Unlock instant, AI-driven research and patent intelligence for your innovation.

Virtualization security detection method and system

A security detection and virtualization technology, applied in the computer field, can solve the problem of high resource occupation of physical machines, achieve the effect of increasing resource occupation and reducing resource utilization

Active Publication Date: 2017-12-08
BEIJING QIANXIN TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the fact that the above-mentioned existing virtualization security detection method performs security detection on information in multiple virtual machines, which may easily cause the problem of high resource occupation of physical machines, the present invention is proposed to provide a method to overcome the above problems or at least partially solve the above problems Virtualization security detection method and system for problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtualization security detection method and system
  • Virtualization security detection method and system
  • Virtualization security detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] A virtualization security detection method provided by an embodiment of the present invention is introduced in detail.

[0026] refer to figure 1 , shows a flow chart of steps of a virtualization security detection method in an embodiment of the present invention.

[0027] The virtualization security detection method in the embodiment of the present invention can be applied to a cluster including at least one physical machine, each physical machine includes at least one virtual machine, and the cache server and / or killing server is set on a physical machine in the virtual machine. For example, the cache server and / or the killing server can only be set in one virtual machine of one physical machine, while other virtual machines do not need to be set, or can also be set in multiple virtual machines of one physical machine. in a virtual machine.

[0028] The virtualization security detection method of the present embodiment includes the following steps:

[0029] Step 1...

Embodiment 2

[0040] A virtualization security detection method provided by an embodiment of the present invention is introduced in detail.

[0041] refer to figure 2 , shows a flow chart of steps of a virtualization security detection method in an embodiment of the present invention.

[0042]The virtualization security detection method in the embodiment of the present invention can be applied to a cluster including at least one physical machine, each physical machine includes at least one virtual machine, and the cache server and / or killing server is set on a physical machine in the virtual machine. For example, the cache server and / or the killing server can only be set in one virtual machine of one physical machine, while other virtual machines do not need to be set, or can also be set in multiple virtual machines of one physical machine. in a virtual machine.

[0043] The virtualization security detection method of the present embodiment includes the following steps:

[0044] Step 2...

Embodiment 3

[0101] A virtualization security detection system provided by an embodiment of the present invention is introduced in detail.

[0102] refer to image 3 , shows a structural block diagram of a virtualization security detection system in an embodiment of the present invention.

[0103] The system may include: a cluster, a cache server and / or an antivirus server, a cache server and / or an antivirus server generation module 300 , an information acquisition module 302 to be detected, and a security level determination module 304 .

[0104] Wherein, the cluster includes at least one physical machine, each of the physical machines includes at least one virtual machine, and the cache server and / or killing server is set in the virtual machine of one physical machine.

[0105] A cache server and / or killing server generating module 300, configured to generate a cache server and / or killing server according to hardware information of physical machines in the same cluster, configuration in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A virtualisation security detection method and system. The method comprises: generating a caching server and / or a searching and killing server according to hardware information of a physical machine in the same cluster, configuration information of a virtual machine in the physical machine, and a security detection template (100), the security detection module comprising basic configuration information of the caching server and / or basic configuration information of the searching and killing server; acquiring information to be detected from the physical machine, and transmitting the information to be detected to the caching server and / or the searching and killing server via a network for security detection of the information to be detected (102); and determining a security level of the information to be detected according to a detection result(s) of the caching server and / or the searching and killing server (104), the cluster comprising at least one physical machine, each physical machine comprising at least one virtual machine, and the caching server and / or the killing server being arranged in the virtual machine of one physical machine. The method and system improve the resource utilization rate of the physical machine.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a virtualization security detection method and system. Background technique [0002] Virtualization refers to virtualizing a computer into multiple logical computers through virtualization technology. Run multiple logical computers on one computer at the same time, each logical computer can run a different operating system, and the application programs can run in independent spaces without affecting each other, thereby significantly improving the work efficiency of the computer. [0003] In the existing virtualization security detection scheme, if there are multiple virtual logical computers (virtual machines) on the same physical machine, when performing security detection on the information in the multiple virtual machines, it is necessary to set up killing in each virtual machine. server, the information in each virtual machine is checked for security in its own killing ser...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/53
CPCG06F21/53
Inventor 汪圣平杨晓东
Owner BEIJING QIANXIN TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More