Cloud data center real-time risk assessment method based on mainframe log analysis

A cloud data center and risk assessment technology, applied in the field of cloud computing and network security, can solve problems such as unsuitable assessment environment

Inactive Publication Date: 2014-10-29
FUDAN UNIV
View PDF1 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these documents are also static analysis methods, which requir

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data center real-time risk assessment method based on mainframe log analysis
  • Cloud data center real-time risk assessment method based on mainframe log analysis
  • Cloud data center real-time risk assessment method based on mainframe log analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0151] (1) Experimental environment

[0152] Experimental environment such as Figure 4 shown. There are a total of 3 hosts and 4 virtual machines in this environment, including the server side for special purposes and the PC side for general business. The OSSECagent program is deployed in the 7 assets that need to be evaluated, and configured on the OSSEC server. All agents are alive. Divide assets into 5 grades, represented by 1-5, the larger the value, the more important the asset. UnionPay technicians are required to score the assets according to the three aspects of confidentiality, integrity and usability to obtain the final asset value; through the analysis of historical data, the values ​​of relevant variables are determined. Tables 2 and 3 list the determination of asset values ​​and correlation coefficients in the experimental environment.

[0153] Table 2 List of cloud data center assets

[0154] Numbering

name

describe

asset value

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of cloud computing and network safety, and in particular relates to a cloud data center real-time risk assessment method based on mainframe log analysis. The method comprises: providing four risk factors, namely alarm quantity, alarm type, alarm type and alarm threat level, influencing an asset risk index based on an intrusion detection system and a vulnerability scanning tool OSSEC of a mainframe log, and using the four risk factors as evidences for assessing the risk situation of asset, combining evidence theory (D-S theory) with thought of fuzzy mathematics, designing DSFM (D-S Fuzzy Mathematic) algorithm, and combining the evidences to obtain the asset risk index RI; combination of the risk index and asset value is the risk value R of the asset; combination of all asset risk values of one data center is the risk value of the data center. Simulated strike experiment shows that the method can be used for assessing the risk of whole cloud data center system in real time, and the obtained assessing result is high in accuracy.

Description

technical field [0001] The invention belongs to the technical field of cloud computing and network security, and in particular relates to a real-time risk assessment method for a cloud data center. Background technique [0002] The rapid development of the Internet and cloud computing has brought great changes to people's lives. As the amount of network information increases exponentially, more and more security issues are exposed to users. Most of the services are now operated in cloud data centers. The data center has a huge amount of information, and it is difficult for limited management personnel to conduct comprehensive monitoring of these machines and accurately know the current risk status of the system. As an active security protection technology, risk assessment can help managers accurately identify the current security threats to the system, and then take corresponding security measures to ensure system security and reduce the workload of administrators. However...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L12/24
Inventor 吕智慧刘思帆吴杰
Owner FUDAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products