Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security evaluating and detecting method used for cloud infrastructure

A technology of infrastructure and evaluation methods, applied in the field of information security, can solve the problems of lack of information security evaluation devices and methods, interference of analysis and processing work, waste of resources, etc., so as to speed up the execution of evaluation activities, reduce the extension of evaluation time, and reduce unnecessary occupied effect

Active Publication Date: 2015-06-24
GUANGDONG ELECTRONICS IND INST
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing public information rarely discusses the architecture of the test analysis module, that is, whether it is processed by a single node, and if it is processed by a single node, it will fall into the problem of "C / S" architecture, that is, a single node is easy to fall into the load overload high situation
If multiple servers or clusters are used, it will be more troublesome to deal with the import and storage of massive evaluation data between the collection terminal and the background storage system
Moreover, it is difficult to estimate the demand for computing and storage resources in advance, which may lead to the discovery that the existing resources cannot keep up with the actual needs during the evaluation process, and it is difficult to allocate for a while, which affects the evaluation process; at the same time, allocating too many resources is likely to cause waste. not flexible enough
[0021] 3. Deploying agents in the cloud infrastructure to collect evaluation data, and self-reporting data to the background may easily cause conflicts between information, which will interfere with the analysis and processing work of the background and affect the evaluation conclusion
[0022] In general, there is still a lack of information security evaluation devices and methods that adapt to the characteristics of cloud computing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security evaluating and detecting method used for cloud infrastructure
  • Security evaluating and detecting method used for cloud infrastructure
  • Security evaluating and detecting method used for cloud infrastructure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] See figure 1 As shown, the device for security evaluation of cloud infrastructure in the present invention is composed of scheduling module, evaluation software library, evaluation image, evaluation configuration library, evaluation result library, analysis module, evaluation requirement book, evaluation report and other modules.

[0064] Before the evaluation, the user has to configure the evaluation software library in advance; for the specific process, see figure 2 shown. Upload the existing cloud infrastructure security evaluation software and self-written evaluation software programs to the evaluation software library. According to the usual classification: system security, network security, data security, behavioral security, etc., these software are classified and divided into different "evaluation software lists". The evaluation software library can be continuously updated to ensure the advancement and maturity of the evaluation software.

[0065] The comple...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of the information security, in particular to a security evaluating and detecting method used for a cloud infrastructure. The method is completed by a device formed by a dispatching module, a testing software library, a testing mirror, a testing configuration library, a testing result library, an analysis module, a testing requirement docment, a testing report and other modules. Configuration operating is carried out on the testing software library by a user in advance before testing; security testing software which exists in the market and aims at the cloud infrastructure and independently programmed testing software programs are uploaded to the testing software library; classification is carried out on the software according to the usual classification, namely the system security, the network security, the data security, the behavior security and the like, and the software is partitioned to different 'testing software lists'; the testing software library can be continuously updated, and the advancement and the maturity of the testing software are guaranteed. The problem of compatibility of the information security testing method and the cloud calculation is solved, and the method can be used for security evaluating and testing of the cloud infrastructure.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a security evaluation method for cloud infrastructure. Background technique [0002] Cloud infrastructure: refers to the general term for the software and hardware systems built to support various cloud computing services, including physical infrastructure resources and virtual infrastructure resources. Virtual infrastructure resources are virtual resources built using virtualization technology on the basis of physical infrastructure resources, involving a series of hardware and software resources such as operating systems, storage, networks, and CPUs. [0003] Information security subjects: According to the different fields involved in information system security, it is divided into subjects such as system security, behavioral security, data security, network security, and terminal security. [0004] Information security evaluation: Using manual, semi-automated and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L41/08H04L41/28H04L43/50
Inventor 王伟岳强
Owner GUANGDONG ELECTRONICS IND INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products