Information processing system based on mimicry arbitration method
Technical Field
The invention relates to the technical field of message middleware, in particular to an information processing system based on a mimicry arbitration method.
Background
With the growing trend of distributed systems becoming mainstream software systems, lawless persons use the process of message transmission among components of the distributed system, take the message transmission among the components as an intrusion service path, control a core component by issuing fake messages so as to steal and tamper platform data, issue fraudulent messages by using fake platforms, and propagate malicious programs. This presents a significant challenge to the security of information in critical areas and units, such as users, particularly government authorities, large institutions, banks, businesses, etc.
The mimicry defense theory provides an effective solution to the network space endogenous security problem and derives a set of mimicry normalization arbitration method. But currently this approach relies primarily on proxy components to perform normalization and arbitration operations, i.e., the tasks are independently undertaken by a single node, which can lead to performance bottlenecks in a scalable distributed system.
Based on the service of the distributed system, the service data is transmitted among the system components through the filtering of the message middleware, and the invasion of lawless persons in a data plane can be effectively prevented. The traditional security service based on the distributed system is also increased with a plurality of measures, such as encrypting the system service transfer message by adopting the SSL protocol, but due to the large number of components of the distributed system, the characteristics of the message transmission protocol and the vulnerability of the whole transmission process, a plurality of security holes are still difficult to clear comprehensively. At present, the simulation defense research of the distributed information processing system is less, and the simulation judgment is not enhanced by utilizing a security analysis means, so that the redundant security is formed, and the security escape risk is increased.
Disclosure of Invention
The invention aims to provide an information processing system based on a mimicry arbitration method, which simultaneously realizes a mimicry reconstruction method and an information security protection means on the basis of improving the security of a distributed system, and the cluster expansion of a message middleware is not affected, so that the efficiency and the reliability of message processing are greatly improved, and the limitation of the cluster function of the message middleware due to mimicry arbitration and normalization is avoided.
In order to achieve the above purpose, the present invention adopts the following technical scheme.
An information processing system based on a mimicry arbitration method comprises an input distribution agent component, a heterogeneous publisher pool, a message analysis transformation component, a message middleware, a mimicry arbitration component, a database and a feedback control component.
The input distribution agent component is used for receiving the request information, adding a label to the request information, and copying and distributing the request information added with the label to equivalent heterogeneous publishers in the heterogeneous publisher pool.
The heterogeneous publisher is configured to respond to the request information from the input distribution agent component and to publish a message carrying the tag to the message analysis transformation component.
The message analysis transformation component is used for receiving the publisher message, carrying out security analysis, simulating information synchronization, transforming the message and sending the message to the message middleware.
The message middleware is connected with the mimicry arbitration component, and is used for receiving the publisher message, resolving the message and selecting to insert into the queue, and the mimicry arbitration component is used for subscribing the message from the message middleware, arbitrating the normalized processing message, restoring the message, publishing the message and feeding back the arbitration result.
The database is connected with the mimicry arbitration component and the message analysis modification component for information synchronization between the mimicry arbitration component and the message analysis modification component. The mimicry arbitration component updates message middleware queue information, node IP, queue status, etc. to the database. The message analysis transformation component queries information such as message middleware nodes, mimicry queue states and the like from a database, determines the message middleware nodes and mimicry message queues sent by the message analysis transformation component according to the information in combination with a load balancing algorithm, ensures that the same-tag messages are distributed to the same message middleware nodes, and avoids mimicry resolution failure caused by message dispersion.
The feedback control component is connected with the mimicry arbitration component and is used for receiving mimicry arbitration abnormal feedback information, analyzing and processing the abnormal information, launching state scheduling control information to the heterogeneous publisher pool, and carrying out heterogeneous publisher restarting rotation on the heterogeneous publisher pool if necessary.
Further, the message analysis transformation component performs security analysis of the tagged publisher message, including integrity checking and semantic security analysis of the message body.
Further, the simulation information synchronization performed by the message analysis and transformation component comprises the steps of acquiring the state and queue information of the message middleware from the database and updating the corresponding information stored locally.
Further, the message analysis transformation component transforms the tagged publisher message, including the destination message middleware node and the queue calculated according to the synchronized mimicry information, transforms the published message header, and adds the security analysis result to the published message body as a parameter for multidimensional mimicry arbitration.
Further, the message analysis and transformation component does not perform security analysis and message transformation on the unlabeled publisher message, and directly selects a load balancing algorithm to forward the message.
Further, the mimicry arbitration component performs arbitration normalization processing on the subscription message, including multidimensional mimicry arbitration on the message group with the same label, and a message is selected as a message to be issued by adopting a normalization algorithm according to the mimicry arbitration result.
Further, the mimicry arbitration component restores the message, including restoring the header information of the message to be published, i.e., restoring the header information of the original publisher, and restoring the message body, i.e., removing the security analysis result and the tag information.
Further, the message analysis transformation component is connected with the database to acquire the cluster information of the message middleware, the same-tag messages are distributed to the same queue of the same message middleware node, and the mimicry arbitration component on the node subscribes to the queue to acquire a group of same-tag messages and arbitrates.
Further, the message analysis and transformation assembly comprises a receiving unit, a tag identification unit, a data buffer unit, a security analysis unit, a load balancing message transformation unit, a mimicry information unit, a load balancing unit and a sending unit.
The receiving unit is used for receiving the information issued by the heterogeneous issuers.
The tag identification unit is used for identifying whether the message carries a mimicry tag.
The data caching unit is used for caching the messages which are not received completely, and transmitting the messages to the security analysis unit for security analysis after the messages are received completely.
The security analysis unit is used for carrying out semantic security analysis processing on the message and rapidly identifying and coping with potential security threats in the message.
The mimicry information unit is used for accessing the database, obtaining the cluster information of the message middleware and updating the cluster information to the local cache.
The load balancing message transformation unit is used for confirming the destination IP and the message middleware mimicry queue of the transformation message release according to the message middleware cluster information and the mimicry label through a label hash method and realizing the transformation of the message header.
The load balancing unit is used for carrying out load balancing processing on the message without the mimicry tag, and the optional load balancing method comprises a polling method, a weighted round robin method, a random method and a weighted random method.
The sending unit is used for publishing the message according to the destination IP.
Further, the security analysis unit analyzes and checks the message integrity and semantic security to obtain whether an abnormal Boolean value is obtained, and the abnormal Boolean value is stored in a message redundancy field or a custom field.
In particular, semantic security analysis can analyze the issued message by adopting various means such as lexical analysis, grammar analysis, semantic analysis, threat model matching and the like, so as to identify the attack behavior.
Further, the mimicry information unit acquires the message middleware cluster information from the database, wherein the message middleware cluster information comprises a node IP where the message middleware is located, a mimicry queue name and a mimicry processing state, and updates the locally cached message middleware cluster information.
Further, the load balancing message transformation unit adopts a tag hash method to confirm the IP and the mimicry queue of the sending destination from the cluster information of the message middleware, transforms the message header, enables the message to be finally inserted into the mimicry queue confirmed by the load balancing message transformation unit, and stores the information of the original message sending queue in a message redundancy field or a custom field.
In particular, the tag hash method calculates a numerical value through a hash function through the acquired message tag, and performs modulo operation on the size of the node list of the effective message middleware by using the numerical value to obtain the node serial number of the message to be sent to the message middleware.
In particular, when the message header is reformed, according to the node information of the message middleware which is determined to be distributed, the mimicry queue information on the node is obtained, the Routing Key value of the message header is changed into the mimicry queue name, and meanwhile, the original Routing Key value and the publisher information are stored in a redundant field or a custom field.
Further, the mimicry arbitration component comprises a subscription unit, a storage unit, an arbitration unit, a message reconstruction unit, a release unit and an exception reporting unit.
The subscription unit is used for subscribing the messages inserted in the mimicry queues appointed in the message middleware. After the subscription unit establishes connection with the message middleware, the subscription unit requests to create a mimicry message queue and subscribe, and meanwhile, the message middleware node information is updated to the database.
The storage unit is used for carrying out grouping cache on the message according to the mimicry tag and checking whether the data of the same mimicry tag are received completely to meet the judging condition.
The judging unit is used for selecting a corresponding judging algorithm according to the message security analysis result and the length characteristic, and judging the message group meeting the judging condition.
The message reconstruction unit is used for randomly selecting one message in the group in the message group passing through the arbitration, analyzing the appointed queue information in the message redundancy field or the custom field, and modifying the message into the message which can be issued to the service message queue.
The publishing unit is used for publishing the message to a service message queue of the designated message middleware node.
The exception reporting unit is used for reporting the arbitrated exception information to the feedback processing component in a specified format.
Furthermore, the judging unit flexibly judges according to the message semantic security analysis result and the length characteristic by selecting a corresponding judging algorithm.
Further, the message reconstruction unit selects the message to be released after normalization according to the result of the arbitration, replaces the existing message header Routing Key with the original Routing Key value reserved in the redundant field or the custom field, and removes the original Routing Key value, the label and the semantic analysis Boolean value of the redundant field or the custom field.
Further, the exception reporting unit reports the exception message and the publisher information related to the exception message to the feedback processing component in a contracted format according to the result of the exception judgment.
After the technical scheme is adopted, the invention has the following beneficial effects:
1. The invention solves the problem that the same label information is randomly distributed to different information middleware cluster nodes through the information analysis and transformation assembly. Conventionally, the on-label message may be distributed to the mimicry queues of different nodes, resulting in an inability to make efficient mimicry decisions. The invention adopts the tag hash method to accurately determine the target message middleware IP and the mimicry queue of the tag message, and ensures that the same tag message is intensively issued to the mimicry queue of the same node for processing. The improvement not only ensures the accuracy of the mimicry arbitration, but also avoids the limitation of the multi-node cluster expansion function of the message middleware caused by the mimicry arbitration and normalization processing, meets the requirement of high concurrent processing, and obviously improves the message processing efficiency and the reliability of the system.
2. The invention carries out semantic security analysis on the tag message through the message analysis and transformation component, deeply analyzes the message content and detects potential threat. In the mimicry arbitration component, semantic security analysis results are combined with mimicry arbitration algorithms to arbitrate from multiple dimensions. The multi-dimensional security policy realizes redundant design, and effectively avoids the problems of loopholes and misjudgment of a single mechanism. Through the deep fusion of semantic analysis and algorithm, the system can accurately identify complex threats, and the accuracy and reliability of arbitration are obviously improved. The innovative mechanism greatly enhances the overall security of the system
Drawings
Fig. 1 is a system schematic block diagram of the present invention.
Fig. 2 is a schematic flow chart of the method of the present invention.
Fig. 3 is a schematic diagram of the structure of the message analysis retrofit assembly of the present invention.
FIG. 4 is a flow chart of a method of message analysis retrofit assembly of the present invention.
FIG. 5 is a schematic diagram of the architecture of the mimetic arbitration component of the present invention.
FIG. 6 is a flow chart of a method of mimicking an arbitration component in the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following describes in further detail the features and performances of an information processing system based on a mimetic solution according to the present invention with reference to the accompanying drawings and embodiments.
Referring to fig. 1-2, an information processing system based on a mimetic arbitration method includes an input distribution agent component, a heterogeneous publisher pool, a message analysis transformation component, a message middleware, a mimetic arbitration component, a database and a feedback control component.
The input distribution agent component is used for receiving user request information, randomly generating 64-byte character strings for the request information with the same content, inserting the 64-byte character strings into the user request information as mimicry labels, and copying and distributing the request information added with the mimicry labels to equivalent heterogeneous publishers in the heterogeneous publisher pool.
The heterogeneous publisher is used for receiving user request information with a mimicry tag forwarded by the input distribution agency component, extracting the mimicry tag in the user request information, adding the tag into a packet body of a message to be published, and distributing the message carrying the tag to the message analysis and transformation component.
The message analysis transformation component is used for receiving the publisher message, carrying out security analysis, simulating information synchronization, transforming the message and sending the message to the message middleware.
Specifically, the message analysis transformation component, after receiving the publisher message, checks the extracted tag and proceeds as follows depending on whether the tag is present.
And for the information without the label, security analysis and information transformation are not carried out, and transmission forwarding is carried out through a common load balancing algorithm.
For the message containing the label, the message analysis transformation component performs security analysis on the message, including integrity check and semantic security analysis on the message body, and stores the semantic analysis Boolean result in the message custom field. And acquiring the state and queue information of the message middleware from the database, and updating the corresponding information stored locally. And obtaining the message middleware nodes and queues to be sent by adopting a tag hash algorithm according to the obtained message middleware cluster information. And saving the original Routing Key of the message header to a message custom field, changing the queue name obtained by the hash calculation of the tag into a Routing Key value, and sending the Routing Key value to the message middleware of the designated node.
The message middleware is connected with the mimicry arbitration component, and is used for receiving the publisher message, resolving the message and selecting to insert into the queue, and the mimicry arbitration component is used for subscribing the message from the message middleware, arbitrating the normalized processing message, restoring the message, publishing the message and feeding back the arbitration result.
Specifically, the message middleware receives the issued message and analyzes the message header, and adds the message into a mimicry queue designated by the Routing Key according to the header Routing Key value.
The mimetic arbitration component subscribes to receive messages specifying the mimetic queues and updates the local node message middleware information to the database. The received messages are grouped according to the labels, whether the judgment is met or not is judged, and the simulated judgment is carried out on the message group meeting the judgment and the message semantic analysis result. And after the judgment is passed, randomly selecting a message according to a normalization processing method, changing the message header RoutingKey value into an initial Routing Key value stored in a custom field, and then issuing the modified message to a local message middleware node.
The message middleware analyzes and processes the simulated, arbitrated and normalized message, inserts the analyzed and processed message into a service message queue, and finally obtains the message from a subscriber.
The database is connected with the mimicry arbitration component and the message analysis modification component for information synchronization between the mimicry arbitration component and the message analysis modification component. The mimicry arbitration component updates information such as message middleware node IP, mimicry queue name, mimicry processing state, etc. to the database. The message analysis and transformation component inquires the information from the database, and determines the message middleware node and the mimicry message queue which are sent by the message analysis and transformation component according to the information and a load balancing algorithm.
Specifically, under the condition of message middleware cluster deployment, each deployed message middleware node is provided with a mimicry component, and the mimicry component acquires the information of the local message middleware node and updates the information to a database after finishing the information format. The message analysis transformation component is connected with the database to acquire message middleware cluster information, and distributes the same-tag messages to the same queue of the same message middleware node, and the mimicry arbitration component on the node subscribes the queue to acquire a group of same-tag messages and arbitrates.
The feedback control component is connected with the mimicry arbitration component and is used for receiving mimicry arbitration abnormal feedback information, analyzing and processing the abnormal information, launching state scheduling control information to the heterogeneous publisher pool, and carrying out heterogeneous publisher restarting rotation on the heterogeneous publisher pool if necessary.
Referring to fig. 3 to 4, the message analysis and transformation assembly includes a receiving unit, a tag identification unit, a data buffer unit, a security analysis unit, a load balancing message transformation unit, a mimetic information unit, a load balancing unit, and a sending unit.
The receiving unit is used for receiving the information issued by the heterogeneous issuers.
The tag identification unit is used for identifying whether the message carries a mimicry tag. Judging whether the message carries a label according to the agreed protocol format, and extracting the label if the message carries the label.
The data caching unit is used for judging whether the message is complete according to the agreed protocol format, caching the incomplete message if the message is incomplete, waiting for receiving the subsequent message content and judging whether the message is complete, and delivering the complete message received by the data to the security analysis unit for processing.
The security analysis unit is used for carrying out traditional security semantic analysis and check on the message to obtain whether the semantic analysis is abnormal Boolean value, and storing the abnormal Boolean value in a message redundant field or a custom field.
The mimicry information unit is used for accessing the database, acquiring cluster dynamic information of the message middleware from the database, including the node IP where the message middleware is located, mimicry queue names, mimicry processing states and the like, and updating the cluster information of the message middleware in the local cache.
The load balancing message transformation unit is used for confirming the destination IP and the message middleware mimicry queue of the transformation message release according to the message middleware cluster information and the mimicry label through a label hash method and realizing the transformation of the message header.
Specifically, the load balancing message transformation unit adopts a tag hash method to confirm the IP and the mimicry queue of the sending destination from the cluster information of the message middleware, transforms the message header, enables the message to be finally inserted into the mimicry queue confirmed by the load balancing message transformation unit, and stores the information of the original message sending queue in a message redundancy field or a custom field.
The label hash method obtains a numerical value through the obtained message label and the hash function calculation, and performs modular operation on the size of the effective message middleware node list by using the numerical value to obtain the node serial number of the message to be sent to the message middleware.
When the message header is reformed, according to the node information of the message middleware which is determined to be distributed, the mimicry queue information on the node is obtained, the Routing Key value of the message header is changed into the mimicry queue name, and meanwhile, the original Routing Key value and the publisher information are stored in a redundant field or a custom field.
For the message without the mimicry tag, the load balancing unit performs load balancing processing on the message, and optional load balancing methods comprise a polling method, a weighted round robin method, a random method and a weighted random method.
The sending unit is used for publishing the message to the message middleware according to the destination IP.
Referring to fig. 5 to 6, the mimicry arbitration component includes a subscription unit, a storage unit, an arbitration unit, a message reconstruction unit, a publishing unit, and an exception reporting unit, and the implementation steps are as follows.
The subscription unit is used for subscribing the messages inserted in the mimicry queues appointed in the message middleware. After the subscription unit establishes connection with the message middleware, the subscription unit requests to create a mimicry message queue and subscribe, and meanwhile, the message middleware node information is updated to the database.
The storage unit is used for carrying out grouping cache on the information according to the mimicry tag, converging the same tag data into a group, checking whether the data of the same mimicry tag completely meet the judging condition or not, and if the data of the same mimicry tag completely meet the judging condition, processing the data by the judging unit.
The judging unit is used for selecting a corresponding judging algorithm according to the semantic analysis result and the length characteristic of the message and judging the message group meeting the judging condition.
Specifically, if the semantic security analysis result is abnormal, the arbitration unit adopts a strict arbitration algorithm to process, such as high-number voting, mask voting and the like based on history information. If the semantic security analysis result is normal, processing by a higher-efficiency arbitration algorithm, such as fast voting, monitoring voting and the like.
The message reconstruction unit is used for randomly selecting one message in the group in the message group passing through the arbitration, analyzing the appointed queue information in the message redundancy field or the custom field, and modifying the message into the message which can be issued to the service message queue.
Specifically, the message reconstruction unit selects the message to be issued after normalization according to the result of the arbitration, replaces the Routing Key of the existing message header with the original Routing Key value reserved in the redundant field or the custom field, and removes the original Routing Key value, the label, the semantic analysis boolean value and the publisher information of the redundant field or the custom field.
The publishing unit is used for publishing the message to a service message queue of the designated message middleware node.
The exception reporting unit is used for reporting the exception message and the publisher information related to the exception message to the feedback processing component in a contract format according to the result of the exception judgment.
It should be noted that, in the present embodiment, the parts not described in detail are all prior art, and the above embodiments are only for illustrating the present invention, but the present invention is not limited to the above embodiments, and any simple modification, equivalent variation and modification made to the above embodiments according to the technical substance of the present invention falls within the protection scope of the present invention.