Unlock instant, AI-driven research and patent intelligence for your innovation.

Cloud system security processing method and device

A security processing and cloud system technology, which is applied in the field of cloud system security processing methods and devices, can solve the problems of low operating efficiency of cloud system terminals, inability to effectively solve cloud system information security problems, and reduced resource utilization, so as to solve information security problems , Improve the utilization rate of resources and improve the effect of operating efficiency

Active Publication Date: 2018-10-16
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a cloud system security processing method and device, which are used to solve the problem that the information security of the cloud system and the resource utilization rate reduction cannot be effectively solved in the prior art, and the malicious data installed on each terminal can be checked and killed. Packaged software will lead to low operating efficiency of each terminal in the cloud system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud system security processing method and device
  • Cloud system security processing method and device
  • Cloud system security processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0040] Further, on the basis of the foregoing embodiments, an implementation manner of step 102 is:

[0041] It is judged whether, within a preset period, the number of times that the same data packet identifier appears at the same terminal in the cloud system is greater than a first preset threshold.

[0042] In this embodiment, specifically, it is determined whether the number of times that the same data packet identifier appears on the same terminal of the cloud system within a preset period is greater than a first preset threshold. Therefore, it can be determined that the data packets appearing continuously in the same terminal are malicious data packets, so that these data packets can be cleaned up.

[0043]Further, on the basis of the above-mentioned embodiments, another implementation manner of step 102 is:

[0044] It is judged whether, within a preset period, the sum of the number of times that the same data packet identifier appears in each terminal in the cloud sys...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cloud system security processing method and a cloud system security processing device. The method comprises the following steps: analyzing data packets received by each terminal in a cloud system, and acquiring data packet identifiers and transmitting end network protocol IP addresses of the data packets; judging whether the occurrence number of the same data packet identifier is accordant with a preset rule within a preset period; if the occurrence number of the same data packet identifier is accordant with the preset rule, marking the data packet corresponding to the same data packet identifier as a suspicious data packet; determining whether the transmitting end IP address in the suspicious data packet exists in a preset IP address blacklist; if the transmitting end IP address in the suspicious data packet exists in the preset IP address blacklist, discarding the suspicious data packet. Therefore, a malicious data packet is effectively prevented from entering other terminals of the cloud system; the information security problem of the cloud system is effectively solved; the utilization rate of resources of the cloud system is improved; meanwhile, the operating efficiency of each terminal in the cloud system is improved.

Description

technical field [0001] The present invention relates to Internet technology, in particular to a cloud system security processing method and device. Background technique [0002] With the development of Internet technology, cloud systems are more and more widely used. There are many malicious data packets sent by hackers in the cloud system. These data packets are transmitted in the terminal devices of the cloud system, which will steal the information in each terminal of the cloud system, occupy the resources of the cloud system, and reduce the resources of the cloud system. utilization rate. [0003] In the prior art, in order to remove malicious data packets in each terminal in the cloud system, a user needs to download and install software for detecting and killing damaged data packets and malicious data packets in each terminal of the cloud system. [0004] However, the processing methods in the prior art can only ensure the information security of terminals installed ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0218H04L63/0236H04L63/145H04L67/10
Inventor 张基恒霍玉嵩魏进武张呈宇
Owner CHINA UNITED NETWORK COMM GRP CO LTD