Virtual machine security monitoring method based on cellular neural network

A neural network and security monitoring technology, applied in the field of information security, can solve problems such as not considered, and achieve the effect of improving monitoring efficiency

Inactive Publication Date: 2014-04-02
BEIJING SAFE CODE TECH
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in all these studies, there is no further integration of these two aspects of research, and there is a lack of a monitoring method that can completely cover from obtaining resource information to analyzing information to dealing with attacks; in addition, the research only takes virtual machines as a Research on monitoring the vector of malware, so the research mainly focuses on monitoring the security of a virtual machine, without considering how to efficiently monitor the security of a virtual machine on a physical machine in a cloud computing environment when there are a large number of customer virtual machines on a physical machine Simultaneously monitor the security status of multiple virtual machines

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual machine security monitoring method based on cellular neural network
  • Virtual machine security monitoring method based on cellular neural network
  • Virtual machine security monitoring method based on cellular neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] In view of the current cloud computing virtualization environment, when there are a large number of virtual machines in a physical machine, it is necessary to be able to monitor these virtual machines at the same time. The embodiment of the present invention is based on a cellular neural network as a parallel processing algorithm. It has the advantages of small amount of calculation and easy large-scale VLSI integration to realize real-time monitoring of the security status of customer virtual machines on the same physical machine.

[0011] Such as figure 1 As shown, the cellular neural network-based virtual machine security monitoring method provided by the embodiment of the present invention includes the following steps:

[0012] Step 101, the privileged virtual machine dynamically obtains the resources of the client virtual machine;

[0013] Step 102, analyzing the obtained resource content based on the cellular neural network;

[0014] Step 103, determine whether ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a virtual machine security monitoring method based on a cellular neural network. The method includes: a privileged virtual machine dynamically acquires resources of a client virtual machine; the contents of the resources obtained are analyzed on the basis of the cellular neural network so as to judge whether the client virtual machine is under attack or not; finally operating state of the client virtual machine is displayed in real time. The virtual machine security monitoring method based on the cellular neural network has the advantages that the privileged virtual machine can quickly and dynamically monitor mass client virtual machines on a same physical machine and the security of the client virtual machines and whole virtual machine system is effectively improved.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a cellular neural network method. Background technique [0002] After the Internet, virtualization is another breakthrough information technology for the entire information industry. It uses methods such as software and hardware partitioning, aggregation, partial or complete simulation, and time-sharing multiplexing to manage computing resources and construct one or more computing environments. . At the same time, in today's network computing, especially cloud computing environment, the security of the system has been increasingly threatened, and these threats mainly include malware, viruses, Trojan horses, etc. Therefore, the demand for the security of the computing system is increasing day by day, and it is imminent to improve the security of the system in the network environment. Moreover, as virtualization is widely used in various fields such as cloud computin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F9/455G06N3/02
CPCG06F21/53G06F21/554
Inventor 谢康王立进张玲徐勤李伟李星仲镜学
Owner BEIJING SAFE CODE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products