Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud computing environment intrusion detection system configuration and method thereof

An intrusion detection system and cloud computing environment technology, applied in transmission systems, electrical components, etc., can solve problems such as low detection performance, architectural redundancy, and potential security risks, and achieve the effect of simplifying user interface and reducing the amount of calculation.

Active Publication Date: 2017-10-24
CHINA UNIV OF PETROLEUM (EAST CHINA)
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) The redundancy and complexity of the intrusion detection system architecture in the current cloud computing environment are large;
[0006] (2) Using the current cloud computing environment intrusion detection system architecture to process large-scale data takes a lot of time;
[0007] (3) The detection performance of the intrusion detection system architecture in the current cloud computing environment is not high, and the real-time performance is low;
[0008] (4) In the face of abnormal situations in the dynamic and changeable cloud computing environment, traditional network intrusion technologies face bottlenecks in the face of large-scale intrusion data of known and unknown types, and there are security risks
[0009] To sum up, in view of the huge time overhead, low detection performance and low real-time performance of traditional network intrusion detection technology in the cloud computing environment when processing large-scale data, and the existence of intrusion detection system architecture in the current cloud computing environment Problems of redundancy and complexity, lack of effective solutions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing environment intrusion detection system configuration and method thereof
  • Cloud computing environment intrusion detection system configuration and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] In order to solve the existing problems introduced in the background technology, the present invention provides a cloud computing environment intrusion detection system architecture. The system framework of the present invention is designed from four aspects of distribution, scalability, real-time and self-adaptability, effectively reducing various risks that may occur in the cloud computing environment, continuously learning for new types of attacks, and improving security technology while improving Quality of Cloud Services.

[0073] In order to achieve the above object, the present invention adopts the following technical scheme:

[0074] Such as figure 1 as shown,

[0075] A cloud computing environment intrusion detection system architecture CIDaaS, the system architecture CIDaaS includes:

[0076] Cloud intrusion detection proxy layer, the cloud intrusion detection proxy layer is set at the virtual machine level, and is used to provide accompanying monitoring se...

Embodiment 2

[0101] In order to solve the problem of intrusion detection of abnormal conditions in a dynamic and changeable cloud environment, the present invention provides an intrusion detection method for a cloud computing environment. The intrusion detection method is based on the above-mentioned intrusion detection system architecture for a cloud computing environment CIDaaS.

[0102] In order to achieve the above object, the present invention adopts the following technical scheme:

[0103] Such as figure 2 As shown, the cloud computing environment intrusion detection method is executed in the cloud intrusion detection agent module CIDA,

[0104] A cloud computing environment intrusion detection method, the method comprises the following steps:

[0105] (1) Data collection: use the Sysstat tool to collect the comprehensive performance log of the cloud computing environment of the virtual machine VM, and unify the collection format during the collection process;

[0106] (2) Data pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a cloud computing environment intrusion detection system configuration and a method thereof. The system configuration comprises a cloud intrusion detection agent layer, a cloud intrusion detection domain control layer, a cloud intrusion detection domain control management layer and a cloud machine learning layer. An intrusion detection model is operated in the cloud intrusion detection agent layer, the conditions such as operation and network communication of a virtual machine can be monitored at the same cloud domain; the cloud intrusion detection agent layer in the same cloud domain performs information sharing to help other virtual machines perform prevention of intrusion threat; and the system configuration is a light-weight intrusion detection configuration so as to effectively improve the redundancy and the complexity of the intrusion detection configuration in a current cloud environment.

Description

technical field [0001] The invention belongs to the technical field of intrusion detection and cloud computing, and in particular relates to an architecture of a cloud computing environment intrusion detection system and a method thereof. Background technique [0002] Intrusion detection technology is an important network security protection technology that accompanies the development of network security technology. Depending on the environment used, by directly or indirectly collecting key information on computers and networks, monitoring host activities and network dynamics, auditing network traffic, unauthorized access, etc., tracking abnormal activities and other signs, intrusion detection The technology can identify whether there are abnormal situations or intrusions in the current environment; at the same time, the technology can respond in time according to the monitoring results to alert network administrators and users of related threat activities. From this point ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/14H04L63/1458
Inventor 孙运雷孔言孙晓
Owner CHINA UNIV OF PETROLEUM (EAST CHINA)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products