Abstract: To address the challenge that DHR system services face in coping with common vulnerability attacks, this paper proposes an algorithm to optimize the rules for constructing the executor.