Safety audit method and device
A technology for security auditing and purpose, applied in the computer field, can solve the problem that the security status of physical hosts and virtual machines cannot be audited.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work belong to the protection of the present invention. scope.
[0043] Such as figure 1 As shown, the embodiment of the present invention provides a method for security audit, which may include the following steps:
[0044] S0: preset the training set used to save the comparison features;
[0045] S1: Obtain the network traffic information of the virtual machine;
[0046] S2: Perform feature extraction on the net...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 