IDC business scene-orientated security service arranging method and network structure

A technology for security services and business scenarios, applied in the field of security service orchestration methods and network structures, and can solve problems such as unrealistic deployment of a single device

Active Publication Date: 2015-05-13
下一代互联网关键技术和评测北京市工程研究中心有限公司
View PDF5 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obviously, it is unrealistic to deploy one or more security devices for each user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IDC business scene-orientated security service arranging method and network structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The preferred embodiments will be described in detail below in conjunction with the accompanying drawings.

[0018] The present invention proposes a security service orchestration method for IDC business scenarios, such as figure 1 shown, including:

[0019] Step 1. The security streaming platform is deployed at the entrance and exit of IDC (Internet Data Center, Internet Data Center), and one or more UTM (Unified Threat Management, security gateway), IDS (Intrusion Detection Systems, intrusion detection system), IPS (Intrusion Prevention System, intrusion prevention system), WAF (Web Application Firewall, website application level intrusion prevention system) and other security devices are connected to one or more SDN (Software Defined Network, software defined network) switches to form a security resource pool;

[0020] Step 2. The security controller issues a security control command to operate the SDN switch, and draws the network traffic to the designated network...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network engineering, in particular to an IDC business scene-orientated security service arranging method and network structure. A security flow platform is deployed at the passageway of an IDC, and a secure resource pool is formed through connecting one or more UTM, IDS / IPS, WAF and the like security devices with one or more SDN interchangers; a security control command operates the SDN interchanger to lead the network flow to an appointed security device to perform security treatment, and the security treatment comprises access control, attack detection, attack filtering, content auditing and the like; a security strategy command carries out centralized strategy management and real-time state monitoring on the security device, when the device is abnormal, the load balancing or flow migration can be duly performed, and the normal network communication is not influenced.

Description

technical field [0001] The invention belongs to the technical field of network engineering, and in particular relates to a security service orchestration method and network structure oriented to IDC business scenarios. Background technique [0002] With the rapid development of network cloud computing technology, the security requirements for cloud data centers are also getting higher and higher. From the perspective of security requirements, cloud data centers require security protection to be more flexible and support individual customization. Consumers do not manage or control any cloud computing infrastructure, but can control the choice of operating system, storage space, and deployed applications. At the same time, users can choose to purchase appropriate security services according to their own security needs. For example, some users do not have security requirements, so they do not need to purchase security services. Some users want to deploy the most basic firewa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0209H04L63/1408H04L67/10
Inventor 程远李震宋阳杨虹
Owner 下一代互联网关键技术和评测北京市工程研究中心有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products