Cloud computing environment-based distributed network security pre-warning method

A technology of distributed network and cloud computing environment, applied in the field of distributed network and distributed network security early warning based on cloud computing environment, can solve the problems of no self-adaptation, inability to alarm data aggregation, selection of data sets, etc.

Active Publication Date: 2010-06-02
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF0 Cites 69 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First, there is no adaptability. The current network early warning models all adopt a fixed topology architecture, which does not have the ability to adapt to the network security situation, and is not suitable for large-scale network environments. Second, the survivability is low. Most networks The early warning model adopts the architecture of a single early warning center, which has a high risk of single point failure, and will cause network congestion near the early warning center; third, the data flow control capability is weak, and the mainstream network early warning models all adopt centralized sharing of security data structure, cannot dynamically select the data sets that need to be interacted with according to the attack type, and the utilization rate of hardware resources and network bandwidth is low; fourth, the coordination is poor, and the alarm data of heterogeneous security protection facilities cannot be effectively aggregated. There is also a lack of effective solutions for data exchange in security domains

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing environment-based distributed network security pre-warning method
  • Cloud computing environment-based distributed network security pre-warning method
  • Cloud computing environment-based distributed network security pre-warning method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The core technical content of the present invention will be described in further detail below through embodiments in conjunction with the accompanying drawings.

[0056] This embodiment describes a specific distributed network security early warning architecture based on cloud computing environment.

[0057] The architecture of this embodiment is a dynamic hierarchical architecture composed of a top-down three-layer peer-to-peer overlay network and three types of core nodes including a control center, a task coordination center and a security agent. The overall function of the prototype system built on it can be summarized as follows:

[0058] 1) Unify the alarm information from various network security protection facilities, and extract attack characteristics through collaborative correlation analysis of dynamic organization, so as to give early warning of local network intrusion or attack;

[0059] 2) Generate a global attack scenario graph and predict future attack ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud computing environment-based distributed network security pre-warning method, which belongs to the technical field of network security. The method comprises that: a plurality of management domains are set, wherein each management domain comprises a control central node and more than one security proxy node, and the control central nodes are in peer connection; the security proxy nodes discover abnormal events through peripheral equipment, extract event information, generate warning messages and transmit warning information to the corresponding control central nodes; the control central nodes receive the warning messages transmitted by the corresponding security proxy nodes and the other control central nodes and combine the central nodes meeting a combination condition into a task group; the security proxy nodes in the task group are in the peer connection and one security proxy node serves as a task coordination central node to coordinate the security proxy nodes in the group to complete tasks together; and the task group is in data connection with the control central nodes through the task coordination central node.

Description

technical field [0001] The invention relates to a distributed network, in particular to a distributed network security early warning method based on a cloud computing environment, and belongs to the technical field of network security. Background technique [0002] At present, the development trend of network malicious code technology has the main characteristics of explosive transmission, self-organizing structure and distributed cooperation. Incalculable potential security risks. Cyber ​​hackers can use the distributed platform built by malicious codes to carry out large-scale network intrusions and attacks, including stealing or destroying sensitive information, launching large-scale denial of service attacks, engaging in economic crimes, and even paralyzing backbone network services. In order to solve this problem, intrusion detection systems, firewalls, vulnerability scanners, anti-virus gateways and other security protection facilities are deployed in almost all netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/26H04L29/06H04L29/08
Inventor 许佳苏璞睿
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products