Traffic visualization method, system and device, and medium

A traffic and device technology, applied in the field of cloud security, can solve problems such as vulnerability to network security incidents and high complexity of hybrid cloud infrastructure

Active Publication Date: 2019-03-12
BEIJING QIANXIN TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While this network architecture is convenient for enterprise management, the complexity of the hybrid cloud infrastructure is high. If the protection of virtual machines is not in place, it is easy to be attacked by network security incidents.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traffic visualization method, system and device, and medium
  • Traffic visualization method, system and device, and medium
  • Traffic visualization method, system and device, and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0025] The first aspect of the present invention provides a flow visualization method, including: S1, draw the internet layer, firewall layer, WAF layer and virtual host layer on the visualization interface according to the actual network architecture, wherein the internet layer is the internet network, and the firewall layer Including at least one firewall, the WAF layer includes at least one WAF, the virtual host layer includes at least one virtual host group, and each virtual host group includes at least one virtual host; S2, the internet network, firewall, WAF and virtual host groups are combined with the real network architecture S3, according to the connection relationship of each device in the actual network archite...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a traffic visualization method, which comprises the following steps: S1, drawing an internet layer, a firewall layer, a WAF layer and a virtual host layer on a visual interfaceaccording to a real network framework; S2, associating the internet network, the firewall, the WAF and the device in the virtual host layer packet with the device in the real network framework; S3, drawing lines between the internet network, the firewall, the WAF and the virtual host layer packet on the visual interface according to a connection relationship of the devices in the real network framework; S4, highlighting the lines between the internet network, the firewall, the WAF and the virtual host packet so as to show the traffic orientation between the devices in the current real networkframework. On the other aspect, the invention also provides a traffic visualization system and device, and a computer readable medium. The protective state of the current virtual host can be intuitively shown by building a visual network framework coincident with the real network framework; and the protective state of the virtual host can be changed through manners of direct dragging and the like.

Description

technical field [0001] The invention relates to the technical field of cloud security, in particular to a traffic visualization method, system, equipment and media. Background technique [0002] With the development of virtualization technology, more and more enterprises are going to the public cloud, and the more typical network architecture is a public-private hybrid data center architecture. While this network architecture is convenient for enterprise management, the complexity of the hybrid cloud infrastructure is high. If the protection of virtual machines is not in place, it is easy to be attacked by network security incidents. Enterprise network security personnel hope to be able to visually view the protection status and traffic direction of virtual machines, and to easily increase or decrease security components, so as to effectively protect internal enterprise facilities from external network incident attacks. Contents of the invention [0003] (1) Technical pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26
CPCH04L43/045H04L63/02H04L63/1408
Inventor 李秋生张洪冯顾
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products