Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Safety monitoring method under distributed network environment

A distributed network and security monitoring technology, applied in electrical components, transmission systems, etc., can solve problems such as weak security relative to the physical environment, data security risks, and hidden security risks in virtualized environments, and achieve the effect of solving real-time security problems.

Active Publication Date: 2014-07-09
BEIJING UNIV OF TECH
View PDF7 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First of all, the introduction of virtualization sharing technology improves the efficiency of resource utilization, but at the same time, due to the dynamic nature of the virtual machine environment and the weak security relative to the physical environment brought about by technical vulnerabilities, it leaves hidden dangers for the security of the virtualization environment.
Secondly, the application model in which users outsource services to cloud service providers separates the ownership, management rights, and use rights of resources. Users no longer have absolute control over resources, which naturally brings data security risks.
In addition, the multi-tenant feature of cloud computing requires cloud service providers to deal with the multi-tenant operating environment in the process of providing services to the outside world, ensuring that different users can only access their own data, applications, and storage resources. The problem of data leakage will have a negative impact on the service quality of cloud computing
Finally, cloud computing provides an open computing environment. This openness is mainly reflected in the openness of services to users and the openness of external calls to internal interfaces. Under openness, the authentication mechanism is naturally relatively weak, which allows illegal users to The cloud computing environment is attacked to steal the required information, and the benign cloud computing environment may also be used by illegal users for improper purposes, which will affect the security of the cloud

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety monitoring method under distributed network environment
  • Safety monitoring method under distributed network environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Attached below figure 1 and figure 2 The present invention is described in further detail.

[0034] The present invention proposes a security monitoring method in a network environment, each distributed node is set as figure 1 A monitoring module, a distributed security subsystem and a monitoring system composed of local security mechanisms in a distributed environment. Through the collaboration among distributed node security subsystems, the security mechanism can be customized in real time to realize a security monitoring process in a distributed network environment.

[0035] Such as figure 1 As shown, the security module obtains the monitoring information through the monitoring module, and then sends the security custom policy to the security mechanism after processing, customizes the real-time security mechanism, and solves the real-time security problem. The security subsystem consists of a security function coordination module, a scheduling module, a security...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety monitoring method under a distributed network environment and relates to the safety monitoring problem in the field of information security. According to the method, the system is composed of a monitoring module, a safety module and a safety mechanism, wherein the safety module is composed of a safety function cooperation module, a safety control module, a safety measurement module, a safety decision module and a local benchmark database. Monitored dynamic data are transmitted out by the monitoring module, and the monitored dynamic data are transmitted to the safety measurement module for measurement and used for measuring safety of behaviors of monitoring nodes; the safety problem is determined by the safety decision module according to the measurement result; the safety mechanism in a monitored system is dispatched by the safety control module according to the decision result to perform a coping strategy; the safety function cooperation module is responsible for having communication with the safety measurement module, the safety decision module and the safety control module so that the safety function cooperation work can be achieved. A safety strategy can be dynamically made for the distributed network environment, and safety of the monitoring nodes under the distributed network environment is maintained.

Description

technical field [0001] The invention relates to the field of information security, and relates to a security monitoring method in a distributed network environment. The security subsystems on the distributed nodes cooperate and dynamically update, customize a dynamic security strategy for the distributed network environment, and realize a security monitoring process. Background technique [0002] With the rapid development of information technology in the 21st century, people pay more and more attention to information security. Distributed network: It is formed by the interconnection of node machines distributed in different locations and having multiple terminals. Any point in the network is connected to at least two lines. If any line fails, the communication can be completed through other links. It has high reliability and the network is easy to expand. The advantage is that the distributed network has no center, so the overall collapse will not be caused by the destruct...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
Inventor 胡俊白鑫张松鸽林莉寇文心
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products