Virtual machine flow monitoring method and device, and terminal

A monitoring device and virtual machine technology, applied in the Internet field, can solve the problems of data theft and monitoring, and achieve the effect of improving security

Inactive Publication Date: 2016-05-18
BEIJING QIHOO TECH CO LTD +1
View PDF7 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Due to the virtualization of multi-group call services, there is no traditional boundary, so it is impossible to monitor the interaction between virtual machines or between virtual machines of different physical terminals. Therefore, data between various departments within the enterprise may be risk of theft

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual machine flow monitoring method and device, and terminal
  • Virtual machine flow monitoring method and device, and terminal
  • Virtual machine flow monitoring method and device, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0054] figure 1 Shows a schematic flow chart of a method for monitoring virtual machine traffic provided by an embodiment of the present invention, such as figure 1 As shown, in the method, a proxy client is set in the virtual machine, and the proxy client is connected to the control center. The method includes:

[0055] 101. The proxy client obtains access traffic of the virtual machine, and monitors the access traffic according to a prese...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a virtual machine flow monitoring method and device. A virtual machine is internally provided with an agent client which is in connection with a control center. The method comprises: the agent client obtaining the access flow of the virtual machine, and performing monitoring on the access flow according to a preset strategy; and the agent client determining whether to intercept the access flow of the virtual machine according to the monitoring result, wherein the preset strategy is a strategy issued by the control center according to the identification of the virtual machine and corresponding to the virtual machine. The method monitors the access flow of each virtual machine through the agent client in the virtual machine, realizes interactive monitoring between virtual machines or virtual machines of different physical terminals, and improves virtual machine inner data security.

Description

Technical field [0001] The present invention relates to the field of Internet technology, in particular to a method, device and terminal for monitoring virtual machine traffic. Background technique [0002] Generally, enterprises have multiple physical terminals, and there is only one entrance or exit to the outside world. By adding a firewall to the entrance or exit, border defense is carried out. With the increasing application of computers and networks and the increasing variety of business in different fields , A virtual machine in a distributed environment (virtual machine refers to a computer system that runs on a physical machine through software simulation, has complete hardware system functions, and runs in a completely isolated environment) came into being. [0003] Because virtualized multi-group call services have no traditional boundaries, it is impossible to monitor the interaction between virtual machines and virtual machines or between virtual machines of different ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F9/455
CPCH04L63/1408G06F9/45533H04L63/0281H04L63/20
Inventor 汤迪斌杨晓东
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products