Virtual machine safety monitoring method based on behavior recognition

A security monitoring and virtual machine technology, applied in the field of virtual machine security, can solve problems such as difficult to achieve efficient application, incomplete, fuzzy security boundaries, etc.

Inactive Publication Date: 2014-05-14
INSPUR TIANYUAN COMM INFORMATION SYST CO LTD
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the former method is relatively mature, it is difficult to achieve efficient application due to the blurring of the security boundary of virtual machine to physical layer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual machine safety monitoring method based on behavior recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0024] figure 1 A reference implementation scheme of the present invention is given, which mainly involves monitoring functional entities, including virtual machine operation monitoring engine and behavior characteristic specification library, virtual machine, virtual resources and underlying operating system Host-OS. Among them, the dotted circle represents the key monitoring point of behavior and the critical identification point of resource state, the line with the arrow represents the key access inside the virtual machine process and the access between virtual machines, and the line with the arrow represents the connection between the virtual machine and the underlying resource / operating system Access includes virtual machine migration. The hardware under the underlying main operating system Host-OS includes: servers, storage devices, networks, etc. are not shown.

[0025] The realization steps of this invention realization scheme are as follows:

[0026] 1) Build a virt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a virtual machine safety monitoring method based on behavior recognition. A series of virtual machines, key monitoring points in the relevant program running process behavior and virtual machine resource state critical identification points are set, and then corresponding characteristic parameter specifications are set. On the basis, virtual machines and relevant resources are monitored, and when it is found that the behaviors of the virtual machines and virtual machine applications or the relevant resource states of the virtual machines are abnormal, an abnormality alarm is given. Through a bottom layer operation system or monitoring system of the running environment of the virtual machines, corresponding protective measures can be taken according to the abnormality warning information, and thus the running safety of the virtual machines and a virtualized system can be effectively guaranteed.

Description

technical field [0001] The invention belongs to the technical field of virtual machine security, in particular to a security monitoring method based on behavior feature identification. By monitoring the behavior of the virtual machine and the state of related resources, abnormal process activities and resource states are found, and then the security protection of the virtual machine is realized. Specifically, it is a virtual machine security monitoring method based on behavior recognition. Background technique [0002] As one of today's hot technologies, virtualization has been widely used in cloud computing platforms, virtual storage, virtual operating systems, virtual desktops, virtual terminals and other fields. However, due to the inevitable loopholes, backdoors and bugs in the virtual machine implementation and operating environment, a series of virtualization security problems have been caused, such as virtual machine overflow, virtual machine abnormal migration, virus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/53
CPCG06F21/53
Inventor 苗再良
Owner INSPUR TIANYUAN COMM INFORMATION SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products