Mimicry transformation method, device and system of Ethernet gateway

The invention discloses a mimicry transformation method, device and system for an Ethernet gateway. The method comprises the following steps: respectively forwarding received data to an application protocol stack of each heterogeneous processor in the Ethernet gateway by utilizing a dispatcher; proc...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: ZHANG BO, BI SIBO, MIAO WEIWEI, YU YITUAN, ZHANG MINGXUAN, ZHANG RUI, XIA YUANYI, ZENG ZENG, LI SHIHAO, WANG YUNFAN, HE CHUAN, XI ZESHENG, TENG CHANGZHI
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator ZHANG BO
BI SIBO
MIAO WEIWEI
YU YITUAN
ZHANG MINGXUAN
ZHANG RUI
XIA YUANYI
ZENG ZENG
LI SHIHAO
WANG YUNFAN
HE CHUAN
XI ZESHENG
TENG CHANGZHI
description The invention discloses a mimicry transformation method, device and system for an Ethernet gateway. The method comprises the following steps: respectively forwarding received data to an application protocol stack of each heterogeneous processor in the Ethernet gateway by utilizing a dispatcher; processing the received data by using each application protocol stack, respectively forwarding the processed data to a mimicry voter, and outputting a judgment result by the mimicry voter; and when a certain application protocol stack is found to be attacked based on the judgment result, performing multi-dimensional dynamic reconstruction based on an unattacked application protocol stack by utilizing a dynamic reconstructor, recovering the correctness of the attacked application protocol stack, and ensuring the normal operation of the Ethernet gateway by utilizing the unattacked application protocol stack at the same time. According to the method, attacks of some unknown vulnerabilities and backdoors can be better defe
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN115720182A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN115720182A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN115720182A3</originalsourceid><addsrcrecordid>eNqNyjEKAjEQBdA0FqLeYewVzIpoK-uKjVb2y5D8uAGTLMmg5PZaeACr17ypOl198CZXksyxuJQDi0-RAmRIdkUWL29AHC2VWgSBkqNOBuQIoQcL3lznauL4WbD4OVPLc3dvL2uMqUcZ2eC7-_am9W7fbPShOW7_OR_RTDLt</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Mimicry transformation method, device and system of Ethernet gateway</title><source>esp@cenet</source><creator>ZHANG BO ; BI SIBO ; MIAO WEIWEI ; YU YITUAN ; ZHANG MINGXUAN ; ZHANG RUI ; XIA YUANYI ; ZENG ZENG ; LI SHIHAO ; WANG YUNFAN ; HE CHUAN ; XI ZESHENG ; TENG CHANGZHI</creator><creatorcontrib>ZHANG BO ; BI SIBO ; MIAO WEIWEI ; YU YITUAN ; ZHANG MINGXUAN ; ZHANG RUI ; XIA YUANYI ; ZENG ZENG ; LI SHIHAO ; WANG YUNFAN ; HE CHUAN ; XI ZESHENG ; TENG CHANGZHI</creatorcontrib><description>The invention discloses a mimicry transformation method, device and system for an Ethernet gateway. The method comprises the following steps: respectively forwarding received data to an application protocol stack of each heterogeneous processor in the Ethernet gateway by utilizing a dispatcher; processing the received data by using each application protocol stack, respectively forwarding the processed data to a mimicry voter, and outputting a judgment result by the mimicry voter; and when a certain application protocol stack is found to be attacked based on the judgment result, performing multi-dimensional dynamic reconstruction based on an unattacked application protocol stack by utilizing a dynamic reconstructor, recovering the correctness of the attacked application protocol stack, and ensuring the normal operation of the Ethernet gateway by utilizing the unattacked application protocol stack at the same time. According to the method, attacks of some unknown vulnerabilities and backdoors can be better defe</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20230228&amp;DB=EPODOC&amp;CC=CN&amp;NR=115720182A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20230228&amp;DB=EPODOC&amp;CC=CN&amp;NR=115720182A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>ZHANG BO</creatorcontrib><creatorcontrib>BI SIBO</creatorcontrib><creatorcontrib>MIAO WEIWEI</creatorcontrib><creatorcontrib>YU YITUAN</creatorcontrib><creatorcontrib>ZHANG MINGXUAN</creatorcontrib><creatorcontrib>ZHANG RUI</creatorcontrib><creatorcontrib>XIA YUANYI</creatorcontrib><creatorcontrib>ZENG ZENG</creatorcontrib><creatorcontrib>LI SHIHAO</creatorcontrib><creatorcontrib>WANG YUNFAN</creatorcontrib><creatorcontrib>HE CHUAN</creatorcontrib><creatorcontrib>XI ZESHENG</creatorcontrib><creatorcontrib>TENG CHANGZHI</creatorcontrib><title>Mimicry transformation method, device and system of Ethernet gateway</title><description>The invention discloses a mimicry transformation method, device and system for an Ethernet gateway. The method comprises the following steps: respectively forwarding received data to an application protocol stack of each heterogeneous processor in the Ethernet gateway by utilizing a dispatcher; processing the received data by using each application protocol stack, respectively forwarding the processed data to a mimicry voter, and outputting a judgment result by the mimicry voter; and when a certain application protocol stack is found to be attacked based on the judgment result, performing multi-dimensional dynamic reconstruction based on an unattacked application protocol stack by utilizing a dynamic reconstructor, recovering the correctness of the attacked application protocol stack, and ensuring the normal operation of the Ethernet gateway by utilizing the unattacked application protocol stack at the same time. According to the method, attacks of some unknown vulnerabilities and backdoors can be better defe</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNyjEKAjEQBdA0FqLeYewVzIpoK-uKjVb2y5D8uAGTLMmg5PZaeACr17ypOl198CZXksyxuJQDi0-RAmRIdkUWL29AHC2VWgSBkqNOBuQIoQcL3lznauL4WbD4OVPLc3dvL2uMqUcZ2eC7-_am9W7fbPShOW7_OR_RTDLt</recordid><startdate>20230228</startdate><enddate>20230228</enddate><creator>ZHANG BO</creator><creator>BI SIBO</creator><creator>MIAO WEIWEI</creator><creator>YU YITUAN</creator><creator>ZHANG MINGXUAN</creator><creator>ZHANG RUI</creator><creator>XIA YUANYI</creator><creator>ZENG ZENG</creator><creator>LI SHIHAO</creator><creator>WANG YUNFAN</creator><creator>HE CHUAN</creator><creator>XI ZESHENG</creator><creator>TENG CHANGZHI</creator><scope>EVB</scope></search><sort><creationdate>20230228</creationdate><title>Mimicry transformation method, device and system of Ethernet gateway</title><author>ZHANG BO ; BI SIBO ; MIAO WEIWEI ; YU YITUAN ; ZHANG MINGXUAN ; ZHANG RUI ; XIA YUANYI ; ZENG ZENG ; LI SHIHAO ; WANG YUNFAN ; HE CHUAN ; XI ZESHENG ; TENG CHANGZHI</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN115720182A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2023</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>ZHANG BO</creatorcontrib><creatorcontrib>BI SIBO</creatorcontrib><creatorcontrib>MIAO WEIWEI</creatorcontrib><creatorcontrib>YU YITUAN</creatorcontrib><creatorcontrib>ZHANG MINGXUAN</creatorcontrib><creatorcontrib>ZHANG RUI</creatorcontrib><creatorcontrib>XIA YUANYI</creatorcontrib><creatorcontrib>ZENG ZENG</creatorcontrib><creatorcontrib>LI SHIHAO</creatorcontrib><creatorcontrib>WANG YUNFAN</creatorcontrib><creatorcontrib>HE CHUAN</creatorcontrib><creatorcontrib>XI ZESHENG</creatorcontrib><creatorcontrib>TENG CHANGZHI</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>ZHANG BO</au><au>BI SIBO</au><au>MIAO WEIWEI</au><au>YU YITUAN</au><au>ZHANG MINGXUAN</au><au>ZHANG RUI</au><au>XIA YUANYI</au><au>ZENG ZENG</au><au>LI SHIHAO</au><au>WANG YUNFAN</au><au>HE CHUAN</au><au>XI ZESHENG</au><au>TENG CHANGZHI</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Mimicry transformation method, device and system of Ethernet gateway</title><date>2023-02-28</date><risdate>2023</risdate><abstract>The invention discloses a mimicry transformation method, device and system for an Ethernet gateway. The method comprises the following steps: respectively forwarding received data to an application protocol stack of each heterogeneous processor in the Ethernet gateway by utilizing a dispatcher; processing the received data by using each application protocol stack, respectively forwarding the processed data to a mimicry voter, and outputting a judgment result by the mimicry voter; and when a certain application protocol stack is found to be attacked based on the judgment result, performing multi-dimensional dynamic reconstruction based on an unattacked application protocol stack by utilizing a dynamic reconstructor, recovering the correctness of the attacked application protocol stack, and ensuring the normal operation of the Ethernet gateway by utilizing the unattacked application protocol stack at the same time. According to the method, attacks of some unknown vulnerabilities and backdoors can be better defe</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN115720182A
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Mimicry transformation method, device and system of Ethernet gateway
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T11%3A08%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=ZHANG%20BO&rft.date=2023-02-28&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN115720182A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true