Unlock instant, AI-driven research and patent intelligence for your innovation.

An information system intrusion detection method based on docker virtualization

An information system and intrusion detection technology, applied in transmission systems, electrical components, etc., can solve the problems of waste of resources, difficult management, lack of standardized description means and container portability, etc., to achieve the effect of saving space

Inactive Publication Date: 2018-06-08
STATE GRID CORP OF CHINA +1
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Docker has been very popular since 2013. Its success is mainly due to solving several problems: (1) Complex environment management: from various OS to various middleware to various Apps, a product can be successfully released , as a developer, there are too many things to care about, and it is difficult to manage. This problem is common in the software industry and needs to be faced directly
However, whether it is KVM or Xen, it seems to Docker that it is a waste of resources, because what users need is an efficient operating environment rather than an OS. GuestOS is a waste of resources and difficult to manage. The lighter LXC is more flexible and faster
(4) Portability of LXC: LXC already exists in the Kernel of Linux 2.6, but it was not designed for cloud computing at the beginning. The lack of standardized description methods and the portability of containers determine the environment it builds Difficult to distribute and standardize management (compared to the concept of image and snapshot like KVM)
(1) The isolation of Docker is still somewhat lacking compared to virtualization solutions such as KVM, and all containers share a part of the runtime library

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information system intrusion detection method based on docker virtualization
  • An information system intrusion detection method based on docker virtualization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The invention provides an information system intrusion detection method based on Docker virtualization. If an external intrusion is found, the intrusion detection system directly sends instructions through the docker host to stop the operation of the intruded container or directly delete the intruded container.

[0031] The implementation process of this invention in Docker is as follows:

[0032] The intrusion detection technology uses the abnormal intrusion detection technology, which is an intrusion detection algorithm based on support vector machine active learning. This algorithm can achieve a fast classification speed in the case of small samples.

[0033] The detection system adopts a centralized architecture, and the intrusion detection technology used above is encapsulated into a Docker container in the form of a software app, which makes good use of the Docker virtualization platform, and then integrates the container with the host The host network mode is fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an information system invasion detection method based on Docker virtualization. The method comprises the steps as follows: obtaining a data source by monitoring data packets in a network between a host and a container; and finishing the collecting work of the data via a captured data flow so as to differentiate normal information and exotic invasion via the study and classification of a support vector machine to realize the detection of exotic invasion. The beneficial effects of the method of the invention are as follows: (1) the invasion detection system is encapsulated to the container of the docker in the form of software app, so that the characteristics of the Docker are well used and the space is saved; (2) the container with the invasion detection system is combined with the host to form a host mode to share a network environment with the host, while other containers performs network communication with the host in a bridge mode, and the invasion detection system could directly stop the operation of the container which is invaded or directly recycle and delete the container which is invaded via the host while detecting the invasion.

Description

technical field [0001] The invention relates to an information system intrusion detection method based on Docker virtualization. Background technique [0002] Docker is an advanced LXC-based container engine open sourced by PaaS provider dotCloud. The source code is hosted on Github, based on the go language and open source in compliance with the Apache2.0 protocol. Docker has been very popular since 2013. Its success is mainly due to solving several problems: (1) Complex environment management: from various OS to various middleware to various Apps, a product can be successfully released , As a developer, there are too many things to care about, and it is difficult to manage. This problem is common in the software industry and needs to be faced directly. Docker can simplify the deployment of multiple application instances, such as web applications, background applications, database applications, and big data applications such as Hadoop clusters, message queues, etc. can be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425
Inventor 沙卫国于烨孙寅李斌刘思尧李强施科峰
Owner STATE GRID CORP OF CHINA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More