System and method and device for processing cloud application attack behaviors in cloud computing system

A processing device and cloud application technology, applied in the computer field, can solve problems affecting target cloud host cloud applications, attacks, etc.

Active Publication Date: 2015-03-04
HUAWEI TECH CO LTD
View PDF5 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The solutions in the prior art can only prevent attacks between cloud hosts inside the cloud computing system, or external attacks to the cloud hosts inside the cloud computing system, but cannot prevent mutual attacks between different cloud application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method and device for processing cloud application attack behaviors in cloud computing system
  • System and method and device for processing cloud application attack behaviors in cloud computing system
  • System and method and device for processing cloud application attack behaviors in cloud computing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0096] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0097] The technical solution provided by the embodiments of the present invention can be typically applied to a cloud computing system (which may be referred to as a cloud system for short). The cloud computing system can be regarded as a cluster system that performs distributed computing, storage and management on general-purpose h...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a device for processing cloud application attack behaviors in a cloud computing system. The device comprises a security analyzer, a security processor and a policy manager. The policy manager is used for storing security judgment rules and malicious application processing rules; the security analyzer is used for receiving application behavior data sent by security detectors, determining whether cloud applications running on cloud hosts have attack behaviors or not, and sending the application behavior data to the security processor when determining that the cloud applications running on the cloud hosts have the attack behaviors; the security processor is used for calling an interface provided by a cloud controller in the cloud computing system to process the cloud applications with the attack behaviors according to the malicious application processing rules. Security protection is performed based on the cloud computing application level, mutual attacks between different applications inside the same host can be prevented, and impact on normal applications is reduced.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a method, device and system for processing cloud application attack behavior in a cloud computing system. Background technique [0002] According to the definition of the National Institute of Standards and Technology (NIST), cloud computing has three major service models, namely SaaS (software as a service, software as a service), PaaS (platform as a service). service) and IaaS (infrastructure as a service, infrastructure as a service). Among them, PaaS is a business model that provides a server platform as a service. PaaS mainly provides hardware resources such as CPU and memory as well as software resources such as operating system and program dependency library for cloud applications. Developers of cloud applications do not need to care about the software and hardware environment in which the application runs, and concentrate on developing the application itself. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56H04L29/08
CPCG06F21/566H04L63/1441H04L67/10G06F9/45558G06F2009/45587H04L63/1425H04W12/122H04W12/128H04L63/1408H04L63/1416H04L63/1466H04L69/329
Inventor 蒙泽超刘赫伟
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products