Virtualization security detection method and system
A security detection and virtualization technology, applied in the computer field, can solve the problem of high resource occupation of physical machines, achieve the effect of increasing resource occupation and reducing resource utilization
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0025] A virtualization security detection method provided by an embodiment of the present invention is introduced in detail.
[0026] refer to figure 1 , shows a flow chart of steps of a virtualization security detection method in an embodiment of the present invention.
[0027] The virtualization security detection method in the embodiment of the present invention can be applied to a cluster including at least one physical machine, each physical machine includes at least one virtual machine, and the cache server and / or killing server is set on a physical machine in the virtual machine. For example, the cache server and / or the killing server can only be set in one virtual machine of one physical machine, while other virtual machines do not need to be set, or can also be set in multiple virtual machines of one physical machine. in a virtual machine.
[0028] The virtualization security detection method of the present embodiment includes the following steps:
[0029] Step 1...
Embodiment 2
[0040] A virtualization security detection method provided by an embodiment of the present invention is introduced in detail.
[0041] refer to figure 2 , shows a flow chart of steps of a virtualization security detection method in an embodiment of the present invention.
[0042]The virtualization security detection method in the embodiment of the present invention can be applied to a cluster including at least one physical machine, each physical machine includes at least one virtual machine, and the cache server and / or killing server is set on a physical machine in the virtual machine. For example, the cache server and / or the killing server can only be set in one virtual machine of one physical machine, while other virtual machines do not need to be set, or can also be set in multiple virtual machines of one physical machine. in a virtual machine.
[0043] The virtualization security detection method of the present embodiment includes the following steps:
[0044] Step 2...
Embodiment 3
[0101] A virtualization security detection system provided by an embodiment of the present invention is introduced in detail.
[0102] refer to image 3 , shows a structural block diagram of a virtualization security detection system in an embodiment of the present invention.
[0103] The system may include: a cluster, a cache server and / or an antivirus server, a cache server and / or an antivirus server generation module 300 , an information acquisition module 302 to be detected, and a security level determination module 304 .
[0104] Wherein, the cluster includes at least one physical machine, each of the physical machines includes at least one virtual machine, and the cache server and / or killing server is set in the virtual machine of one physical machine.
[0105] A cache server and / or killing server generating module 300, configured to generate a cache server and / or killing server according to hardware information of physical machines in the same cluster, configuration in...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



