Device for realizing network security management based on virtualization and management method

A network security and virtual network technology, applied in electrical components, transmission systems, etc., can solve the problems of reducing virtual machine network security access and management capabilities, low network security protection capabilities, poor network security and stability, etc., to improve network security. The effect of efficient operation, improved network security capabilities, and improved operability

Active Publication Date: 2016-06-22
甘肃省科学技术情报研究所
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The shortcomings of this technology to achieve network security management are: (1) The utilization rate and cost of hardware resources are high, and the performance is often low. It cannot effectively reduce the number of concurrency and cannot meet the access control of a large number of users.
(2) Hardware virtualization technology is not clearly supported, and network functions need to be loaded with services, which can easily lead to confusion in the network equipment of the host machine, high system resource usage, and low network security protection capabilities
(3) The mainstream product currently used in hosting virtualization technology is VMware Workstation, which is installed on the operating system of the host host. Once the host host has a security problem, the host host cannot work, resulting in the failure of the virtual server to run. The network security and stability are relatively poor
The disadvantages are: (1) Its hardware driver is concentrated on the Hypervisor layer and is used by all virtual machines on the Hypervisor. When the OS of a virtual machine needs to access the hardware, it uses the drivermodel in the Hypervisor. Access, some drivers and some third-party code are in a very sensitive area, which has flaws in security and compatibility
(2) 24-hour uninterrupted monitoring and protection of network intrusions cannot be performed, which reduces the ability of virtual machine network security access and management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device for realizing network security management based on virtualization and management method
  • Device for realizing network security management based on virtualization and management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] Example 1: figure 2 A flow of a method for implementing network security management based on virtualization is shown:

[0027] 1) First of all, after WAN users enter the LAN network, they first isolate the virtual machine through the virtual firewall module (VMwarevShieldZones), provide control area, external network and parameter protection, etc., and protect access rights, malicious information and malicious information through the drivermodel Third-party programs perform filtering and interception settings.

[0028] 2) Secondly, assign routes through the virtual router module to point to virtual machines that request access to different resources, that is, set the routes to different bridging methods in VMware vSphere according to actual needs, and establish virtual routes.

[0029] 3) Finally, the access is monitored in real time through the virtual intrusion monitoring module based on Xen paravirtualization technology. The process flow is: after the monitoring i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a device for realizing network security management based on virtualization and a management method. The device comprises a firewall function module, a routing function module and a redundancy-supporting switch module; the device further comprises an LAN virtual network security management platform control and ESX hosts; and the LAN virtual network security management platform control is composed of virtual machine management ends, virtual firewall modules, virtual routing modules and virtual intrusion monitoring modules. According to the device and the method provided by the invention, virtual firewalls are built based on VMware vShield Zones, and therefore, isolation of virtual machines can be realized through security and gateway services, and functions such as control area, extranet and parameter protection functions are provided, so that support for a multi-user application environment can be realized; based on a VMware vSphere platform, a virtual routing function can be realized, and the virtual machines in the ESX hosts can be controlled; and a network intrusion detection function is realized in a virtual machine environment through adopting an Xen-based para-virtualization, so that network security can be enhanced.

Description

technical field [0001] The invention relates to network security management. Background technique [0002] Virtualization refers to a method of encapsulating physical resources and is one of the basic technologies for building cloud computing. Configuring resources from a logical point of view is a logical abstraction of physical reality, allowing all resources to run transparently on various physical platforms, and resource management is carried out in a logical manner, fully realizing the automatic allocation of resources. According to different attributes, virtualization can be classified differently. According to the implementation level, it can be divided into hardware virtualization, operating system virtualization, and application virtualization. According to the application field, it can be divided into server virtualization, firewall virtualization, storage virtualization, network virtualization, desktop virtualization, etc. [0003] Existing hosting virtualizati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 杨生举赵凡施韶亭赵昕晖蒙杰
Owner 甘肃省科学技术情报研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products