Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security defense method and system for cloud environment and computer readable storage medium

A security defense and cloud environment technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as inability to judge the state of suspended animation, blocked traffic of protected nodes, and slow network recovery speed, and achieve low-delay faults The effect of identification and fault recovery capabilities, high-availability serial defense capabilities, and high-availability automation

Inactive Publication Date: 2019-07-05
BEIJING LEADSEC TECH +1
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, for serial defense products, in addition to security defense capabilities, the most important thing is high availability. Once a serial defense product without high availability capabilities is damaged, all traffic to the protected node may be blocked. Blocking, resulting in network paralysis, the consequences are very serious
[0004] The solutions of some mainstream manufacturers set up the active and standby nodes, and manually switch when the user detects a network anomaly. This method judges the anomaly based on the subjective behavior of the user, and through manual recovery, the network recovery speed is very slow and the effect is not good.
Some manufacturers judge by judging the power-on and power-off status of the security node. This method cannot judge the state of suspended animation (that is, the security node is powered on, but the traffic is not processed and forwarded internally, thereby blocking the traffic), and the monitoring effect is poor. Once the node appears The state of suspended animation may still lead to network paralysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security defense method and system for cloud environment and computer readable storage medium
  • Security defense method and system for cloud environment and computer readable storage medium
  • Security defense method and system for cloud environment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0048] Such as figure 1 As shown, a security defense system for a cloud environment according to an embodiment of the present invention includes a first virtual security network element module 101, a first virtual interaction network element module 102, and a first detection module 103, wherein:

[0049] The first virtual security network element module 101 includes one or more virtual security network element groups for implementing security defense functions, and the virtual security network element group includes two virtual security network elements, active and standby; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security defense method and system for a cloud environment and a computer readable storage medium. The system comprises a first virtual security network element module, a first virtual interactive network element module and a first detection module; the first virtual security network element module comprises one or more virtual security network element groups, and each virtual security network element group comprises a main virtual security network element and a standby virtual security network element; the first virtual interactive network element module carries outflow forwarding between the cloud platform and a first defense service chain, and the first defense service chain is a security defense loop which is connected with each virtual security network element group according to a specified sequence; the first detection module detects whether each main and standby virtual security network element is available or not through a first detection service chain, and the first detection service chain is an available test loop for connecting the first detection module and each virtual security network element. According to the application, the main virtual security network element and the standby virtual security network element are arranged, and the node fault is detected by detecting the service chain, so that the high-availability serial defense capability and the automatic and low-delay fault identification and recovery capability are realized.

Description

technical field [0001] The present invention relates to the technical field of computer security, in particular to a security defense method and system for a cloud environment, and a computer-readable storage medium. Background technique [0002] With the continuous development of the network information age, cloud computing has gradually become the mainstream deployment method for various industries and businesses. However, after services are migrated to the cloud, traditional security problems will not only be magnified, but also new security risks will be brought. The current practice of mainstream manufacturers is to deploy virtual security network elements in an external security resource pool in a side-mounted manner, and divert traffic to the external resource pool in the cloud to realize the virtualization function. When traffic is introduced into the security resource pool, serial defense products are arranged in a certain order by building a software service chain ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/707H04L12/26H04L45/24
CPCH04L41/0663H04L45/22H04L43/10
Inventor 郭春梅胡毅勋
Owner BEIJING LEADSEC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products