Mimicry transformation method, device and system of Ethernet gateway
The invention discloses a mimicry transformation method, device and system for an Ethernet gateway. The method comprises the following steps: respectively forwarding received data to an application protocol stack of each heterogeneous processor in the Ethernet gateway by utilizing a dispatcher; proc...
Gespeichert in:
Hauptverfasser: | , , , , , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | ZHANG BO BI SIBO MIAO WEIWEI YU YITUAN ZHANG MINGXUAN ZHANG RUI XIA YUANYI ZENG ZENG LI SHIHAO WANG YUNFAN HE CHUAN XI ZESHENG TENG CHANGZHI |
description | The invention discloses a mimicry transformation method, device and system for an Ethernet gateway. The method comprises the following steps: respectively forwarding received data to an application protocol stack of each heterogeneous processor in the Ethernet gateway by utilizing a dispatcher; processing the received data by using each application protocol stack, respectively forwarding the processed data to a mimicry voter, and outputting a judgment result by the mimicry voter; and when a certain application protocol stack is found to be attacked based on the judgment result, performing multi-dimensional dynamic reconstruction based on an unattacked application protocol stack by utilizing a dynamic reconstructor, recovering the correctness of the attacked application protocol stack, and ensuring the normal operation of the Ethernet gateway by utilizing the unattacked application protocol stack at the same time. According to the method, attacks of some unknown vulnerabilities and backdoors can be better defe |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN115720182A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN115720182A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN115720182A3</originalsourceid><addsrcrecordid>eNqNyjEKAjEQBdA0FqLeYewVzIpoK-uKjVb2y5D8uAGTLMmg5PZaeACr17ypOl198CZXksyxuJQDi0-RAmRIdkUWL29AHC2VWgSBkqNOBuQIoQcL3lznauL4WbD4OVPLc3dvL2uMqUcZ2eC7-_am9W7fbPShOW7_OR_RTDLt</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Mimicry transformation method, device and system of Ethernet gateway</title><source>esp@cenet</source><creator>ZHANG BO ; BI SIBO ; MIAO WEIWEI ; YU YITUAN ; ZHANG MINGXUAN ; ZHANG RUI ; XIA YUANYI ; ZENG ZENG ; LI SHIHAO ; WANG YUNFAN ; HE CHUAN ; XI ZESHENG ; TENG CHANGZHI</creator><creatorcontrib>ZHANG BO ; BI SIBO ; MIAO WEIWEI ; YU YITUAN ; ZHANG MINGXUAN ; ZHANG RUI ; XIA YUANYI ; ZENG ZENG ; LI SHIHAO ; WANG YUNFAN ; HE CHUAN ; XI ZESHENG ; TENG CHANGZHI</creatorcontrib><description>The invention discloses a mimicry transformation method, device and system for an Ethernet gateway. The method comprises the following steps: respectively forwarding received data to an application protocol stack of each heterogeneous processor in the Ethernet gateway by utilizing a dispatcher; processing the received data by using each application protocol stack, respectively forwarding the processed data to a mimicry voter, and outputting a judgment result by the mimicry voter; and when a certain application protocol stack is found to be attacked based on the judgment result, performing multi-dimensional dynamic reconstruction based on an unattacked application protocol stack by utilizing a dynamic reconstructor, recovering the correctness of the attacked application protocol stack, and ensuring the normal operation of the Ethernet gateway by utilizing the unattacked application protocol stack at the same time. According to the method, attacks of some unknown vulnerabilities and backdoors can be better defe</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20230228&DB=EPODOC&CC=CN&NR=115720182A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20230228&DB=EPODOC&CC=CN&NR=115720182A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>ZHANG BO</creatorcontrib><creatorcontrib>BI SIBO</creatorcontrib><creatorcontrib>MIAO WEIWEI</creatorcontrib><creatorcontrib>YU YITUAN</creatorcontrib><creatorcontrib>ZHANG MINGXUAN</creatorcontrib><creatorcontrib>ZHANG RUI</creatorcontrib><creatorcontrib>XIA YUANYI</creatorcontrib><creatorcontrib>ZENG ZENG</creatorcontrib><creatorcontrib>LI SHIHAO</creatorcontrib><creatorcontrib>WANG YUNFAN</creatorcontrib><creatorcontrib>HE CHUAN</creatorcontrib><creatorcontrib>XI ZESHENG</creatorcontrib><creatorcontrib>TENG CHANGZHI</creatorcontrib><title>Mimicry transformation method, device and system of Ethernet gateway</title><description>The invention discloses a mimicry transformation method, device and system for an Ethernet gateway. The method comprises the following steps: respectively forwarding received data to an application protocol stack of each heterogeneous processor in the Ethernet gateway by utilizing a dispatcher; processing the received data by using each application protocol stack, respectively forwarding the processed data to a mimicry voter, and outputting a judgment result by the mimicry voter; and when a certain application protocol stack is found to be attacked based on the judgment result, performing multi-dimensional dynamic reconstruction based on an unattacked application protocol stack by utilizing a dynamic reconstructor, recovering the correctness of the attacked application protocol stack, and ensuring the normal operation of the Ethernet gateway by utilizing the unattacked application protocol stack at the same time. According to the method, attacks of some unknown vulnerabilities and backdoors can be better defe</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNyjEKAjEQBdA0FqLeYewVzIpoK-uKjVb2y5D8uAGTLMmg5PZaeACr17ypOl198CZXksyxuJQDi0-RAmRIdkUWL29AHC2VWgSBkqNOBuQIoQcL3lznauL4WbD4OVPLc3dvL2uMqUcZ2eC7-_am9W7fbPShOW7_OR_RTDLt</recordid><startdate>20230228</startdate><enddate>20230228</enddate><creator>ZHANG BO</creator><creator>BI SIBO</creator><creator>MIAO WEIWEI</creator><creator>YU YITUAN</creator><creator>ZHANG MINGXUAN</creator><creator>ZHANG RUI</creator><creator>XIA YUANYI</creator><creator>ZENG ZENG</creator><creator>LI SHIHAO</creator><creator>WANG YUNFAN</creator><creator>HE CHUAN</creator><creator>XI ZESHENG</creator><creator>TENG CHANGZHI</creator><scope>EVB</scope></search><sort><creationdate>20230228</creationdate><title>Mimicry transformation method, device and system of Ethernet gateway</title><author>ZHANG BO ; BI SIBO ; MIAO WEIWEI ; YU YITUAN ; ZHANG MINGXUAN ; ZHANG RUI ; XIA YUANYI ; ZENG ZENG ; LI SHIHAO ; WANG YUNFAN ; HE CHUAN ; XI ZESHENG ; TENG CHANGZHI</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN115720182A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2023</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>ZHANG BO</creatorcontrib><creatorcontrib>BI SIBO</creatorcontrib><creatorcontrib>MIAO WEIWEI</creatorcontrib><creatorcontrib>YU YITUAN</creatorcontrib><creatorcontrib>ZHANG MINGXUAN</creatorcontrib><creatorcontrib>ZHANG RUI</creatorcontrib><creatorcontrib>XIA YUANYI</creatorcontrib><creatorcontrib>ZENG ZENG</creatorcontrib><creatorcontrib>LI SHIHAO</creatorcontrib><creatorcontrib>WANG YUNFAN</creatorcontrib><creatorcontrib>HE CHUAN</creatorcontrib><creatorcontrib>XI ZESHENG</creatorcontrib><creatorcontrib>TENG CHANGZHI</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>ZHANG BO</au><au>BI SIBO</au><au>MIAO WEIWEI</au><au>YU YITUAN</au><au>ZHANG MINGXUAN</au><au>ZHANG RUI</au><au>XIA YUANYI</au><au>ZENG ZENG</au><au>LI SHIHAO</au><au>WANG YUNFAN</au><au>HE CHUAN</au><au>XI ZESHENG</au><au>TENG CHANGZHI</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Mimicry transformation method, device and system of Ethernet gateway</title><date>2023-02-28</date><risdate>2023</risdate><abstract>The invention discloses a mimicry transformation method, device and system for an Ethernet gateway. The method comprises the following steps: respectively forwarding received data to an application protocol stack of each heterogeneous processor in the Ethernet gateway by utilizing a dispatcher; processing the received data by using each application protocol stack, respectively forwarding the processed data to a mimicry voter, and outputting a judgment result by the mimicry voter; and when a certain application protocol stack is found to be attacked based on the judgment result, performing multi-dimensional dynamic reconstruction based on an unattacked application protocol stack by utilizing a dynamic reconstructor, recovering the correctness of the attacked application protocol stack, and ensuring the normal operation of the Ethernet gateway by utilizing the unattacked application protocol stack at the same time. According to the method, attacks of some unknown vulnerabilities and backdoors can be better defe</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN115720182A |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Mimicry transformation method, device and system of Ethernet gateway |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T11%3A08%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=ZHANG%20BO&rft.date=2023-02-28&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN115720182A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |