Font Size: a A A

File Protection Method Based On Mimic Defense And Countermeasure Test

Posted on:2020-06-10Degree:MasterType:Thesis
Country:ChinaCandidate:C Y LiFull Text:PDF
GTID:2428330575471443Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In the era of high-speed operation of information,network information is particularly critical,and its security has become the focus of people's attention.As an important carrier of network information,people pay more and more attention to file security protection.With the development of information technology,large files are often used to transmit massive information and are applied in many occasions.Large files are not only large in size but also contain more sensitive data.Therefore,it is of great significance to study how to process and store them at high speed and at the same time to protect them with high security.In 2013,academician Wu jiangxing put forward the highly efficient computer system--Mimic Computer,which can efficiently complete the calculation task through variable structure calculation.Wu Jiang-xing academicians and then put forward the "change the rules of the game" Cyber Mimic Defense(CMD)technology,the Dynamic and Heterogeneous Redundancy(DHR)structure is the core structure of CMD,CMD changed network space attack-defense game defenders of the passive situation,let the attacker CMD system internal structure of the beat,even if is the presence of unknown hole back door also do not know how to start.In order to meet the high performance requirement of large file processing,this paper introduces Mimic Computer as the processing carrier of Large file.In this paper,the key technologies of Mimic Computer for Large file processing are introduced in detail,and the realization of Large file processing system based on Mimic Computer is given.In order to meet the requirements of Large files in high security protection,this paper proposes a file protection method based on the mimic defense technology.This method firstly encrypts and stores Large files with heterogeneous redundancy.Then,when receiving the client's network request for Large files,these redundant Large files are decrypted separately and the decrypted redundant Large files are hashed to extract fingerprints.Finally,hashing fingerprint comparison is completed in the adjudication link.If there is a Large file that has been maliciouslytampered by the attacker,the system will find the tampering and provide the normal Large file response to the customer.Combined with the high efficiency of large file processing by Mimic Computer and the high security of the file protection method proposed in this paper,the whole Large file protection architecture based on the mimic defense is constructed in this paper.The experimental test and analysis are carried out under the proposed architecture.First transmission performance of Large file encryption performance,hash operation performance experiment testing,the experimental results show that the file transfer time of less than 1 second,the transmission rate is more than 4000 Mbps,AES encryption algorithm to realize the frequency is 200 Mhz,performance of more than 1.5 billion a/s,far higher than other AES algorithm implementation,SHA-256 algorithm implementation,in this paper,the frequency of 260 Mhz,throughput of133.120 Gbps,achieve performance is much higher than other implementation method,verified the large files under the mimic computer processing efficiency.Then the countermeasure test is carried out in the way of key cracking,which verifies the high security of Large files under the file protection method proposed in this paper.
Keywords/Search Tags:Mimic computer, Mimic defense, Large file, Dynamic Heterogeneous Redundancy, High performance
PDF Full Text Request
Related items