Safe scheduling method and system

A dispatching method and dispatching system technology, applied in transmission systems, electrical components, etc., can solve problems such as excessive load and achieve the effect of reducing load

Active Publication Date: 2013-01-09
日照浪潮云计算有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] The technical problem to be solved by the present invention is to provide a security scheduling method and system in the field of cloud computing to solve the problem of overloading of the large-scale security attack defense system in the cloud computing environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe scheduling method and system
  • Safe scheduling method and system
  • Safe scheduling method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0042] The security scheduling method in the field of cloud computing provided by the embodiment of the present invention can effectively reduce the load of the defense system through flexible plug-in filter design and intelligent defense layer design, thereby realizing the security and reliability of the cloud computing system in a large-scale cloud computing environment ensure.

[0043] combine first figure 1 , to illustrate the implementation of the present invention, in a typical configuration environment, users can access resources in the cloud computing platform throug...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safe scheduling method. The method is characterized in that enabled safe filtering functions defense attacks sequentially; under-attack information of each enabled safe filtering function is acquired; and an attack defending sequence of the safe filtering functions is regulated according to the under-attack information of each safe filtering function. The invention also provides a safe scheduling system. By the method and the system, the load of a safe defense system can be effectively reduced, so that the safety of a cloud computing system in a large-scale cloud computing environment is reliably ensured, and the problem of overweight load of a large-scale safe defending attack system in the cloud computing environment is solved.

Description

technical field [0001] The present invention relates to the field of computer application technology, in particular to a security scheduling method and system. Background technique [0002] With the rise of cloud computing, the computer field is undergoing profound changes. my country's cloud computing service market is in its infancy, and cloud computing technology and equipment already have a certain foundation for development. The overall scale of my country's cloud computing service market is small, but the momentum of catching up is obvious. According to Gartner estimates, in 2011, my country accounted for less than 3% of the global cloud computing service market of about 90 billion US dollars, but the annual growth rate reached 40%. It is expected that the gap between my country and foreign countries in cloud computing will gradually narrow in the future. [0003] To sum up, cloud computing has the following characteristics: [0004] (1) Ultra-large scale: "Cloud" h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08
Inventor 刘正伟刘俊朋朱波高飞
Owner 日照浪潮云计算有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products