Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety audit method and device

A technology for security auditing and purpose, applied in the computer field, can solve the problem that the security status of physical hosts and virtual machines cannot be audited.

Inactive Publication Date: 2015-07-22
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] It can be seen from the above description that in the prior art, the physical host is taken as a whole, and the security status of the entire physical host is determined through the interaction data between the physical host and the external network, while the security status of the virtual machines inside the physical host cannot be audited.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety audit method and device
  • Safety audit method and device
  • Safety audit method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work belong to the protection of the present invention. scope.

[0043] Such as figure 1 As shown, the embodiment of the present invention provides a method for security audit, which may include the following steps:

[0044] S0: preset the training set used to save the comparison features;

[0045] S1: Obtain the network traffic information of the virtual machine;

[0046] S2: Perform feature extraction on the net...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a safety audit method and device. The method includes: presetting a training set used for storing comparison characteristics; S1, acquiring network traffic information of a virtual machine; S2, subjecting the network traffic information to characteristic extraction so as to obtain characteristics to be audited; S3, matching the characteristics to be audited, to the comparison characteristics in the training set so as to obtain comparison characteristic matches matching with the characteristics to be audited, and determining whether the network traffic information is abnormal according to the comparison characteristic matches. The safety audit method and device is applicable to safety audit of virtual machines.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for security auditing. Background technique [0002] Cloud computing has the characteristics of resource pooling, virtualization, high reliability and high availability, and gathers multiple users into one area. With the rise of cloud computing, virtual machine technology has also developed rapidly, and multiple virtual machines may exist on a physical host. With the wide application of virtual machines, the network structure is becoming more and more complex, and network security issues are getting more and more attention. [0003] Traditional network security facilities monitor the external traffic of the physical host, and determine the current security status of the physical host by analyzing the data interaction between the physical host and the external network. [0004] It can be seen from the above description that in the prior art, the physical ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06
Inventor 宋洪涛
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD