Safety enhanced virtual machine communication method and virtual machine system

A communication method and virtual machine technology, applied in the direction of secure communication devices, transmission systems, digital transmission systems, etc., can solve the problems of VM1 infection and no security protection mechanism, and achieve the effect of reducing costs and protecting investment

Inactive Publication Date: 2010-08-11
IBM CN
View PDF3 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Assuming that the virtual machine VM3 sends an attack code package to VM1, because there is no security protection mechanism, VM1 is easily infected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety enhanced virtual machine communication method and virtual machine system
  • Safety enhanced virtual machine communication method and virtual machine system
  • Safety enhanced virtual machine communication method and virtual machine system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] image 3 A schematic block diagram of a security-enhanced virtual machine system according to this embodiment is shown.

[0031] As shown in the figure, the virtual machine system 350 according to this embodiment includes multiple virtual machines, such as VM1, VM2 and VM3. Please note that although this embodiment uses three virtual machines as an example for illustration, those skilled in the art can understand that this is only for convenience of explanation, not limitation. You can actually include as many virtual machines as you want. In this embodiment, these virtual machines are located on the same physical machine (such as server, mainframe, workstation, etc.).

[0032] The virtual machine system 350 also includes a virtual network (VNet) security manager 300 and a VM shadow system 320 coupled thereto. The VM shadow system 320 is located on another physical machine different from the physical machine where the virtual machines VM1, VM2, and VM3 are located. ...

Embodiment 2

[0045] Figure 4 It is a schematic block diagram showing a security-enhanced virtual machine system according to another embodiment of the present invention. exist Figure 4 , using the same notation as the image 3 The same device, and its detailed description is omitted.

[0046] The difference between the virtual machine system 350' of this embodiment and the virtual machine system 350 of Embodiment 1 is that the VNet security manager 300' also includes a VNet division controller 305.

[0047] The VNet partition controller 305 is coupled to the VNet communication controller 301 . If the VNet communication controller 301 does not receive the response information returned from the VM shadow system 320 within the specified time, it will notify the VNet division controller 305 to adjust the VNet. The VNet division controller 305 adjusts the VNet to divide the virtual machine VM3 sending packets into a virtual subnetwork (not shown) separate from other virtual machines, and ...

Embodiment 3

[0050] Figure 5 A flowchart showing a security-enhanced virtual machine communication method according to yet another embodiment of the present invention.

[0051] The virtual machine communication method according to this embodiment can be implemented on the virtual machine system described in Embodiment 1. Such as Figure 5 As shown, firstly, at step 501, the VNet communication controller detects, for example, a packet sent from a virtual machine VM3 located on the same physical machine to VM1.

[0052] Then, at step 510, the detected packet is maintained in shared memory and the packet is copied.

[0053] Next, at step 520, the retained package may be tagged with a universally unique identifier UUID.

[0054] Then, at step 530, the copied packet and UUID are forwarded to the VM shadow system through, for example, a firewall. The shadow system is located on another physical machine than the physical machine where the virtual machine is located.

[0055] Afterwards, in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety enhanced virtual machine communication method and a virtual machine system. The safety enhanced virtual machine system according to one embodiment comprises a plurality of virtual machines positioned on a same physical machine in a virtual network. The virtual machine system comprises a virtual network safety manager coupled in the virtual network and a shadow system coupled with the virtual network safety manager, wherein the shadow system is positioned on the other physical machine different from the physical machine in which the virtual machines are positioned, the virtual network safety manager copied packets are sent among the virtual machines and the copied packets are forwarded to the shadow system through a physical safety device; the shadow systemreturns response information indicating the received packets to the virtual network safety manager; and the virtual network safety manager sends the packets among the virtual machines according to the returned response information.

Description

technical field [0001] The invention relates to virtualization technology, in particular to a security-enhanced virtual machine communication method and a virtual machine system. Background technique [0002] Virtualization is a technology that benefits users of computers, such as servers. Through virtualization, IT infrastructure resources are shared, IT costs are reduced, and the efficiency, utilization, and flexibility of existing computer hardware are increased. In summary, virtualization can bring the following benefits: server consolidation and architecture optimization, hardware cost reduction, operating cost reduction, application availability improvement and system easier to manage. Many system-level vendors provide virtualization capabilities in their software and services. For example, Red Hat has added the Xen open source virtual machine manager (hypervisor) to its enterprise version of Linux 5. [0003] Usually, one physical machine serves as a host for two o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/00
Inventor 田启明刘亮戈弋侯锐王浩王庆波
Owner IBM CN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products