海创科技有限公司 一种异构冗余的拟态mcu
CN110177080A (zh) * 2019-04-18 2019-08-27 中国人民解放军战略支援部队信息工程大学 拟态交换机、网络设备及系统
CN110417738A (zh) * 2019-06-26 2019-11-05 天津芯海创科技有限公司 一种内生安全系统调度器实现装置及实现方法
CN111049677A (zh) * 2019-11-27 2020-04-21 网络通信与安全紫金山实验室 拟态交换机异构执行体的清洗恢复方法和装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9652336B2 (en) * 2015-03-13 2017-05-16 International Business Machines Corporation Resilient programming frameworks for handling failures in parallel programs
CN106161417B (zh) * 2015-06-01 2019-05-14 上海红神信息技术有限公司 一种异构功能等价体调度装置及其方法
CN105791279B (zh) * 2016-02-29 2018-12-18 中国人民解放军信息工程大学 一种拟态化sdn控制器构建方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1229448A2 (en) * 2001-01-31 2002-08-07 Hewlett-Packard Company Redundant backup device and method
CN109932891A (zh) * 2019-03-12 2019-06-25 天津芯海创科技有限公司 一种异构冗余的拟态mcu
CN110177080A (zh) * 2019-04-18 2019-08-27 中国人民解放军战略支援部队信息工程大学 拟态交换机、网络设备及系统
CN110417738A (zh) * 2019-06-26 2019-11-05 天津芯海创科技有限公司 一种内生安全系统调度器实现装置及实现方法
CN111049677A (zh) * 2019-11-27 2020-04-21 网络通信与安全紫金山实验室 拟态交换机异构执行体的清洗恢复方法和装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113378151A (zh) * 2021-06-23 2021-09-10 上海红阵信息科技有限公司 基于拟态构造的统一身份认证系统及认证方法
CN115658983A (zh) * 2022-12-13 2023-01-31 井芯微电子技术(天津)有限公司 一种判决验证的方法及系统

Also Published As

Publication number Publication date
US20230007044A1 (en) 2023-01-05
CN111049677B (zh) 2021-11-23
CN111049677A (zh) 2020-04-21

Similar Documents

Publication Publication Date Title
WO2021103930A1 (zh) 拟态交换机中异构执行体的清洗恢复方法、装置和拟态交换机
US10020980B2 (en) Arbitration processing method after cluster brain split, quorum storage apparatus, and system
CN110380961B (zh) 一种传统路由器拟态化改造的装置及方法
US10560315B2 (en) Method and device for processing failure in at least one distributed cluster, and system
US10970108B2 (en) Method and apparatus for executing non-maskable interrupt
US10389576B2 (en) Method for operating a distributed computing system and a distributed computing system
CN113315755B (zh) 一种基于策略的拟态裁决系统及方法
CN102364448A (zh) 一种计算机故障管理系统的容错方法
CN109932891A (zh) 一种异构冗余的拟态mcu
CN110865907A (zh) 在主服务器与从服务器之间提供服务冗余的方法和系统
US8935562B2 (en) Failover of interrelated services on multiple devices
CN109062753A (zh) 一种硬盘监控系统以及监控方法
US8332069B2 (en) Fault tolerance method and apparatus for robot software component
JP2009129409A (ja) 障害回復方法、計算機、クラスタシステム、管理計算機及び障害回復プログラム
CN112527567A (zh) 系统容灾方法、装置、设备以及存储介质
US20130223206A1 (en) Redundant ring automatic recovery
CN113098882A (zh) 基于博弈论的网络空间拟态防御方法、装置、介质及终端
US20030014516A1 (en) Recovery support for reliable messaging
US8392751B2 (en) System and method for recovery from uncorrectable bus errors in a teamed NIC configuration
CN115755570A (zh) 多冗余度异构调度裁决器的调度裁决方法及装置
CN103150236B (zh) 面向进程失效错误的并行通信库状态自恢复方法
JP2018147510A (ja) サーバ装置およびサーバシステム
CN111984376B (zh) 协议处理方法、装置、设备及计算机可读存储介质
WO2024119777A1 (zh) 框式设备通信链路异常处理方法、框式设备及介质
Bawa et al. Comparative analysis of fault tolerance techniques in grid environment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20894726

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20894726

Country of ref document: EP

Kind code of ref document: A1