Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and system for processing cloud application attack behavior in cloud computing system

A processing device and cloud application technology, applied in the computer field, can solve problems affecting target cloud host cloud applications, attacks, etc.

Active Publication Date: 2018-05-29
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The solutions in the prior art can only prevent attacks between cloud hosts inside the cloud computing system, or external attacks to the cloud hosts inside the cloud computing system, but cannot prevent mutual attacks between different cloud applications inside the same cloud host, or cloud Attacks from within the host against the cloud host itself
In addition, the existing technical solution monitors and cleans traffic in units of cloud hosts, which will affect all cloud applications in the target cloud host

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for processing cloud application attack behavior in cloud computing system
  • Method, device and system for processing cloud application attack behavior in cloud computing system
  • Method, device and system for processing cloud application attack behavior in cloud computing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0096] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0097] The technical solution provided by the embodiments of the present invention can be typically applied to a cloud computing system (which may be referred to as a cloud system for short). The cloud computing system can be regarded as a cluster system that performs distributed computing, storage and management on general-purpose h...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a processing device for cloud application attack behavior in a cloud computing system, comprising: a security analyzer, a security processor and a policy manager, wherein: the policy manager is used to store security judgment rules and malicious application processing rules; security analysis The detector is used to receive the application behavior data sent by the security detector, and according to the application behavior data and security judgment rules, determine whether the cloud application running on the cloud host has attack behavior, and determine whether the cloud application running on the cloud host has attack behavior When , the application behavior data is sent to the security processor; the security processor is used to call the interface provided by the cloud controller in the cloud computing system to process the cloud application with attack behavior according to the malicious application processing rules. The solution of the invention performs security protection based on cloud computing application levels, which can prevent mutual attacks between different applications inside the same host, and reduce the impact on normal applications at the same time.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a method, device and system for processing cloud application attack behavior in a cloud computing system. Background technique [0002] According to the definition of the National Institute of Standards and Technology (NIST), cloud computing has three major service models, namely SaaS (software as a service, software as a service), PaaS (platform as a service, platform as a service). ) and IaaS (infrastructure as a service, infrastructure as a service). Among them, PaaS is a business model that provides a server platform as a service. PaaS mainly provides hardware resources such as CPU and memory as well as software resources such as operating system and program dependency library for cloud applications. Developers of cloud applications do not need to care about the software and hardware environment in which the application runs, and concentrate on developing the appli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56H04L29/08
CPCG06F21/566H04L63/1441H04L67/10G06F9/45558G06F2009/45587H04L63/1425H04W12/122H04W12/128H04L63/1408H04L63/1416H04L63/1466H04L69/329
Inventor 蒙泽超刘赫伟
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products