Intrusion detection and analysis system on basis of service data flow of virtual machines

A technology for intrusion detection and virtual services, applied in digital transmission systems, transmission systems, data exchange networks, etc., can solve problems such as insecure configuration and difficult to detect attacks, and achieve the effect of increasing robustness and improving accuracy

Inactive Publication Date: 2015-07-01
CHENGDU SHUANGAOYANG TECH
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In most cases, intruders use the loopholes and insecure configurations of the application system to invade the system, and the application layer attack can use the border defense back door of the legitimate user to invade the system. Therefore, it is difficult for the above two IDS systems to detect such attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection and analysis system on basis of service data flow of virtual machines

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0019] In the following description, references to "one embodiment," "an embodiment," "an example," "example," etc. indicate that such described embodiment or example may include a particular feature, structure, characteristic, property, element, or limitations, but not every embodiment or example necessarily includes the specific feature, structure, characteristic, property, element or limitation. Additionally, repeated use of the phrase "according to one embodiment of the present application" does not necessarily refer to the same embodiment, although it may.

[0020] For simplicity, some technical features known to those skilled in the art are omitted from the following description.

[0021] The intrusion detection and analysis sy...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an intrusion detection and analysis system on the basis of service data flow of virtual machines. The intrusion detection and analysis system comprises a data acquisition module, an intrusion detection module, a communication interface, an alarm response module and a safety management module. The data acquisition module is used for acquiring audit data when access request operation is started; the intrusion detection module is used for analyzing the acquired audit data and detecting the audit data to determine whether the audit data are intrusion events or not; the intrusion detection module and the data acquisition module are bidirectionally communicated with each other via the communication interface; an intrusion detection system can generate alarm information by the aid of the alarm response module when the intrusion events occur, and the alarm information is transmitted to the safety management module by the aid of the alarm response module, so that the alarm information can be visually displayed; the safety management module is used for combining and scheduling forecasting methods, transmitting access control strategies, the forecasting methods and alarm correlation information to the intrusion detection module, transmitting response strategies to the alarm response module and receiving safety update information transmitted by the alarm response module.

Description

technical field [0001] The invention specifically relates to an intrusion detection and analysis system based on virtual machine service data flow. Background technique [0002] Recently, information attacks have seriously threatened the stability of the network. These attacks take advantage of the interconnection and interaction characteristics of the network, and spread very fast, and the attack technology is getting more and more sophisticated, and the attack methods are becoming more and more complex. Traditional information security systems, such as firewalls and intrusion detection systems (IDS), have serious deficiencies in network attack prediction, and usually respond only after these attacks have caused serious damage. [0003] Most traditional intrusion detection systems use a network-based or host-based approach to identifying and responding to attacks. These systems often use two types of intrusion detection methods, namely anomalous intrusion detection and ch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26
CPCH04L63/1416
Inventor 罗春
Owner CHENGDU SHUANGAOYANG TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products