Security policy scheduling optimization method based on genetic algorithm
The invention discloses a security policy scheduling optimization method based on a genetic algorithm, and provides a brand-new defense method for a fault injection attack from a system level. According to the method, the technical characteristics that a genetic algorithm has nothing to do with the...
Saved in:
Main Authors | , , , , , , , |
---|---|
Format | Patent |
Language | Chinese English |
Published |
12.03.2021
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The invention discloses a security policy scheduling optimization method based on a genetic algorithm, and provides a brand-new defense method for a fault injection attack from a system level. According to the method, the technical characteristics that a genetic algorithm has nothing to do with the problem field and is rapid and random in search capability, expandability and not prone to falling into a local optimal solution are fully utilized, and a security detection and recovery method in embedded distributed application is optimized; according to the method, rapid detection of the error injection attack can be realized, and the detected error can be recovered, so that the distributed real-time equipment applied to the key field is prevented from being attacked by the error injection detection.
本发明公开了一种基于遗传算法的安全策略调度优化方法,本发明方法从系统层面提出了一种全新的针对错误注入攻击的防御方法,该方法充分利用遗传算法与问题领域无关且快速随机的搜索能力、可扩展性以及不易陷入局部最优解的技术特点,对嵌入式分布式应用中的安全检测和恢复方法进行了优化;不仅能实现对错误注入攻击的快速检测,而且能对检测到错误进行恢复,使得应用于关键领域的分布式实时设备免于错误注入检测的攻击。 |
---|---|
Bibliography: | Application Number: CN202011339629 |