Abnormity detection and processing method of cloud virtual environment

An anomaly detection and virtual environment technology, applied in transmission systems, electrical components, etc., can solve the problem of lack of anomaly detection and processing methods for most new application layer attacks

Active Publication Date: 2016-07-20
SHANGHAI MARITIME UNIVERSITY +1
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing cloud anomaly detection and processing system is mainly aimed at the detection and processing of various network layer and transport layer attacks and va

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormity detection and processing method of cloud virtual environment
  • Abnormity detection and processing method of cloud virtual environment
  • Abnormity detection and processing method of cloud virtual environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings.

[0046] Such as figure 1 Shown is an embodiment of a cloud system. The cloud system includes: a cloud controller 110 , and an application server cluster 120 and a cloud storage device 130 communicating with the cloud controller 110 .

[0047] The cloud controller 110 includes: a module for receiving user requests and user identity authentication, a comprehensive security policy module and a virtual machine status monitoring module.

[0048] The cloud controller 110 refers to a dedicated server or server cluster, which mainly communicates with other servers in the cloud through a public network or a private network, accepts I / O access requests from various network protocol users and authenticates the user's identity. The user can only access the virtual machine space created by the cloud for the user after the identity authentication of the user...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an application layer abnormity detection and processing method of a cloud virtual environment. The method comprises that a cloud controller detects states of virtual machines in real time; if a virtual machine is an abnormal virtual machine, a comprehensive abnormity detection system carries out comprehensive detection to the abnormal virtual machine; if the comprehensive abnormity detection system judges that the comprehensive detection result value of the abnormal virtual machine is less than a preset threshold value Q, the cloud controller calculates the average logarithm likelihood probability value of the abnormity detection of the abnormal virtual machine; if the average logarithm likelihood probability value is more than a Pmax, the abnormal virtual machine is a high risk virtual machine; the abnormal virtual machine is isolated; if the average logarithm likelihood probability value is less than the Pmax, the abnormal virtual machine is a low risk virtual machine; and the abnormal behaviors of the abnormal virtual machine are eliminated. According to the method, the abnormity detection reliability of the cloud virtual machine is ensured; through adoption of multiple detection mechanisms, the abnormal virtual machine can be detected more reliably; false detection will not be carried out to certain normal virtual machines; and the service of the cloud tenants of the normal virtual machines will not be influenced by the false detection.

Description

technical field [0001] The invention relates to a method for detecting and processing anomalies in an application layer of a cloud virtual environment, and in particular to a method for detecting and processing anomalies in a cloud virtual environment. Background technique [0002] At present, the scale, intensification, and specialization of cloud computing services have completely changed the pattern in which information resources are scattered in terminal devices. Using virtualization technology to organize the allocation and use of computing resources is conducive to rational allocation of resources, improving utilization and realizing green computing. However, there are many security problems in virtualization technology itself, and the security analysis and protection of virtualization will become more important. Through the analysis of cloud security technology from multiple aspects, it is shown that one security mechanism or several security mechanisms are not suffi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441
Inventor 张秀娟韩德志毕坤刘罕
Owner SHANGHAI MARITIME UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products