Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Detection method and detection device for network security in cloud computing network

A cloud computing network and network security technology, applied in the field of cloud computing, can solve problems such as attack, virtual machine infection, virtual machine occupying system resources, etc., to achieve the effect of ensuring security

Active Publication Date: 2014-12-17
CHINA MOBILE COMM GRP CO LTD
View PDF7 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method has the following defects: since the virtual switch needs to forward the data packets during the monitoring process, too many resources of the physical host will be consumed, and it is not convenient to flexibly implement specific security policies for the virtual machine
[0007] However, in the existing technology, only the communication traffic of the virtual machine is monitored, filtered, and protected, but it is impossible to detect and take measures in time for security threats or attacks outside the monitoring and filtering rules, specifically including the following two aspects :
[0008] First, the virtual machine's own security protection software or security configuration cannot be detected in time after it is maliciously uninstalled or disabled
The virtual machine will install and configure the corresponding self-protection mechanism when it is created. Once the malicious user uninstalls or disables the relevant security protection software, it may cause the unprotected virtual machine to be infected with viruses and Trojan horses to threaten the security of VMM or other virtual machines. , thus affecting the security of the entire cloud computing network
[0009] Second, normal virtual machines cannot be detected in time after they are infected with viruses, Trojan horses, or execute certain malicious codes.
After a normal virtual machine is inadvertently infected with a virus, a Trojan horse, or executes a malicious code, it will cause security issues such as covert channel attacks, virtual machine escape, or root access to the physical host, which in turn will cause the attacker to directly control the VMM, thereby threatening the entire Cloud Computing Network Security
In addition, after a normal virtual machine is infected with a virus, a Trojan horse, or executes a malicious code, the virtual machine may maliciously occupy a large amount of system resources, which may cause other virtual machines belonging to the same physical host to fail to operate normally.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method and detection device for network security in cloud computing network
  • Detection method and detection device for network security in cloud computing network
  • Detection method and detection device for network security in cloud computing network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] The detection method of network security in the cloud computing network of this embodiment, such as Figure 4 shown, including the following steps:

[0072] Step 401: When it is necessary to apply for a virtual machine, the user sends a service request to the cloud computing operation management platform through the self-service portal of the cloud computing operation management platform;

[0073] Step 402: the cloud computing operation and management platform receives the service request and, after reviewing the received service request, issues an instruction to allocate resources to the resource pool management platform through the management interface;

[0074] Step 403: After receiving the instruction, the resource pool management platform allocates a corresponding virtual machine to the user;

[0075] Here, the specific implementation of steps 401-403 is the prior art, and will not be repeated here.

[0076] Steps 404-405: The resource pool management platform tr...

Embodiment 2

[0107] The detection method of network security in cloud computing in this embodiment, such as Figure 5 shown, including the following steps:

[0108] Step 501: When it is necessary to apply for a virtual machine, the user sends a service request to the cloud computing operation management platform through the self-service portal of the cloud computing operation management platform;

[0109] Step 502: the cloud computing operation and management platform receives the service request and, after reviewing the received service request, issues an instruction to allocate resources to the resource pool management platform through the management interface;

[0110] Step 503: After receiving the instruction, the resource pool management platform allocates a corresponding virtual machine to the user;

[0111] Here, the specific implementation of steps 501-503 is the prior art, and will not be repeated here.

[0112] Steps 504-505: the resource pool management platform triggers the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a detection method for network security in a cloud computing network. The detection method includes: detecting whether current security information of a virtual machine is rectified or not after recognizing the virtual machine is started; if rectification is determined, performing corresponding restoring operations according to rectified results. The invention further discloses a detection device for the network security in the cloud computing network. By the detecting method and the detection device, the virtual machine with potential security hazards can be effectively prevented from attaching a virtual machine monitor (VMM) and other virtual machines subordinating to the same physical host as well as the entire cloud computing network.

Description

technical field [0001] The invention relates to network security technology in the field of cloud computing, in particular to a method and device for detecting network security in a cloud computing network. Background technique [0002] In cloud computing technology, virtualization technology can be used to implement multiple virtual machines running on the same physical host at the same time, and data packets between virtual machines belonging to the same physical host are forwarded without going through a physical switch. That is to say, the communication flow between virtual machines belonging to the same physical host is not monitored and managed by physical switches or other network devices in the network. The virtual machine initiates internal attacks such as abnormal traffic, which in turn threatens the security of the entire cloud computing network. [0003] In the prior art, in order to prevent a virtual machine from initiating an attack to other virtual machines b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 任兰芳柏洪涛王静左敏侯长江
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products