Security network invasion detection system suitable for virtual machine environment

An intrusion detection system and intrusion detection technology, applied in the field of computer security, can solve the problems of undetectable intrusion behavior and threats to the security of the intrusion detection system, and achieve the effect of strong anti-attack ability and robustness, and convenient global unified configuration

Inactive Publication Date: 2008-11-19
HUAZHONG UNIV OF SCI & TECH
View PDF0 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Through the research, it is found that these two intrusion detection systems have their own advantages and disadvantages: the host-based intrusion detection system can detect the intrusion behavior in the system very well, and can detect the behavior in the system very well. ; but the host intrusion detection system itself cannot well defend against the attacks on the system or the intrusion detection system itself. It is visible to the attacker and can be easily detected by various means.
The network-based intrusion detection system is invisible to intruders, so it has good robustness, but it cannot detect the intrusion behavior of the system. Once the attacker bypasses the intrusion detection system, he will no longer be affected any control
In addition to the above two characteristics, whether it is a host-based intrusion detection system or a network-based intrusion detection system, since it is not well isolated from the system where it is located, it is easy for attackers to detect The existence of such an intrusion detection system poses a great threat to the security of the intrusion detection system itself.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security network invasion detection system suitable for virtual machine environment
  • Security network invasion detection system suitable for virtual machine environment
  • Security network invasion detection system suitable for virtual machine environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The invention utilizes the isolation of the virtual machine, the transparency of the underlying system, and high efficiency to design a network intrusion detection system built on a novel virtual machine architecture. In this system, not only using the structural characteristics of the virtual machine to achieve a more secure and robust intrusion detection system, but also paying great attention to how to use the mature intrusion detection theory to provide a new type of computer based on virtual computing theory Architecture implements security guarantees. The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0029] Such as figure 1 As shown, the safety net intrusion detection system suitable for virtual machines is mainly divided into two parts in terms of architecture: one part is the intrusion detection part located in the intrusion detection virtual machine 1, including the server-side inter-domain communi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe network intrusion detection system which is applicable to the virtual machine environment and includes a server inter-domain communication control module, an intrusion detection engine module, an intrusion response control module in the intrusion detection virtual machine, a client inter-domain communication control module, a domain spilt event detector module and a domain split response control module in the detected application virtual machines. According to the problem that the safety of the virtual machine system of the virtual machine needs to be improved; the current intrusion detection system cannot realize the purpose, the safe network intrusion detection system considers the layering structure of the virtual machine network sufficiently and realizes the intrusion detection protection of the virtual machine system in the internal network based on the virtual machine; the safety of the virtual machine applied in the production practice activities is improved; meanwhile, the separation of the intrusion detection system and the protected system is realized based on the separation safety property of the virtual machine; compared with the traditional network intrusion detection system, the safe network intrusion detection system has better safety and reliability.

Description

technical field [0001] The invention belongs to the fields of computer safety and virtual computing, and is a safety network intrusion detection system suitable for a virtual machine environment. Background technique [0002] With the development of computer technology and network communication technology, computer network has been popularized rapidly in recent years, and has become an important medium for information exchange and sharing in the whole society, profoundly changing people's work and life style. With the rapid development of computers, the problem of network information security has become increasingly serious, and has become an important factor restricting the development of network and Internet economy. In recent years, cyber attacks and information security incidents have emerged one after another, involving more and more fields, and causing more and more harm. [0003] Network intrusion detection technology is a kind of network information security technol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/24H04L29/06
Inventor 金海赵峰杨卫平邹德清项国富蒋雅利
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products