A flow visualization method, system, device and medium

A traffic and device technology, applied in the field of cloud security, can solve problems such as vulnerability to network security incidents and high complexity of hybrid cloud infrastructure

Active Publication Date: 2021-07-06
BEIJING QIANXIN TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While this network architecture is convenient for enterprise management, the complexity of the hybrid cloud infrastructure is high. If the protection of virtual machines is not in place, it is easy to be attacked by network security incidents.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A flow visualization method, system, device and medium
  • A flow visualization method, system, device and medium
  • A flow visualization method, system, device and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0025] The first aspect of the present invention provides a flow visualization method, including: S1, draw the internet layer, firewall layer, WAF layer and virtual host layer on the visualization interface according to the actual network architecture, wherein the internet layer is the internet network, and the firewall layer Including at least one firewall, the WAF layer includes at least one WAF, the virtual host layer includes at least one virtual host group, and each virtual host group includes at least one virtual host; S2, the internet network, firewall, WAF and virtual host groups are combined with the real network architecture S3, according to the connection relationship of each device in the actual network archite...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a flow visualization method, comprising: S1, drawing the internet layer, firewall layer, WAF layer and virtual host layer on the visualization interface according to the actual network architecture; S2, grouping the internet network, firewall, WAF and virtual host The devices in the real network architecture are associated with the devices in the real network architecture; S3, according to the connection relationship of each device in the real network architecture, draw the lines between the internet network, firewall, WAF and virtual host groups on the visual interface; S4, by highlighting Lines between the internet network, firewall, WAF and virtual host groups are displayed to represent the flow direction between devices in the current real network architecture. On the other hand, the present invention also provides a traffic visualization system, device and computer-readable medium. By establishing a visualized network architecture consistent with the actual network architecture, the protection status of the current virtual host can be seen intuitively, and the protection status of the virtual host can be changed by directly dragging and dropping.

Description

technical field [0001] The invention relates to the technical field of cloud security, in particular to a traffic visualization method, system, equipment and media. Background technique [0002] With the development of virtualization technology, more and more enterprises are going to the public cloud, and the more typical network architecture is a public-private hybrid data center architecture. While this network architecture is convenient for enterprise management, the complexity of the hybrid cloud infrastructure is high. If the protection of virtual machines is not in place, it is easy to be attacked by network security incidents. Enterprise network security personnel hope to be able to visually view the protection status and traffic direction of virtual machines, and to easily increase or decrease security components, so as to effectively protect internal enterprise facilities from external network incident attacks. Contents of the invention [0003] (1) Technical pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/26
CPCH04L43/045H04L63/02H04L63/1408
Inventor 李秋生张洪冯顾
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products