WO2021248740A1 - Mimic router execution entity scheduling method, and mimic router - Google Patents

Mimic router execution entity scheduling method, and mimic router Download PDF

Info

Publication number
WO2021248740A1
WO2021248740A1 PCT/CN2020/117989 CN2020117989W WO2021248740A1 WO 2021248740 A1 WO2021248740 A1 WO 2021248740A1 CN 2020117989 W CN2020117989 W CN 2020117989W WO 2021248740 A1 WO2021248740 A1 WO 2021248740A1
Authority
WO
WIPO (PCT)
Prior art keywords
executive
credibility
combination
mimic
router
Prior art date
Application number
PCT/CN2020/117989
Other languages
French (fr)
Chinese (zh)
Inventor
夏慧莉
张进
江逸茗
马海龙
伊鹏
朱绪全
Original Assignee
网络通信与安全紫金山实验室
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 网络通信与安全紫金山实验室 filed Critical 网络通信与安全紫金山实验室
Publication of WO2021248740A1 publication Critical patent/WO2021248740A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Definitions

  • the invention relates to the technical field of network communication, and more specifically, to a mimic router executive body scheduling method and a mimic router.
  • the cyberspace domain is the same as nature, including known unknown risks and unknown unknown threats.
  • the commonly used cyber security defense technologies include authentication technology, digital encryption technology, firewall technology, and intrusion. Detection system, virtual private network technology, hacker deception technology, honeypot, etc.
  • mimic defense theory has emerged.
  • the mimic defense theory is a highly reliable, highly available, and highly credible information system. At present, the mimic defense theory is widely used in network core equipment such as storage, DNS servers, switches, routers, and WEB servers.
  • mimic defense structure The three important characteristics of mimic defense structure are dynamics, diversity, and redundancy, that is, to construct multiple functionally equivalent and structured multi-executive environments, and make full use of dynamics, Diversity and randomness hide various "dark functions" in the executive body, increase the difficulty for attackers to scan system vulnerabilities and backdoors, and make it difficult for attackers to establish a continuous and reliable attack chain.
  • the router is an important device connected to the network and plays the role of network data packet forwarding. Once the router is attacked, the network data is very likely to be tampered with or lost, which poses a great threat to the security of the network.
  • a mimic structure is added on the basis of traditional routers, that is, mimic routers.
  • the mimic router adopts a dynamic heterogeneous redundancy mechanism, inheriting the three characteristics of mimic dynamics, heterogeneity, and redundancy. The key point of the three characteristics is how to achieve dynamics in the face of attacks, that is, to change the executive body presented to the outside from time to time. .
  • the realization of the dynamics and diversity of the executive body is in the scheduling unit.
  • the main function of the dynamic scheduling unit for the network scheduling unit is to manage the operation of the heterogeneous execution body pool and its function subpools. According to the scheduling strategy specified by the decision-making unit, it can schedule multiple heterogeneous function execution bodies to realize the dynamics of the function execution body. Sex and diversity increase the difficulty of scanning and discovery by attackers, and hide the visibility of unknown vulnerabilities and backdoors.
  • the key link in the design of dynamic scheduling unit is the scheduling strategy of the executive body.
  • Current scheduling strategies such as patent applications CN201611010128.1 or CN201910148526.7, are based on two random scheduling strategies based on executive credibility and executive weight.
  • the scheduling strategy based on executive credibility currently only considers the credibility of a single executive It does not consider the credibility of the entire system and the correlation between the executive bodies, and the overall stability and security are not enough.
  • the present invention provides a The mimic router executive body scheduling method and the mimic router increase the credibility of the executive body group and the correlation between the executive bodies, improve the accuracy of the system to monitor abnormal information, and improve the security of the system.
  • a mimic router executive body scheduling method includes the following steps:
  • Step 1 After the mimetic router is started, the executive body goes online, and the executive body data information is obtained.
  • the executive body is divided into ready state, working state and abnormal state; according to the execution degree attacked or working situation, the execution body will be in three types after going online. Switch between states;
  • Step 2 Calculate the credibility of the executive body based on the number of times the executive body has been attacked and the online duration of the executive body;
  • Step 3 Calculate the correlation between the executive bodies according to the proportion of the executive bodies being attacked at the same time
  • Step 4 Multiple executives with credibility and relevance that meet the conditions form an executive combination, calculate the average credibility of the executive combination, and calculate the average credibility of the executive combination to meet the condition. Combination, calculate the correlation coefficient of the executive body combination;
  • Step 5 According to the calculation results in step 2 to step 4, the decision execution body goes online or offline.
  • the scheduling strategy of the execution entity going online or offline is: selecting the execution entity and/or the combination of the execution entity with a high credibility value and a small correlation coefficient as the work execution entity.
  • the executive body of the working state is selected through the credibility calculation, and the reliability of the entire scheduling system is considered.
  • the executive body with similar structure, strong correlation and low average credibility should not be used as the working executive body at the same time. That is to say, when selecting the executive body as the working state executive body, select the executive body with high credibility according to the calculation result.
  • the high credibility of the executive body indicates that the executive body is less attacked and the state is stable and more reliable; correlation coefficient
  • the small description shows that the structural similarity between the executive bodies is low, and they can deal with many different types of attacks at the same time.
  • the current scheduling system When the average credibility of the executive body combination is lower than the critical credibility average, the current scheduling system is considered to be unreliable, and the work executive is re-selected. Otherwise, the current scheduling system is considered reliable.
  • the correlation of each executive body combination is calculated, that is, the relationship between each executive body in each executive body combination and the other executive bodies is calculated separately For the correlation, select the maximum value of the correlation coefficient among all the execution bodies in the combination of execution bodies, and the maximum value of the correlation coefficient of each execution body combination forms a combination of the maximum correlation coefficient, and select from the combination of the maximum correlation coefficient
  • the executive body combination with the smallest correlation coefficient is regarded as the work executive body combination, and the executive body combination is judged to be the optimal executive body combination.
  • the step of calculating the reliability of the formula R i is 2 Wherein ⁇ is the infinitely small value, t i being the number of attacks on the line for the period, T i is the total length on the line, i is the number of executable id.
  • is the infinitely small value
  • t i being the number of attacks on the line for the period
  • T i is the total length on the line
  • i is the number of executable id.
  • T AB is the time when the executive body A and the executive body B are in the working state at the same time
  • t AB is the number of times that the time difference between the executive body A and the executive body B is less than the time critical difference ⁇ t.
  • an executive whose credibility is lower than the critical credibility value requires offline cleaning and data rollback.
  • the executive is placed in an abnormal state.
  • the executive body in the abnormal state no longer participates in the work.
  • the execution body in the abnormal state is implemented with a cleaning strategy.
  • Setting a threshold confidence executable offline cleaning is R, R i when the executable reliability when R is equal to less than 10, this body is set to perform an abnormal state waiting for offline cleaning, data rewind operation; when When R i is greater than R or after cleaning, the executive body is placed in a ready state.
  • the execution body in the ready state is preferentially selected. If there is no executive body in the ready state in the state system, select among the executive bodies in the working state.
  • the executive body in the ready state is generally just launched or cleaned, and has high reliability. For example, there is no executive body in the ready state in the system during scheduling, or the executive body in the ready state does not meet the conditions of credibility or relevance, then it is in the working state To choose from the executive body, the credibility and relevance of the executive body need to be calculated at this time.
  • the mimic router selects the executive body as the working state according to the online sequence of the executive body, and the remaining executive bodies are placed in the ready state. After the execution body is online, according to the work requirements, all the execution bodies may not be placed in the working state. At this time, the execution bodies that have been successfully online and have not been placed in the working state are placed in the ready state.
  • the scheduling cycle if the work executive is attacked, the work executive is selected by calculating the credibility and correlation; if the work executive is not attacked, the credibility and correlation are calculated after the scheduling period ends. Select the executive body as the work executive body.
  • the scheduling cycle if the executive body is not attacked, or the credibility and relevance of the executive body still meet the conditions after the attack, the scheduling will be performed at the end of the current scheduling cycle; if the executive body is attacked, pass the credibility and The calculation of the correlation is scheduled, and the work execution body is reselected.
  • the scheduling method of the present invention when the credibility value of the executive body reaches the credibility critical value, the status of the executive body is modified to an abnormal state, and then the abnormal state executive body is offline cleaned and data rolled back, and the cleaned executive body is set to Ready state, when the execution body of the working state is attacked or the cycle time arrives, the state of the execution body is adjusted according to the scheduling strategy and the credibility of the execution body is calculated to increase the credibility of the execution body group and the correlation between the execution bodies.
  • the reliability of the executive body group guarantees the reliability of the executive body set in a working state during a scheduling period, and the correlation between the executive bodies prevents the executive bodies with strong scheduling correlation from working at the same time, so as to make full use of the heterogeneous characteristics of the executive bodies to ensure System security, improve the accuracy of system monitoring abnormal information.
  • a mimic router includes a dynamic scheduling subsystem, a route arbitration subsystem, a protocol proxy subsystem, and a configuration management protocol proxy subsystem.
  • the dynamic scheduling subsystem uses the mimic router executive scheduling method in combination.
  • the scheduling subsystem dynamically adjusts the status of the executive body and sends the status of the executive body to each subsystem.
  • Each subsystem determines whether the executive body participates in the business ruling based on the status information of the executive body. After the ruling, the executive body that produces inconsistent results will be Relevant information is fed back to the scheduling subsystem for the scheduling subsystem to determine the credibility of the executive body.
  • an executive body In a mimic router, an executive body is highly likely to be compromised by an attacker, but multiple executive bodies with the same function and structure but different structures are less likely to be compromised by the same attack method at the same time. Therefore, in the face of an attacker’s attack, increase the system
  • the performance of active defense adopts the organizational form of heterogeneous groups.
  • Heterogeneous groups can be composed of multiple virtual machines, multi-vendor routing simulation software, or a combination of virtual and real devices.
  • the scheduling method of the present invention performs scheduling of work executives by calculating the credibility of the executive body, the credibility of the heterogeneous groups and the correlation between the executive bodies, which better reflects the dynamics of the heterogeneous groups and improves the system performance safety.
  • the present invention increases the calculation and comprehensive consideration of the two determinants of the correlation between the executive bodies and the credibility of the executive body group.
  • the risk of the attack calculate the credibility value of the heterogeneous executor, the credibility value of the heterogeneous group, and the correlation between the heterogeneous executors.
  • the system finally decides whether the executor is subject to an abnormal attack or cycle based on the above calculation data.
  • the scheduling strategy in the case of flexible scheduling.
  • the credibility calculation of the executive body group ensures that it is in a working state during a scheduling period
  • the average value of the credibility of the executive body set not only ensures the safety of a single executive body, but also ensures the credibility and relevance of the combined executive body, that is, the executive body group, from the overall consideration.
  • the scheduling strategy is determined and calculated from the perspective of the correlation between the executive bodies and the executive body group, which improves the accuracy of the mimic router to monitor abnormal information and also improves the safety of the system.
  • Figure 1 is a block diagram of the scheduling strategy of the present invention
  • Figure 2 is a state switching diagram of the executive body of the present invention.
  • Figure 3 is a flow chart of the scheduling of the present invention.
  • This embodiment first introduces a mimic router, including dynamic scheduling subsystems, routing arbitration subsystems (ipv4, ipv6), protocol proxy subsystems (bgp, ospf, and other protocols), and configuration management protocol proxy subsystems (netconf, telnet, ssh) , Snmp and other protocols), the dynamic scheduling subsystem dynamically adjusts the status of the executive body, and sends the status of the executive body to the routing arbitration subsystem, the protocol proxy subsystem, and the configuration management subsystem.
  • Each subsystem is based on the status information of the executive body. Decide whether the executive body participates in the business adjudication. After the adjudication, for the executive body that produces inconsistent results, the relevant information is fed back to the dynamic scheduling subsystem for the dynamic scheduling subsystem to determine the feasibility of the executive body.
  • Ready state After the mimic defense system is started, the executive body that has been successfully started and has not participated in the scheduling of the various modules of the system, the executive body after offline cleaning from the abnormal state, and the executive body whose credibility value is greater than the credibility threshold are all set to Ready state.
  • Working status The executive bodies participating in the arbitration and scheduling of the subsystems of the system are all set to working status.
  • Abnormal state Execution entities whose credibility value is less than or equal to the credibility critical value, and those that are abnormal due to external factors such as software and hardware are all set to an abnormal state.
  • the executive body After the mimic defense system is activated, the executive body also starts to go online, and the online executive body realizes the switching of three states under corresponding circumstances. As shown in Figure 2, the executive body is in the working state during normal work. When the reliability of the executive body is higher than the critical value after a scheduling period, it switches to the ready state and waits for the next cycle of the scheduling strategy to continue working; when the executive body is available The executive body switches to the abnormal state after the reliability reaches the critical value or external factors interfere with the abnormal state. The executive body in the abnormal state will undergo offline cleaning and data rollback. The cleaned executive body will be placed in the ready state, and the executive body in the ready state will be set to the ready state. After the calculation is in accordance with the scheduling strategy, it is converted to a working state.
  • the dynamic scheduling strategy is shown in Figure 1, and is specifically divided into the following steps:
  • Step 1 Obtain the executive body data information sent on each subsystem
  • the executive bodies go online one by one, and the scheduling system chooses to put the executive bodies in the working state or the ready state according to the task requirements.
  • the scheduling system chooses to put the executive bodies in the working state or the ready state according to the task requirements.
  • the data and information related to the abnormal state are collected for later calculation of the credibility and correlation of the executive body.
  • Step 2 Calculate the credibility of the abnormal executive body
  • the credibility of the executive after being attacked calculates the credibility of the executive after being attacked, and set a credibility threshold for the off-line cleaning of the executive.
  • the credibility is less than or equal to the critical value
  • the executive Set to an abnormal state for offline cleaning and data rollback; when the credibility is greater than the critical value or after cleaning, the executive is placed in the ready state.
  • the execution body in the working state is abnormal, the execution body with high reliability is selected as the working execution body in the working state or the ready state.
  • Step 3 Calculate the correlation between the executive bodies
  • Each executive body is independent and heterogeneous. There is no correlation between the executive bodies, and the difficulty of being attacked is also different. Therefore, considering the reliability of the entire system, try not to make the structure similar when scheduling, and the correlation is strong.
  • the executive body at the same time as the work executive body. In order to find the possible similarities between executive bodies, you can conduct multiple scheduling experiments and summarize the regular characteristics of each executive body or between the executive bodies being attacked.
  • Step 4 Calculate the credibility of heterogeneous groups
  • step 3 the correlation of executives is calculated, and which executives are not suitable to be work executives at the same time. Under this premise, the calculation of the work executive group Reliability and correlation coefficient.
  • the calculated credibility of the work executor group is greater than or equal to the credibility threshold, determine the work executor The group is reliable, otherwise the judgment is unreliable.
  • the group of work executives is judged to be unreliable, re-select the executives in the working state and the ready state and calculate the credibility of the group, and find out the group of executives that meet the credibility of the group to be greater than or equal to the critical value of the credibility.
  • Step 5 Integrate the scheduling strategy from step 2 to step 4, and schedule the online or offline of the decision-making executive body. Combining the executive body credibility calculated in step 2, the executive body correlation coefficient calculated in step 3, and the work executive group credibility and correlation coefficient calculated in step 4, select the best executive body combination work.
  • the scheduling system obtains the abnormal data information sent by other subsystems on the mimic router, and calculates the credibility of the executive body, the credibility of the heterogeneous group and the correlation between the executive bodies according to the abnormal data information of the executive body, and the correlation between the executive bodies is calculated according to the calculated
  • the value is generated by the scheduling system to generate the corresponding scheduling strategy.
  • the executive body is divided into three data sets according to different states, among which:
  • N is all the online and offline executives in the executive pool, n+j+k ⁇ N.
  • periodic scheduling or scheduling under abnormal conditions is carried out according to the attack situation of the executive body during the working period.
  • the periodic scheduling is to set a scheduling period T.
  • the scheduling in the abnormal situation means that if the executive body in the current working state is attacked, the working executive body must be reselected. Regardless of whether it is periodic scheduling or scheduling under abnormal conditions, the following scheduling strategy must be followed for scheduling.
  • the specific scheduling policy rules are as follows: if there is an exception in the executive body in c 2 or periodic scheduling is required, the executive body that has not worked in c 1 is preferentially selected as the working executive body. For the executive body that has participated in the scheduling, it is determined whether to continue as a work executive body by calculating the credibility of the executive body and the correlation between the executive bodies.
  • the calculation rules for the credibility of the executive body, the correlation between the executive bodies, and the system credibility are as follows:
  • is the infinitely small value, t i being the number of attacks on the line for the period, T i is the total length on the line, i is the number of executable id.
  • R i The greater the value of R i , the greater the credibility of the executive body, on the contrary, the smaller the value of R i , the smaller the credibility of the executive body.
  • Set the credibility critical value of an executor offline cleaning to R when R i is less than or equal to R, put the executor into an abnormal state and put it in c 3 for offline cleaning and data rollback operations;
  • R i is greater than R or after cleaning, the executive is placed in the ready state and placed in c 1 ; when the work executive in c 2 is abnormal, the executive in c 1 and c 2 is selected as the work according to the strategy Executive body.
  • the average credibility of all work executives also affects the reliability of the scheduling system. First, exclude the executives in the abnormal state set c 3 that are to be cleaned offline, and calculate the correlation between the executives through step (2), and find which executives are not suitable to be work executives at the same time. Under this premise, the work executives are calculated. The credibility of the group and the correlation coefficient.
  • the specific algorithm is as follows: According to the credibility value of each executive body, calculate the average credibility M,
  • 1 ⁇ k ⁇ j, j is the number of the specified number of work executives.
  • Set W as the credibility critical value of the overall scheduling system.
  • M ⁇ W the scheduling system is considered to be reliable, otherwise it is considered unreliable, then reselect the executive body from c 1 and c 2 and calculate the average credibility Degree, find all executive body combinations that meet the condition of M ⁇ W.
  • Get the maximum correlation coefficient of each executive body combination i, j are the executor id (i ⁇ j) in the combination, n is the number of executors in the combination, the correlation calculation of the executor combination is to calculate each executor in each executor combination and the other executors separately correlation between, that is to say when the constant i, is sequentially changed j, Q i is calculated, and then change i, Q i value is calculated sequentially.
  • the maximum correlation coefficient of each executive body combination forms the maximum correlation coefficient combination.
  • this embodiment comprehensively calculates the credibility of the executive body, the correlation coefficient between the executive bodies and the average credibility between the executive body combinations, and the correlation coefficient between the executive bodies.
  • the calculation avoids putting highly correlated executive bodies to work together, and the average credibility of the executive body combinations guarantees the average credibility of the executive body set in a working state during a scheduling period, and improves the accuracy of monitoring abnormal information Degree and the security of the system.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Disclosed is a mimic router execution entity scheduling method and a mimic router, pertaining to the technical field of network communications. The invention aims to solve the problem of the prior art in which scheduling policies that are based on the reliability of execution entities only consider the reliability of each single execution entity and do not take into account the reliability of the entire system or correlations between execution entities, and accordingly adds two decision-making factors to existing scheduling policies, that is, the reliability of an execution entity group and correlations between execution entities. The method comprises: acquiring states and data information of execution entities; calculating respective reliability levels of the execution entities; calculating, according to the reliability levels of the execution entities, reliability levels of execution entity groups obtained by randomly combining execution entities having a reliability level greater than a threshold, and calculating correlations between the execution entities; generating a scheduling policy by integrating the above calculations; and lastly determining online or offline conditions of the execution entities. The invention improves the accuracy of detecting abnormal information in a system, thereby improving system security.

Description

一种拟态路由器执行体调度方法和拟态路由器A mimic router executive body scheduling method and mimic router 技术领域Technical field
本发明涉及网络通信技术领域,更具体地说,涉及一种拟态路由器执行体调度方法和拟态路由器。The invention relates to the technical field of network communication, and more specifically, to a mimic router executive body scheduling method and a mimic router.
背景技术Background technique
网络空间领域同大自然一样存在着包括已知的未知风险和未知的未知威胁,面对这些网络威胁、漏洞和后门等,常用的网络安全防御技术有认证技术、数字加密技术、防火墙技术、入侵检测系统、虚拟专用网技术、黑客诱骗技术、蜜罐等。但是随着“万物互联”、云计算、大数据时代的到来,微电子以及虚拟化技术的不断进步,网络空间安全防御性能的不断提高,拟态防御理论应运而生。拟态防御理论是一种高可靠、高可用、高可信的信息系统,目前拟态防御理论广泛应用于存储器、DNS服务器、交换机、路由器、WEB服务器等网络核心设备。拟态防御结构的三个重要特性是动态性、多样性、冗余性,即构建多个功能等价、结构不同的多执行体环境,在保证系统功能不变的条件下,充分利用动态性、多样性、随机性来隐藏执行体内部存在的各种“暗功能”,增加攻击者扫描系统漏洞与后门的难度,使得攻击者难以建立连续可靠的攻击链。The cyberspace domain is the same as nature, including known unknown risks and unknown unknown threats. In the face of these cyber threats, vulnerabilities and backdoors, the commonly used cyber security defense technologies include authentication technology, digital encryption technology, firewall technology, and intrusion. Detection system, virtual private network technology, hacker deception technology, honeypot, etc. However, with the advent of the "Internet of Everything", cloud computing, and big data era, the continuous advancement of microelectronics and virtualization technologies, and the continuous improvement of cyberspace security defense performance, mimic defense theory has emerged. The mimic defense theory is a highly reliable, highly available, and highly credible information system. At present, the mimic defense theory is widely used in network core equipment such as storage, DNS servers, switches, routers, and WEB servers. The three important characteristics of mimic defense structure are dynamics, diversity, and redundancy, that is, to construct multiple functionally equivalent and structured multi-executive environments, and make full use of dynamics, Diversity and randomness hide various "dark functions" in the executive body, increase the difficulty for attackers to scan system vulnerabilities and backdoors, and make it difficult for attackers to establish a continuous and reliable attack chain.
路由器是连接网络的重要设备,起到网络数据报文转发的作用,路由器一旦受到攻击,则网络数据极有可能遭到篡改或者丢失,对于网络的安全性造成极大的威胁。面对路由器这种后门隐藏深、可用漏洞多等安全性问题,则在传统路由器的基础上增加拟态结构即拟态路由器。拟态路由器采用动态异构冗余机制,继承拟态动态性、异构性、冗余性三大特性,三大特性关键点是面对攻击如何实现动态性,即不定时的改变对外呈现的执行体。The router is an important device connected to the network and plays the role of network data packet forwarding. Once the router is attacked, the network data is very likely to be tampered with or lost, which poses a great threat to the security of the network. In the face of security problems such as routers, such as deep hidden backdoors and many available loopholes, a mimic structure is added on the basis of traditional routers, that is, mimic routers. The mimic router adopts a dynamic heterogeneous redundancy mechanism, inheriting the three characteristics of mimic dynamics, heterogeneity, and redundancy. The key point of the three characteristics is how to achieve dynamics in the face of attacks, that is, to change the executive body presented to the outside from time to time. .
在拟态路由器中执行体动态性、多样性的实现是在调度单元。动态调度单元对于网络调度单元的主要功能是管理异构执行体池及其功能子池内执行体的运行,按照决策单元指定的调度策略,调度多个异构功能执行体,实现功能执行体的动态性和多样性,增加攻击者扫描发现的难度,隐藏未知漏洞和后门的可见程度。In the mimic router, the realization of the dynamics and diversity of the executive body is in the scheduling unit. The main function of the dynamic scheduling unit for the network scheduling unit is to manage the operation of the heterogeneous execution body pool and its function subpools. According to the scheduling strategy specified by the decision-making unit, it can schedule multiple heterogeneous function execution bodies to realize the dynamics of the function execution body. Sex and diversity increase the difficulty of scanning and discovery by attackers, and hide the visibility of unknown vulnerabilities and backdoors.
动态调度单元设计的关键环节是执行体的调度策略。目前的调度策略如专利申请CN201611010128.1或CN201910148526.7,基于执行体可信度和执行体权重的两种随机调度策略,基于执行体可信度的调度策略目前只考虑单个执行体的可信度,并没有考虑整个系统的可信度和执行体间的相关性,整体的稳定性和安全性不够。The key link in the design of dynamic scheduling unit is the scheduling strategy of the executive body. Current scheduling strategies, such as patent applications CN201611010128.1 or CN201910148526.7, are based on two random scheduling strategies based on executive credibility and executive weight. The scheduling strategy based on executive credibility currently only considers the credibility of a single executive It does not consider the credibility of the entire system and the correlation between the executive bodies, and the overall stability and security are not enough.
发明内容Summary of the invention
1.要解决的技术问题1. Technical problems to be solved
针对现有技术中存在的基于执行体可信度的调度策略只考虑单个执行体的可信度,并没有考虑整个系统的可信度和执行体之间相关性的问题,本发明提供一种拟态路由器执行体调度方法和拟态路由器,增加执行体群体的可信度以及执行体间的相关性,提高系统监测异常信息的准确度,提高系统的安全性。In view of the existing scheduling strategy based on the credibility of the executive body in the prior art, only the credibility of a single executive body is considered, and the credibility of the entire system and the correlation between the executive bodies are not considered. The present invention provides a The mimic router executive body scheduling method and the mimic router increase the credibility of the executive body group and the correlation between the executive bodies, improve the accuracy of the system to monitor abnormal information, and improve the security of the system.
2.技术方案2. Technical solution
本发明的目的通过以下技术方案实现。The purpose of the present invention is achieved through the following technical solutions.
一种拟态路由器执行体调度方法,包括以下步骤:A mimic router executive body scheduling method includes the following steps:
步骤1:拟态路由器启动后,执行体上线,获取执行体数据信息,所述执行体分为就绪状态、工作状态和异常状态;根据执行度受攻击情况或工作情况,执行体上线后在三种状态之间切换;Step 1: After the mimetic router is started, the executive body goes online, and the executive body data information is obtained. The executive body is divided into ready state, working state and abnormal state; according to the execution degree attacked or working situation, the execution body will be in three types after going online. Switch between states;
步骤2:根据执行体受到攻击的次数与执行体的上线时长计算执行体的可信度;Step 2: Calculate the credibility of the executive body based on the number of times the executive body has been attacked and the online duration of the executive body;
步骤3:根据执行体同时受到攻击的比例计算执行体间的相关性;Step 3: Calculate the correlation between the executive bodies according to the proportion of the executive bodies being attacked at the same time;
步骤4:多个可信度和相关性均满足条件的执行体组成执行体组合,计算所述执行体组合的可信度平均值,对执行体组合的可信度平均值满足条件的执行体组合,计算该执行体组合的相关性系数;Step 4: Multiple executives with credibility and relevance that meet the conditions form an executive combination, calculate the average credibility of the executive combination, and calculate the average credibility of the executive combination to meet the condition. Combination, calculate the correlation coefficient of the executive body combination;
步骤5:根据步骤2至步骤4中计算结果,决策执行体上线或者下线。Step 5: According to the calculation results in step 2 to step 4, the decision execution body goes online or offline.
更进一步的,步骤5中执行体上线或下线的调度策略为:选择可信度值高和相关性系数小的执行体和/或执行体组合作为工作执行体。通过可信度计算选择工作状态的执行体,同时考虑整个调度系统的可靠性,在调度时尽可能不把结构相似、相关性强、平均可信度低的执行体同时作为工作执行体。也就是说,在选择执行体为工作状态执行体时,根据计算结果选择可信度高的执行体,执行体可信度高说明该执行体受攻击次数少,状态稳定更可靠;相关性系数小说明执行体之间结构相似度低,可以同时应对多种不同种类的攻击。Furthermore, in step 5, the scheduling strategy of the execution entity going online or offline is: selecting the execution entity and/or the combination of the execution entity with a high credibility value and a small correlation coefficient as the work execution entity. The executive body of the working state is selected through the credibility calculation, and the reliability of the entire scheduling system is considered. When scheduling, the executive body with similar structure, strong correlation and low average credibility should not be used as the working executive body at the same time. That is to say, when selecting the executive body as the working state executive body, select the executive body with high credibility according to the calculation result. The high credibility of the executive body indicates that the executive body is less attacked and the state is stable and more reliable; correlation coefficient The small description shows that the structural similarity between the executive bodies is low, and they can deal with many different types of attacks at the same time.
更进一步的,步骤4中计算执行体组合的相关性时,需先计算执行体组合的可信度平均值M,
Figure PCTCN2020117989-appb-000001
其中1≤k≤j,j为规定数目工作执行体的数量,R i为单个执行体的可信度值;若执行体组合的可信度平均值低于临界可信度平均值,重新选择执行体组合;计算所有满足可信度条件的执行体组合的相关性,即,针对所有满足可信度条件的执行体组合,分别计算每个执行体组合中的每个执行体与其他各执行体之间的相关性,从中挑选出相关性系数最大值,形成相关性系数最大值组合,从相关性系数最大值组合中选择相关性系数 最小的执行体组合作为工作执行体组合。
Furthermore, when calculating the relevance of the executive body combination in step 4, it is necessary to first calculate the credibility average M of the executive body combination.
Figure PCTCN2020117989-appb-000001
Where 1≤k≤j, j is the number of the specified number of work executives, and R i is the credibility value of a single executive; if the credibility average of the executive combination is lower than the critical credibility average, reselect Execution body combination; calculate the correlation of all execution body combinations that meet the credibility condition, that is, for all execution body combinations that meet the credibility condition, calculate each execution body in each execution body combination and other executions For the correlation between entities, select the maximum correlation coefficient from it to form a combination of the maximum correlation coefficient, and select the executive combination with the smallest correlation coefficient from the combination of the maximum correlation coefficient as the work executive combination.
执行体组合的可信度平均值低于临界可信度平均值时,认为当前调度系统不可靠,重新选择工作执行体,反之认为当前调度系统是可靠的。多个执行体组合均满足可信度条件判断为可靠执行体组合时,计算每个执行体组合的相关性,即分别计算每个执行体组合中的每个执行体与其他各执行体之间的相关性,选择执行体组合中所有执行体之间计算相关性系数最大值,每个执行体组合的相关性系数最大值形成一个相关性系数最大值组合,从相关性系数最大值组合中选择相关性系数最小的执行体组合作为工作执行体组合,该执行体组合判断为最优执行体组合。When the average credibility of the executive body combination is lower than the critical credibility average, the current scheduling system is considered to be unreliable, and the work executive is re-selected. Otherwise, the current scheduling system is considered reliable. When multiple executive body combinations meet the credibility conditions and judged to be a reliable executive body combination, the correlation of each executive body combination is calculated, that is, the relationship between each executive body in each executive body combination and the other executive bodies is calculated separately For the correlation, select the maximum value of the correlation coefficient among all the execution bodies in the combination of execution bodies, and the maximum value of the correlation coefficient of each execution body combination forms a combination of the maximum correlation coefficient, and select from the combination of the maximum correlation coefficient The executive body combination with the smallest correlation coefficient is regarded as the work executive body combination, and the executive body combination is judged to be the optimal executive body combination.
更进一步的,步骤2中可信度R i的计算公式为
Figure PCTCN2020117989-appb-000002
其中ε为无限小值,t i为上线期间受到攻击的次数,T i为上线总时长,i为执行体的编号id。R i的值越大,执行体可信度越大,相反R i的值越小,执行体可信度越小。
Still further, the step of calculating the reliability of the formula R i is 2
Figure PCTCN2020117989-appb-000002
Wherein ε is the infinitely small value, t i being the number of attacks on the line for the period, T i is the total length on the line, i is the number of executable id. The greater the value of R i , the greater the credibility of the executive body, on the contrary , the smaller the value of R i , the smaller the credibility of the executive body.
更进一步的,步骤3中相关性q AB的计算公式为
Figure PCTCN2020117989-appb-000003
其中T AB为执行体A和执行体B同时处于工作状态时间,t AB为执行体A和执行体B受到攻击的时间差值小于时间临界差值Δt的次数。计算时Δt尽可能的小。如果T AB=0或者t AB=0则认为执行体A和执行体B不相关,q AB=0。设置一个相关性系数临界值q,如果q AB≥q执行体组合的相关性系数较大,则在调度过程中不把A和B同时作为工作执行体,反之可以将A和B同时作为工作执行体。
Furthermore, the calculation formula of correlation q AB in step 3 is
Figure PCTCN2020117989-appb-000003
Among them, T AB is the time when the executive body A and the executive body B are in the working state at the same time, and t AB is the number of times that the time difference between the executive body A and the executive body B is less than the time critical difference Δt. When calculating Δt as small as possible. If T AB =0 or t AB =0, it is considered that executive body A and executive body B are not related, and q AB =0. Set a correlation coefficient critical value q, if the correlation coefficient of q AB ≥ q executive body combination is large, then in the scheduling process, A and B will not be used as work executive bodies at the same time, otherwise, A and B can be used as work executive bodies at the same time body.
更进一步的,执行体可信度低于临界可信度值的执行体需下线清洗与数据回滚,此时执行体置为异常状态。异常状态的执行体不再参与工作,为提高系统的安全性,对异常状态的执行体执行清洗策略。设置一个执行体下线清洗的可信度临界值为R,当执行体可信度R i小于等于R时,则将此执行体置成异常状态等待进行下线清洗、数据回滚操作;当R i大于R时或者进行清洗之后,该执行体置成就绪状态。 Furthermore, an executive whose credibility is lower than the critical credibility value requires offline cleaning and data rollback. At this time, the executive is placed in an abnormal state. The executive body in the abnormal state no longer participates in the work. In order to improve the safety of the system, the execution body in the abnormal state is implemented with a cleaning strategy. Setting a threshold confidence executable offline cleaning is R, R i when the executable reliability when R is equal to less than 10, this body is set to perform an abnormal state waiting for offline cleaning, data rewind operation; when When R i is greater than R or after cleaning, the executive body is placed in a ready state.
更进一步的,选择执行体作为工作执行体时优先选择就绪状态的执行体。若该状态系统中没有就绪状态的执行体,则在工作状态的执行体中进行选择。就绪状态的执行体一般为刚上线或刚清洗过,可靠性高,如调度时系统中没有就绪状态的执行体,或者就绪状态的执行体可信度或相关性不满足条件,则在工作状态的执行体中进行选择,此时需对该执行体的可信度和相关性进行计算。Furthermore, when selecting the execution body as the work execution body, the execution body in the ready state is preferentially selected. If there is no executive body in the ready state in the state system, select among the executive bodies in the working state. The executive body in the ready state is generally just launched or cleaned, and has high reliability. For example, there is no executive body in the ready state in the system during scheduling, or the executive body in the ready state does not meet the conditions of credibility or relevance, then it is in the working state To choose from the executive body, the credibility and relevance of the executive body need to be calculated at this time.
更进一步的,拟态路由器启动后根据执行体上线顺序选择作为工作状态的执行体,剩余执行体置为就绪状态。执行体上线后根据工作需求,并不一定会将所有执行体均置为工作状 态,此时将成功上线且没有置为工作状态的执行体置为就绪状态。Furthermore, after the mimic router is started, it selects the executive body as the working state according to the online sequence of the executive body, and the remaining executive bodies are placed in the ready state. After the execution body is online, according to the work requirements, all the execution bodies may not be placed in the working state. At this time, the execution bodies that have been successfully online and have not been placed in the working state are placed in the ready state.
更进一步的,在调度周期内:若工作执行体受到攻击,通过计算可信度和相关性选择工作执行体;若工作执行体没有受到攻击,在该调度周期结束后通过计算可信度和相关性选择执行体作为工作执行体。在一个调度周期内,如执行体没有受到攻击,或攻击后执行体的可信度和相关性仍满足条件,则在当前调度周期结束再进行调度;如执行体受到攻击,通过可信度和相关性的计算进行调度,重新选择工作执行体。Furthermore, in the scheduling cycle: if the work executive is attacked, the work executive is selected by calculating the credibility and correlation; if the work executive is not attacked, the credibility and correlation are calculated after the scheduling period ends. Select the executive body as the work executive body. In a scheduling cycle, if the executive body is not attacked, or the credibility and relevance of the executive body still meet the conditions after the attack, the scheduling will be performed at the end of the current scheduling cycle; if the executive body is attacked, pass the credibility and The calculation of the correlation is scheduled, and the work execution body is reselected.
本发明调度方法当执行体可信度值达到可信度临界值,修改执行体的状态为异常状态稍后将异常状态执行体进行下线清洗与数据回滚,将清洗之后的执行体置成就绪状态,当工作状态的执行体受到攻击或者周期时间到达之后,根据调度策略调整执行体的状态并计算执行体的可信度,增加执行体群体的可信度以及执行体间的相关性,执行体群体的可靠性保证在一次调度期内处于工作状态执行体集合的可靠性,执行体间的相关性避免调度相关性强的执行体同时工作,从而充分利用执行体的异构特性以保证系统安全,提高系统监测异常信息的准确度。In the scheduling method of the present invention, when the credibility value of the executive body reaches the credibility critical value, the status of the executive body is modified to an abnormal state, and then the abnormal state executive body is offline cleaned and data rolled back, and the cleaned executive body is set to Ready state, when the execution body of the working state is attacked or the cycle time arrives, the state of the execution body is adjusted according to the scheduling strategy and the credibility of the execution body is calculated to increase the credibility of the execution body group and the correlation between the execution bodies. The reliability of the executive body group guarantees the reliability of the executive body set in a working state during a scheduling period, and the correlation between the executive bodies prevents the executive bodies with strong scheduling correlation from working at the same time, so as to make full use of the heterogeneous characteristics of the executive bodies to ensure System security, improve the accuracy of system monitoring abnormal information.
一种拟态路由器,包括动态调度子系统、路由裁决子系统、协议代理子系统和配置管理协议代理子系统,所述动态调度子系统组合使用所述的一种拟态路由器执行体调度方法。调度子系统动态调整执行体的状态,并将执行体状态发送给各个子系统,各个子系统根据执行体的状态信息决定执行体是否参与业务的裁决,裁决之后对于产生不一致结果的执行体,将相关信息反馈给调度子系统,供调度子系统进行执行体的可信度判决。A mimic router includes a dynamic scheduling subsystem, a route arbitration subsystem, a protocol proxy subsystem, and a configuration management protocol proxy subsystem. The dynamic scheduling subsystem uses the mimic router executive scheduling method in combination. The scheduling subsystem dynamically adjusts the status of the executive body and sends the status of the executive body to each subsystem. Each subsystem determines whether the executive body participates in the business ruling based on the status information of the executive body. After the ruling, the executive body that produces inconsistent results will be Relevant information is fed back to the scheduling subsystem for the scheduling subsystem to determine the credibility of the executive body.
在拟态路由器中,一个执行体被攻击者攻破的可能性大,但是功能相同结构不同的多执行体被同种攻击方法同时攻破的可能性就很小,因此面对攻击者的攻击,增加系统主动防御的性能,采用异构群体的组织形式。异构群体可以由多个虚拟机、多厂商的路由仿真软件或者虚实设备结合构成。本发明所述调度方法通过计算执行体的可信度、异构群体的可信度以及执行体间的相关性进行工作执行体的调度,更好的体现异构群体的动态性,提高系统的安全性。In a mimic router, an executive body is highly likely to be compromised by an attacker, but multiple executive bodies with the same function and structure but different structures are less likely to be compromised by the same attack method at the same time. Therefore, in the face of an attacker’s attack, increase the system The performance of active defense adopts the organizational form of heterogeneous groups. Heterogeneous groups can be composed of multiple virtual machines, multi-vendor routing simulation software, or a combination of virtual and real devices. The scheduling method of the present invention performs scheduling of work executives by calculating the credibility of the executive body, the credibility of the heterogeneous groups and the correlation between the executive bodies, which better reflects the dynamics of the heterogeneous groups and improves the system performance safety.
3.有益效果3. Beneficial effects
相比于现有技术,本发明的优点在于:Compared with the prior art, the advantages of the present invention are:
本发明在现有的调度策略计算单个执行体可信度的基础上,增加执行体间的相关性和执行体群体的可信度两个决定因素的计算和综合考虑,依据异构执行体受到攻击的风险情况,计算异构执行体的可信度值、异构群体的可信度值、异构执行体间的相关性,系统根据上面的计算数据最终决策执行体在受到异常攻击或者周期性调度情况下的调度策略。On the basis of the existing scheduling strategy to calculate the credibility of a single executive body, the present invention increases the calculation and comprehensive consideration of the two determinants of the correlation between the executive bodies and the credibility of the executive body group. The risk of the attack, calculate the credibility value of the heterogeneous executor, the credibility value of the heterogeneous group, and the correlation between the heterogeneous executors. The system finally decides whether the executor is subject to an abnormal attack or cycle based on the above calculation data. The scheduling strategy in the case of flexible scheduling.
在计算单个执行体可信度的前提下,计算执行体的相关性,避免将相关性强的执行体放 在一起的概率;执行体群体的可信度计算保证在一次调度期内处于工作状态执行体集合的可信度平均值,不仅确保单个执行体的安全性,还从整体考虑,确保组合执行体,也就是执行体群体间的可信度和相关性。通过本发明调度方法决策调度策略,从执行体之间的相关性与执行体群体角度计算,提高拟态路由器监测异常信息的准确度,还提高系统的安全性。On the premise of calculating the credibility of a single executive body, calculate the relevance of the executive body to avoid the probability of putting together highly correlated executive bodies; the credibility calculation of the executive body group ensures that it is in a working state during a scheduling period The average value of the credibility of the executive body set not only ensures the safety of a single executive body, but also ensures the credibility and relevance of the combined executive body, that is, the executive body group, from the overall consideration. Through the scheduling method of the present invention, the scheduling strategy is determined and calculated from the perspective of the correlation between the executive bodies and the executive body group, which improves the accuracy of the mimic router to monitor abnormal information and also improves the safety of the system.
附图说明Description of the drawings
图1为本发明的调度策略框图;Figure 1 is a block diagram of the scheduling strategy of the present invention;
图2为本发明执行体状态切换图;Figure 2 is a state switching diagram of the executive body of the present invention;
图3为本发明的调度流程图。Figure 3 is a flow chart of the scheduling of the present invention.
具体实施方式detailed description
下面结合说明书附图和具体的实施例,对本发明作详细描述。The present invention will be described in detail below in conjunction with the drawings and specific embodiments of the specification.
实施例1Example 1
本实施例先介绍一种拟态路由器,包括动态调度子系统、路由裁决子系统(ipv4、ipv6)、协议代理子系统(bgp、ospf等协议)和配置管理协议代理子系统(netconf、telnet、ssh、snmp等协议),所述动态调度子系统动态调整执行体的状态,并将执行体状态发送给路由裁决子系统、协议代理子系统和配置管理子系统,各子系统根据执行体的状态信息决定执行体是否参与业务的裁决,裁决之后对于产生不一致结果的执行体,将相关信息反馈给动态调度子系统,供动态调度子系统进行执行体的可行度判决。This embodiment first introduces a mimic router, including dynamic scheduling subsystems, routing arbitration subsystems (ipv4, ipv6), protocol proxy subsystems (bgp, ospf, and other protocols), and configuration management protocol proxy subsystems (netconf, telnet, ssh) , Snmp and other protocols), the dynamic scheduling subsystem dynamically adjusts the status of the executive body, and sends the status of the executive body to the routing arbitration subsystem, the protocol proxy subsystem, and the configuration management subsystem. Each subsystem is based on the status information of the executive body. Decide whether the executive body participates in the business adjudication. After the adjudication, for the executive body that produces inconsistent results, the relevant information is fed back to the dynamic scheduling subsystem for the dynamic scheduling subsystem to determine the feasibility of the executive body.
下面详细描述本实施例拟态路由器中调度子系统使用的调度方法。The following describes in detail the scheduling method used by the scheduling subsystem in the mimic router of this embodiment.
执行体上线后共有三种状态,分别为就绪状态、工作状态和异常状态。After the executive body goes online, there are three states: ready state, working state and abnormal state.
就绪状态:拟态防御系统启动后成功启动且未曾参与系统各模块调度的执行体,从异常状态下线清洗之后的执行体,以及可信度值大于可信度临界值的执行体状态均置为就绪状态。Ready state: After the mimic defense system is started, the executive body that has been successfully started and has not participated in the scheduling of the various modules of the system, the executive body after offline cleaning from the abnormal state, and the executive body whose credibility value is greater than the credibility threshold are all set to Ready state.
工作状态:参与系统各子系统裁决调度的执行体均置为工作状态。Working status: The executive bodies participating in the arbitration and scheduling of the subsystems of the system are all set to working status.
异常状态:可信度值小于等于可信度临界值的执行体,以及因软硬件等外界因素造成异常的执行体均置为异常状态。Abnormal state: Execution entities whose credibility value is less than or equal to the credibility critical value, and those that are abnormal due to external factors such as software and hardware are all set to an abnormal state.
拟态防御系统启动后,执行体也启动上线,已上线的执行体在相应情况下实现三种状态的切换。如图2所示,执行体在正常工作时为工作状态,当执行体在一个调度周期后可信度高于临界值切换为就绪状态,等待下一周期的调度策略继续工作;当执行体可信度达到临界值或者外界因素干扰产生异常后执行体切换为异常状态,异常状态的执行体将进行下下线清洗与数据回滚,清洗后的执行体置为就绪状态,就绪状态的执行体通过计算符合调度策略后转为工作状态。After the mimic defense system is activated, the executive body also starts to go online, and the online executive body realizes the switching of three states under corresponding circumstances. As shown in Figure 2, the executive body is in the working state during normal work. When the reliability of the executive body is higher than the critical value after a scheduling period, it switches to the ready state and waits for the next cycle of the scheduling strategy to continue working; when the executive body is available The executive body switches to the abnormal state after the reliability reaches the critical value or external factors interfere with the abnormal state. The executive body in the abnormal state will undergo offline cleaning and data rollback. The cleaned executive body will be placed in the ready state, and the executive body in the ready state will be set to the ready state. After the calculation is in accordance with the scheduling strategy, it is converted to a working state.
所述的动态调度策略如图1所示,具体分为以下几个步骤:The dynamic scheduling strategy is shown in Figure 1, and is specifically divided into the following steps:
步骤1:获得各子系统上发送的执行体数据信息;Step 1: Obtain the executive body data information sent on each subsystem;
系统初启动后,执行体依次上线,调度系统根据任务需求选择将执行体置为工作状态或就绪状态。此时如执行体受到攻击产生异常,收集该异常状态相关数据信息,用于后期执行体可信度和相关性的计算。After the initial startup of the system, the executive bodies go online one by one, and the scheduling system chooses to put the executive bodies in the working state or the ready state according to the task requirements. At this time, if the executive body is attacked and an abnormality occurs, the data and information related to the abnormal state are collected for later calculation of the credibility and correlation of the executive body.
步骤2:计算异常执行体可信度;Step 2: Calculate the credibility of the abnormal executive body;
根据工作执行体受到攻击的次数以及上线时长,计算受到攻击后执行体可信度,设置一个执行体下线清洗的可信度临界值,当可信度小于等于临界值时,将该执行体置为异常状态进行下线清洗和数据回滚;当可信度大于临界值或者进行清洗之后,该执行体置成就绪状态。当工作状态下的执行体发生异常时,在工作状态或就绪状态的执行体中选择可信度高的作为工作执行体。According to the number of times the work executive has been attacked and the length of time it has been online, calculate the credibility of the executive after being attacked, and set a credibility threshold for the off-line cleaning of the executive. When the credibility is less than or equal to the critical value, the executive Set to an abnormal state for offline cleaning and data rollback; when the credibility is greater than the critical value or after cleaning, the executive is placed in the ready state. When the execution body in the working state is abnormal, the execution body with high reliability is selected as the working execution body in the working state or the ready state.
步骤3:计算执行体间的相关性;Step 3: Calculate the correlation between the executive bodies;
每个执行体是相互独立存在且异构的,执行体间并没有关联,被攻击的难易程度也不同,因此考虑整个系统的可靠性,在调度时尽可能不把结构相似,相关性强的执行体同时作为工作执行体。为找到执行体间可能存在的相似性,可以进行多次的调度实验并总结每个执行体或者执行体间受到攻击的规律特性。Each executive body is independent and heterogeneous. There is no correlation between the executive bodies, and the difficulty of being attacked is also different. Therefore, considering the reliability of the entire system, try not to make the structure similar when scheduling, and the correlation is strong. The executive body at the same time as the work executive body. In order to find the possible similarities between executive bodies, you can conduct multiple scheduling experiments and summarize the regular characteristics of each executive body or between the executive bodies being attacked.
在多次的调度实验中,记录每次实验过程中同时处于工作状态的执行体id以及受到攻击的执行体id,根据记录的多组数据计算执行体组合在多次调度实验中同时受到攻击的比例,记录同时处于工作状态的执行体id的在线时长和同时受到同种攻击的执行体id的上线次数,以此找出执行体间可能存在的相似性。如果多个执行体同时受到攻击所占的比例较大,则该执行体组合的相关性系数较大,在调度的时候避免相关联的同时作为工作执行体。In multiple scheduling experiments, record the executor id that is working at the same time during each experiment and the executor id that is attacked. According to the recorded multiple sets of data, calculate the execution body combination that is attacked at the same time in multiple scheduling experiments. Proportion, record the online duration of the executive IDs that are working at the same time and the number of online executions of the executive IDs that are simultaneously attacked by the same type, so as to find out the possible similarities between the executives. If the proportion of multiple executives being attacked at the same time is large, the correlation coefficient of the combination of executives is relatively large, and it can be used as a work executive while avoiding correlation during scheduling.
步骤4:计算异构群体的可信度;Step 4: Calculate the credibility of heterogeneous groups;
所有工作执行体的平均可信度同样影响调度系统的可靠性,通过步骤3计算执行体的相关性,得出哪些执行体不适宜同时是工作执行体,在此前提下计算工作执行体群体的可信度和相关性系数。The average credibility of all work executives also affects the reliability of the scheduling system. Through step 3, the correlation of executives is calculated, and which executives are not suitable to be work executives at the same time. Under this premise, the calculation of the work executive group Reliability and correlation coefficient.
根据工作执行体群体中每个执行体的可信度平均值计算工作执行体群体的可信度,当计算得到的工作执行体群体的可信度大于等于可信度临界值时判定工作执行体群体可靠,反之判定不可靠。当工作执行体群体判定不可靠时,在工作状态和就绪状态中重新选择执行体并计算群体的可信度,找出满足群体可信度大于等于可信度临界值的执行体组合。Calculate the credibility of the work executor group according to the average credibility of each executor in the work executor group. When the calculated credibility of the work executor group is greater than or equal to the credibility threshold, determine the work executor The group is reliable, otherwise the judgment is unreliable. When the group of work executives is judged to be unreliable, re-select the executives in the working state and the ready state and calculate the credibility of the group, and find out the group of executives that meet the credibility of the group to be greater than or equal to the critical value of the credibility.
针对满足工作执行体群体可信度的执行体组合,计算组合的相关性系数最大值,找出满足群体可信度临界值要求且相关性最小的执行体组合,即最优的作为工作执行体的执行体组合。For the executive body combination that meets the group credibility of the work executive body, calculate the maximum value of the correlation coefficient of the combination, and find the executive body combination that meets the critical value requirements of the group credibility and has the least correlation, that is, the best executive body combination as the work executive body The executive body combination.
步骤5:综合步骤2至步骤4的调度策略,调度决策执行体的上线或下线。综合步骤2计算的执行体可信度,步骤3计算的执行体相关性系数和步骤4中计算的工作执行体群体可信度与相关性系数,选择最优的执行体组合工作。Step 5: Integrate the scheduling strategy from step 2 to step 4, and schedule the online or offline of the decision-making executive body. Combining the executive body credibility calculated in step 2, the executive body correlation coefficient calculated in step 3, and the work executive group credibility and correlation coefficient calculated in step 4, select the best executive body combination work.
下面具体介绍本实施例所述调度方法:The following specifically introduces the scheduling method described in this embodiment:
调度系统获取拟态路由器上其他子系统上发送的异常数据信息,根据执行体的异常数据信息计算执行体的可信度、异构群体的可信度以及执行体间的相关性,根据计算出来的数值由调度系统生成相应的调度策略。The scheduling system obtains the abnormal data information sent by other subsystems on the mimic router, and calculates the credibility of the executive body, the credibility of the heterogeneous group and the correlation between the executive bodies according to the abnormal data information of the executive body, and the correlation between the executive bodies is calculated according to the calculated The value is generated by the scheduling system to generate the corresponding scheduling strategy.
执行体按照状态的不同分为三个数据集合,其中:The executive body is divided into three data sets according to different states, among which:
c 1:处于就绪状态执行体数据集合c 1={m 11,m 12,m 13,…,m 1n},包括n个就绪状态下的执行体; c 1 : Execution body data set in the ready state c 1 ={m 11 ,m 12 ,m 13 ,...,m 1n }, including n execution bodies in the ready state;
c 2:处于工作状态执行体数据集合c 2={m 21,m 22,m 23,…,m 2j},包括j个工作状态下的执行体; c 2 : Execution body data set in working state c 2 ={m 21 ,m 22 ,m 23 ,...,m 2j }, including j execution bodies in working state;
c 3:处于异常状态执行体数据集合c 3={m 31,m 32,m 33,…,m 3k},包括k个异常状态下的执行体; c 3 : Execution body data set in abnormal state c 3 ={m 31 ,m 32 ,m 33 ,...,m 3k }, including k execution bodies in abnormal state;
N:为执行体池中所有上线状态和下线状态的执行体,n+j+k≤N。N: is all the online and offline executives in the executive pool, n+j+k≤N.
如图3所示调度方法,在拟态路由器初启动后,从执行体池中按照下面的规则取出一定数目的执行体放入工作状态集合c 2中,并将c 2中所有的执行体的状态都置成工作状态。工作状态执行体的启用与就绪状态执行体通过以下规则设置: The scheduling method shown in Figure 3, after the mimic router is initially started, a certain number of executives are taken from the executive pool and placed in the working state set c 2 according to the following rules, and the states of all the executives in c 2 All set to working state. The activation and ready status of the work state executive body are set by the following rules:
(i)在规定时间内,如果执行体池中所有的执行体都已经成功上线,则根据执行体依次上线的时间顺序,选择规定数目的执行体作为工作状态的执行体,剩下的执行体状态置成就绪状态放入c 1(i) Within the specified time, if all the execution bodies in the execution body pool have been successfully launched, according to the time sequence of the execution bodies going online in turn, the specified number of execution bodies will be selected as the execution bodies in the working state, and the remaining execution bodies Set the state to the ready state and put it into c 1 ;
(ii)在规定时间内,上线成功执行体数量没有达到规定,则按照执行体池中实际上线成功的执行体作为工作状态的执行体,余下的执行体若成功上线则置为就绪状态放入c 1(ii) Within the specified time, if the number of successfully online executions does not reach the stipulation, the executions that are actually successfully online in the execution pool will be used as the executions of the working state. If the remaining executions are successfully online, they will be placed in the ready state. c 1 .
系统运行之后,根据执行体在工作期间受到的攻击情况进行周期性调度或者异常情况下的调度。所述周期性调度即设置调度周期T,在系统运行过程中,如果所有工作执行体均没有受到攻击,则在经过调度时间T之后,重新选择工作的执行体。所述异常情况下的调度即如果当前工作状态下的执行体受到攻击,也要重新选择工作执行体。无论是周期性调度还是异常情况下的调度都要遵循下述的调度策略进行调度。After the system is running, periodic scheduling or scheduling under abnormal conditions is carried out according to the attack situation of the executive body during the working period. The periodic scheduling is to set a scheduling period T. During the operation of the system, if all work execution entities are not attacked, after the scheduling time T has elapsed, the work execution entities are reselected. The scheduling in the abnormal situation means that if the executive body in the current working state is attacked, the working executive body must be reselected. Regardless of whether it is periodic scheduling or scheduling under abnormal conditions, the following scheduling strategy must be followed for scheduling.
具体调度策略规则如下:如果c 2中执行体有异常或者需要进行周期性调度则优先从c 1中选择未曾工作过的执行体作为工作执行体。对于曾参与过调度的执行体,通过计算执行体的可信度、执行体间的相关性等方式决策是否继续作为工作执行体。关于执行体可信度、执行 体间的相关性以及系统可信度的计算规则如下: The specific scheduling policy rules are as follows: if there is an exception in the executive body in c 2 or periodic scheduling is required, the executive body that has not worked in c 1 is preferentially selected as the working executive body. For the executive body that has participated in the scheduling, it is determined whether to continue as a work executive body by calculating the credibility of the executive body and the correlation between the executive bodies. The calculation rules for the credibility of the executive body, the correlation between the executive bodies, and the system credibility are as follows:
(1)计算执行体可信度(1) Calculate the credibility of the executive body
首先记录在系统运行过程中,根据工作执行体受到攻击的次数以及上线时长,计算受到攻击后执行体可信度R iFirst, record during the operation of the system, according to the number of times the work executive has been attacked and the online duration, calculate the reliability R i of the executive after being attacked:
Figure PCTCN2020117989-appb-000004
Figure PCTCN2020117989-appb-000004
其中ε为无限小值,t i为上线期间受到攻击的次数,T i为上线总时长,i为执行体的编号id。 Wherein ε is the infinitely small value, t i being the number of attacks on the line for the period, T i is the total length on the line, i is the number of executable id.
R i的值越大,执行体可信度越大,相反R i的值越小,执行体可信度越小。设置一个执行体下线清洗的可信度临界值为R,当R i小于等于R时,则将此执行体置成异常状态并放入c 3中待进行下线清洗、数据回滚操作;当R i大于R时或者进行清洗之后,该执行体置成就绪状态放在c 1中;当c 2中工作执行体发生异常的时候,根据策略选择c 1、c 2中的执行体作为工作执行体。 The greater the value of R i , the greater the credibility of the executive body, on the contrary , the smaller the value of R i , the smaller the credibility of the executive body. Set the credibility critical value of an executor offline cleaning to R, when R i is less than or equal to R, put the executor into an abnormal state and put it in c 3 for offline cleaning and data rollback operations; When R i is greater than R or after cleaning, the executive is placed in the ready state and placed in c 1 ; when the work executive in c 2 is abnormal, the executive in c 1 and c 2 is selected as the work according to the strategy Executive body.
(2)计算执行体间的相关性系数。(2) Calculate the correlation coefficient between executive bodies.
在执行体工作的同时,可能受到的攻击种类不同,因此为保证执行体受到的攻击大概率为同一种攻击,限制执行体受到攻击的时间差,即假设A执行体在t A时刻受到攻击,B执行体在t B时刻受到攻击,为大概率保证A和B受到的攻击是同一种,增加一个时间临界差值Δt(Δt尽可能小),即如果|t A-t B|≤Δt,则认为A和B遭受的是同一种攻击。在接下来的多次实验中,统计A和B同时处于c 2集合中的时间(假设为T AB),A和B受到攻击且满足条件|t A-t B|≤Δt的次数(假设为t AB),得出A和B同时工作时被攻击后的相关性系数q AB,q AB计算公式如下: While the executive body is working, the types of attacks that may be received are different. Therefore, in order to ensure that the attack on the executive body is probably the same type of attack, the time difference of the execution body is limited, that is, the executive body A is attacked at time t A, and B The executive body is attacked at t B. In order to ensure that A and B are attacked by the same kind of attack, add a time critical difference Δt (Δt is as small as possible), that is, if |t A -t B |≤Δt, then Think that A and B suffered the same kind of attack. In the next many experiments, count the time that A and B are in the c 2 set at the same time (assumed as T AB ), and the number of times A and B are attacked and satisfy the condition |t A -t B |≤Δt (assumed as t AB ), the correlation coefficient q AB after being attacked when A and B work at the same time, the calculation formula of q AB is as follows:
Figure PCTCN2020117989-appb-000005
Figure PCTCN2020117989-appb-000005
设置一个相关性系数临界值q,如果q AB≥q执行体组合的相关性系数较大,则在调度过程中不把A和B同时作为工作执行体,反之可以将A和B同时作为工作执行体。 Set a correlation coefficient critical value q, if the correlation coefficient of q AB ≥ q executive body combination is large, then in the scheduling process, A and B will not be used as work executive bodies at the same time, otherwise, A and B can be used as work executive bodies at the same time body.
(3)计算群体可信度(3) Calculate the credibility of the group
所有工作执行体的平均可信度同样影响调度系统的可靠性。首先排除异常状态集合c 3中待下线清洗的执行体,通过步骤(2)计算执行体间的相关性,得出哪些执行体不适宜同时是工作执行体,在此前提下计算工作执行体群体的可信度与相关性系数。 The average credibility of all work executives also affects the reliability of the scheduling system. First, exclude the executives in the abnormal state set c 3 that are to be cleaned offline, and calculate the correlation between the executives through step (2), and find which executives are not suitable to be work executives at the same time. Under this premise, the work executives are calculated. The credibility of the group and the correlation coefficient.
具体算法如下:根据每个执行体的可信度值,计算平均可信度M,The specific algorithm is as follows: According to the credibility value of each executive body, calculate the average credibility M,
Figure PCTCN2020117989-appb-000006
Figure PCTCN2020117989-appb-000006
其中1≤k≤j,j为规定数目工作执行体的数量。设置W为整体调度系统的可信度临界值,当M≥W时认为这个调度系统是可靠的,反之认为是不可靠的,则从c 1和c 2中重新选择执行体并计算平均可信度,找出所有满足M≥W条件的执行体组合。 Among them, 1≤k≤j, j is the number of the specified number of work executives. Set W as the credibility critical value of the overall scheduling system. When M≥W, the scheduling system is considered to be reliable, otherwise it is considered unreliable, then reselect the executive body from c 1 and c 2 and calculate the average credibility Degree, find all executive body combinations that meet the condition of M≥W.
分别计算满足上述可信度条件下的执行体组合M 1,M 2,M 3,…的相关性。得到各执行体组合的相关性系数最大值
Figure PCTCN2020117989-appb-000007
i,j为组合内执行体id(i≠j),n为组合内执行体个数,执行体组合的相关性计算即分别计算每个执行体组合中的每个执行体与其他各执行体之间的相关性,也就是说i不变时,依次改变j,计算Q i,然后再改变i,依次算出Q i的值。各执行体组合的相关性系数最大值形成相关性系数最大值组合。选择相关性系数最大值组合中最小的对应的执行体组合作为工作执行体组合,即计算min(max(Q i) 1,max(Q i) 2,max(Q i) 3,……),该组合为最优的执行体组合,可靠性和稳定性最高。
Respectively calculate the correlation of the executive body combinations M 1 , M 2 , M 3 ,... under the above-mentioned credibility conditions. Get the maximum correlation coefficient of each executive body combination
Figure PCTCN2020117989-appb-000007
i, j are the executor id (i≠j) in the combination, n is the number of executors in the combination, the correlation calculation of the executor combination is to calculate each executor in each executor combination and the other executors separately correlation between, that is to say when the constant i, is sequentially changed j, Q i is calculated, and then change i, Q i value is calculated sequentially. The maximum correlation coefficient of each executive body combination forms the maximum correlation coefficient combination. Select the smallest corresponding executive body combination in the maximum correlation coefficient combination as the work executive body combination, that is, calculate min(max(Q i ) 1 ,max(Q i ) 2 ,max(Q i ) 3 ,……), This combination is the best executive body combination with the highest reliability and stability.
本实施例在现有的调度策略基础上,综合计算执行体的可信度、执行体之间的相关性系数和执行体组合之间的可信度平均值,执行体之间的相关性系数计算避免将相关性强的执行体放在一起工作,执行体组合之间的可信度平均值保证在一个调度期内处于工作状态执行体集合的可信度平均值,提高监测异常信息的准确度以及系统的安全性。Based on the existing scheduling strategy, this embodiment comprehensively calculates the credibility of the executive body, the correlation coefficient between the executive bodies and the average credibility between the executive body combinations, and the correlation coefficient between the executive bodies. The calculation avoids putting highly correlated executive bodies to work together, and the average credibility of the executive body combinations guarantees the average credibility of the executive body set in a working state during a scheduling period, and improves the accuracy of monitoring abnormal information Degree and the security of the system.
以上示意性地对本发明创造及其实施方式进行描述,该描述没有限制性,在不背离本发明的精神或者基本特征的情况下,能够以其他的具体形式实现本发明。附图中所示的也只是本发明创造的实施方式之一,实际的结构并不局限于此,权利要求中的任何附图标记不应限制所涉及的权利要求。所以,如果本领域的普通技术人员受其启示,在不脱离本创造宗旨的情况下,不经创造性的设计出与该技术方案相似的结构方式及实施例,均应属于本专利的保护范围。此外,“包括”一词不排除其他元件或步骤,在元件前的“一个”一词不排除包括“多个”该元件。产品权利要求中陈述的多个元件也可以由一个元件通过软件或者硬件来实现。第一,第二等词语用来表示名称,而并不表示任何特定的顺序。The above is a schematic description of the invention and its implementation. The description is not restrictive. The invention can be implemented in other specific forms without departing from the spirit or basic characteristics of the invention. What is shown in the drawings is only one of the embodiments created by the present invention, and the actual structure is not limited to this, and any reference signs in the claims should not limit the related claims. Therefore, if a person of ordinary skill in the art receives its enlightenment, and does not deviate from the purpose of this creation, without creative design, structural methods and embodiments similar to the technical solution should fall within the scope of protection of this patent. In addition, the word "comprising" does not exclude other elements or steps, and the word "a" before an element does not exclude the inclusion of "plurality" of the element. Multiple elements stated in the product claims can also be implemented by one element through software or hardware. Words such as first and second are used to denote names, but do not denote any specific order.

Claims (10)

  1. 一种拟态路由器执行体调度方法,其特征在于,包括以下步骤:A mimic router executive body scheduling method is characterized in that it comprises the following steps:
    步骤1:拟态路由器启动后,执行体上线,获取执行体数据信息,所述执行体分为就绪状态、工作状态和异常状态;Step 1: After the mimic router is started, the executive body goes online to obtain the executive body data information, and the executive body is divided into a ready state, a working state, and an abnormal state;
    步骤2:根据执行体受到攻击的次数与执行体的上线时长计算执行体的可信度;Step 2: Calculate the credibility of the executive body based on the number of times the executive body has been attacked and the online duration of the executive body;
    步骤3:根据执行体同时受到攻击的比例计算执行体间的相关性;Step 3: Calculate the correlation between the executive bodies according to the proportion of the executive bodies being attacked at the same time;
    步骤4:多个可信度和相关性均满足条件的执行体组成执行体组合,计算所述执行体组合的可信度平均值,对执行体组合的可信度平均值满足条件的执行体组合,计算该执行体组合的相关性系数;Step 4: Multiple executives with credibility and relevance that meet the conditions form an executive combination, calculate the average credibility of the executive combination, and calculate the average credibility of the executive combination to meet the condition. Combination, calculate the correlation coefficient of the executive body combination;
    步骤5:根据步骤2至步骤4中计算结果,决策执行体上线或者下线。Step 5: According to the calculation results in step 2 to step 4, the decision execution body goes online or offline.
  2. 根据权利要求1所述的一种拟态路由器执行体调度方法,其特征在于,步骤5中执行体上线或下线的调度策略为:选择可信度值高和相关性系数小的执行体和/或执行体组合作为工作执行体。A mimic router executive scheduling method according to claim 1, characterized in that the scheduling strategy of the executive going online or offline in step 5 is: selecting executives with high credibility value and low correlation coefficient and/ Or a combination of executive bodies as work executive bodies.
  3. 根据权利要求2所述的一种拟态路由器执行体调度方法,其特征在于,步骤4中计算执行体组合的相关性时,需先计算执行体组合的可信度平均值M,
    Figure PCTCN2020117989-appb-100001
    其中1≤k≤j,j为规定数目工作执行体的数量,R i为单个执行体的可信度值;若执行体组合的可信度平均值低于临界可信度平均值,重新选择执行体组合;计算所有满足可信度条件的执行体组合的相关性,即,针对所有满足可信度条件的执行体组合,分别计算每个执行体组合中的每个执行体与其他各执行体之间的相关性,从中挑选出相关性系数最大值,形成相关性系数最大值组合,从相关性系数最大值组合中选择相关性系数最小的执行体组合作为工作执行体组合。
    A mimic router executive scheduling method according to claim 2, wherein when calculating the relevance of the executive combination in step 4, it is necessary to first calculate the credibility average M of the executive combination,
    Figure PCTCN2020117989-appb-100001
    Where 1≤k≤j, j is the number of the specified number of work executives, and R i is the credibility value of a single executive; if the credibility average of the executive combination is lower than the critical credibility average, reselect Execution body combination; calculate the correlation of all execution body combinations that meet the credibility condition, that is, for all execution body combinations that meet the credibility condition, calculate each execution body in each execution body combination and other executions For the correlation between entities, select the maximum correlation coefficient from it to form a combination of the maximum correlation coefficient, and select the executive combination with the smallest correlation coefficient from the combination of the maximum correlation coefficient as the work executive combination.
  4. 根据权利要求1所述的一种拟态路由器执行体调度方法,其特征在于,步骤2中可信度R i的计算公式为
    Figure PCTCN2020117989-appb-100002
    其中ε为无限小值,t i为上线期间受到攻击的次数,T i为上线总时长,i为执行体的编号id。
    A mimetic router executive scheduling method according to claim 1, wherein the formula for calculating the credibility R i in step 2 is
    Figure PCTCN2020117989-appb-100002
    Wherein ε is the infinitely small value, t i being the number of attacks on the line for the period, T i is the total length on the line, i is the number of executable id.
  5. 根据权利要求1所述的一种拟态路由器执行体调度方法,其特征在于,步骤3中相关性q AB的计算公式为
    Figure PCTCN2020117989-appb-100003
    其中T AB为执行体A和执行体B同时处于工作状态时间,t AB 为执行体A和执行体B受到攻击的时间差值小于时间临界差值Δt的次数。
    A mimic router executive scheduling method according to claim 1, wherein the calculation formula of the correlation q AB in step 3 is
    Figure PCTCN2020117989-appb-100003
    Among them, T AB is the time when the executive body A and the executive body B are in the working state at the same time, and t AB is the number of times that the time difference between the executive body A and the executive body B is less than the time critical difference Δt.
  6. 根据权利要求1所述的一种拟态路由器执行体调度方法,其特征在于,执行体可信度低于临界可信度值的执行体需下线清洗与数据回滚,此时执行体置为异常状态。A mimic router executive scheduling method according to claim 1, wherein the executive whose credibility is lower than the critical credibility value requires offline cleaning and data rollback. At this time, the executive is set to Abnormal state.
  7. 根据权利要求2所述的一种拟态路由器执行体调度方法,其特征在于,选择执行体作为工作执行体时优先选择就绪状态的执行体。A mimic router executive scheduling method according to claim 2, characterized in that when the executive is selected as the work executive, the executive in the ready state is preferentially selected.
  8. 根据权利要求7所述的一种拟态路由器执行体调度方法,其特征在于,拟态路由器启动后根据执行体上线顺序选择作为工作状态的执行体,剩余执行体置为就绪状态。A mimic router executive scheduling method according to claim 7, characterized in that after the mimic router is started, the executives are selected as the working state according to the online order of the executives, and the remaining executives are placed in the ready state.
  9. 根据权利要求2所述的一种拟态路由器执行体调度方法,其特征在于,在调度周期内:若工作执行体受到攻击,通过计算可信度和相关性选择工作执行体;若工作执行体没有受到攻击,在该调度周期结束后通过计算可信度和相关性选择执行体作为工作执行体。A mimic router executive scheduling method according to claim 2, characterized in that, in the scheduling period: if the work executive is attacked, the work executive is selected by calculating the credibility and correlation; if the work executive is not Under attack, after the scheduling period ends, the executive body is selected as the work executive body by calculating the credibility and correlation.
  10. 一种拟态路由器,包括动态调度子系统、路由裁决子系统、协议代理子系统和配置管理协议代理子系统,其特征在于,所述动态调度子系统组合使用任意一项如权利要求1-9所述的一种拟态路由器执行体调度方法。A mimic router, comprising a dynamic scheduling subsystem, a routing arbitration subsystem, a protocol proxy subsystem, and a configuration management protocol proxy subsystem, wherein the dynamic scheduling subsystem uses any combination of any one as claimed in claims 1-9 A mimic router executive scheduling method described.
PCT/CN2020/117989 2020-06-10 2020-09-27 Mimic router execution entity scheduling method, and mimic router WO2021248740A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010523054.1A CN111431946B (en) 2020-06-10 2020-06-10 Mimicry router execution body scheduling method and mimicry router
CN202010523054.1 2020-06-10

Publications (1)

Publication Number Publication Date
WO2021248740A1 true WO2021248740A1 (en) 2021-12-16

Family

ID=71551345

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/117989 WO2021248740A1 (en) 2020-06-10 2020-09-27 Mimic router execution entity scheduling method, and mimic router

Country Status (2)

Country Link
CN (1) CN111431946B (en)
WO (1) WO2021248740A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114301650A (en) * 2021-12-21 2022-04-08 浙江大学 Mimicry WAF (wide area filter) judging method based on credibility
CN114363037A (en) * 2021-12-30 2022-04-15 河南信大网御科技有限公司 Forcible specific scene-based forced decision method, system, framework and medium
CN114363047A (en) * 2021-12-31 2022-04-15 河南信大网御科技有限公司 Transparent agent-based consequent resolution mimicry construction system
CN114363048A (en) * 2021-12-31 2022-04-15 河南信大网御科技有限公司 Mimicry unknown threat discovery system
CN114793248A (en) * 2022-03-02 2022-07-26 上海图灵智算量子科技有限公司 Mimicry-based encryption communication method
CN115225311A (en) * 2022-05-20 2022-10-21 中国人民解放军战略支援部队信息工程大学 Mimic bracket ciphertext proxy method and system based on openSSL transformation
CN115941559A (en) * 2023-03-14 2023-04-07 之江实验室 Method and device for dynamically managing mimicry executive body based on FPGA
CN116455627A (en) * 2023-04-12 2023-07-18 乾讯信息技术(无锡)有限公司 Network cipher machine with mimicry structure and its implementation method

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111431946B (en) * 2020-06-10 2020-09-04 网络通信与安全紫金山实验室 Mimicry router execution body scheduling method and mimicry router
CN112118064B (en) * 2020-08-18 2022-10-21 河南信大网御科技有限公司 Time synchronization method for mimicry heterogeneous equipment
CN111988312A (en) * 2020-08-19 2020-11-24 中国人民解放军战略支援部队信息工程大学 Mimicry construction web cloud service method and system
CN112187865B (en) * 2020-09-02 2022-11-01 中国人民解放军战略支援部队信息工程大学 Open shortest path priority message processing method and mimicry equipment
CN112491905B (en) * 2020-12-01 2023-05-05 郑州昂视信息科技有限公司 Performance test method, device and system of network equipment
CN112615880B (en) * 2020-12-27 2022-11-08 郑州昂视信息科技有限公司 Negative feedback scheduling method and scheduling system for executive
CN114531269B (en) * 2021-12-31 2023-11-14 网络通信与安全紫金山实验室 Tbox judging method and device
CN115296839A (en) * 2022-06-24 2022-11-04 网络通信与安全紫金山实验室 Mimic routing method, device and storage medium based on BGP-LS arbitration

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411937A (en) * 2016-11-15 2017-02-15 中国人民解放军信息工程大学 Mimicry defense architecture based zero-day attack detection, analysis and response system and method thereof
US10440048B1 (en) * 2018-11-05 2019-10-08 Peking University Shenzhen Graduate School Anti-attacking modelling for CMD systems based on GSPN and Martingale theory
CN110673951A (en) * 2019-08-30 2020-01-10 华东计算技术研究所(中国电子科技集团公司第三十二研究所) Mimicry scheduling method, system and medium for general operation environment
CN111431946A (en) * 2020-06-10 2020-07-17 网络通信与安全紫金山实验室 Mimicry router execution body scheduling method and mimicry router

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106874755B (en) * 2017-01-22 2019-07-12 中国人民解放军信息工程大学 Most consistent escape error processing apparatus and method
CN109525418B (en) * 2018-10-11 2021-10-08 浙江工商大学 Scheduling method for guaranteeing service deployment executor set heterogeneity under mimicry defense
CN110011965B (en) * 2019-02-28 2021-09-24 中国人民解放军战略支援部队信息工程大学 Execution body complete non-uniform output arbitration method and device based on credibility
CN110647918B (en) * 2019-08-26 2020-12-25 浙江工业大学 Mimicry defense method for resisting attack by deep learning model

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411937A (en) * 2016-11-15 2017-02-15 中国人民解放军信息工程大学 Mimicry defense architecture based zero-day attack detection, analysis and response system and method thereof
US10440048B1 (en) * 2018-11-05 2019-10-08 Peking University Shenzhen Graduate School Anti-attacking modelling for CMD systems based on GSPN and Martingale theory
CN110673951A (en) * 2019-08-30 2020-01-10 华东计算技术研究所(中国电子科技集团公司第三十二研究所) Mimicry scheduling method, system and medium for general operation environment
CN111431946A (en) * 2020-06-10 2020-07-17 网络通信与安全紫金山实验室 Mimicry router execution body scheduling method and mimicry router

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114301650B (en) * 2021-12-21 2022-08-30 浙江大学 Mimicry WAF (wide area filter) judging method based on credibility
CN114301650A (en) * 2021-12-21 2022-04-08 浙江大学 Mimicry WAF (wide area filter) judging method based on credibility
CN114363037A (en) * 2021-12-30 2022-04-15 河南信大网御科技有限公司 Forcible specific scene-based forced decision method, system, framework and medium
CN114363037B (en) * 2021-12-30 2023-09-29 河南信大网御科技有限公司 Strong arbitration method, system, architecture and medium based on mimicry specific scene
CN114363047B (en) * 2021-12-31 2023-09-08 河南信大网御科技有限公司 Transparent proxy-based postterm arbitration mimetic construction system
CN114363047A (en) * 2021-12-31 2022-04-15 河南信大网御科技有限公司 Transparent agent-based consequent resolution mimicry construction system
CN114363048A (en) * 2021-12-31 2022-04-15 河南信大网御科技有限公司 Mimicry unknown threat discovery system
CN114793248A (en) * 2022-03-02 2022-07-26 上海图灵智算量子科技有限公司 Mimicry-based encryption communication method
CN114793248B (en) * 2022-03-02 2024-02-23 上海图灵智算量子科技有限公司 Mimicry-based encryption communication method
CN115225311A (en) * 2022-05-20 2022-10-21 中国人民解放军战略支援部队信息工程大学 Mimic bracket ciphertext proxy method and system based on openSSL transformation
CN115225311B (en) * 2022-05-20 2023-07-21 中国人民解放军战略支援部队信息工程大学 Pseudo bracket ciphertext proxy method and system based on openSSL transformation
CN115941559A (en) * 2023-03-14 2023-04-07 之江实验室 Method and device for dynamically managing mimicry executive body based on FPGA
CN116455627A (en) * 2023-04-12 2023-07-18 乾讯信息技术(无锡)有限公司 Network cipher machine with mimicry structure and its implementation method
CN116455627B (en) * 2023-04-12 2023-10-27 乾讯信息技术(无锡)有限公司 Network cipher machine with mimicry structure and its implementation method

Also Published As

Publication number Publication date
CN111431946A (en) 2020-07-17
CN111431946B (en) 2020-09-04

Similar Documents

Publication Publication Date Title
WO2021248740A1 (en) Mimic router execution entity scheduling method, and mimic router
Mahjabin et al. A survey of distributed denial-of-service attack, prevention, and mitigation techniques
Wang et al. An advanced hybrid peer-to-peer botnet
Peng et al. Survey of network-based defense mechanisms countering the DoS and DDoS problems
Hoque et al. Botnet in DDoS attacks: trends and challenges
Beitollahi et al. Analyzing well-known countermeasures against distributed denial of service attacks
Duan et al. Controlling IP spoofing through interdomain packet filters
US8561188B1 (en) Command and control channel detection with query string signature
Iyengar et al. A fuzzy logic based defense mechanism against distributed denial of service attack in cloud computing environment
Kaur Chahal et al. Distributed denial of service attacks: a threat or challenge
Huang et al. A DDoS mitigation system with multi-stage detection and text-based turing testing in cloud computing
Ankali et al. Detection architecture of application layer DDoS attack for internet
Haddadi et al. DoS-DDoS: taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment
Mohammadi et al. SYN‐Guard: An effective counter for SYN flooding attack in software‐defined networking
Nagarathna et al. SLAMHHA: A supervised learning approach to mitigate host location hijacking attack on SDN controllers
Leonard et al. A framework for understanding botnets
Liu et al. A survey of botnet architecture and batnet detection techniques
Marupally et al. Comparative analysis and evaluation of botnet command and control models
Wang et al. A multi-layer framework for puzzle-based denial-of-service defense
Kavisankar et al. Efficient syn spoofing detection and mitigation scheme for ddos attack
Pradhan et al. Blockchain based security framework for P2P filesharing system
Hwa et al. Review of peer-to-peer botnets and detection mechanisms
Wang et al. On the effectiveness of secure overlay forwarding systems under intelligent distributed DoS attacks
Djalaliev et al. Sentinel: hardware-accelerated mitigation of bot-based DDoS attacks
Hassan et al. Literature Review on Prevention and Detection of DDoS Attack

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20940351

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20940351

Country of ref document: EP

Kind code of ref document: A1