Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for preventing attacks by self-learning in cloud environment

A cloud environment and anti-attack technology, applied in the field of cloud security management, can solve problems such as prone to false positives or false negatives, inability to detect new types of intrusion behaviors, and software detection and early warning, so as to reduce difficulty and complexity and improve accuracy , the effect of improving efficiency

Active Publication Date: 2017-04-19
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method detects through a pre-set feature library, which cannot detect and warn some new intrusion behaviors and software in time, and is prone to false positives or missed negatives.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for preventing attacks by self-learning in cloud environment
  • System and method for preventing attacks by self-learning in cloud environment
  • System and method for preventing attacks by self-learning in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] First of all, it should be explained that the present invention relates to a cloud environment attack defense method and security management technology, and is an application of computer technology in the field of information security technology. During the implementation of the present invention, the application of multiple software function modules will be involved. The applicant believes that, after carefully reading the application documents and accurately understanding the realization principle and purpose of the present invention, combined with existing known technologies, those skilled in the art can fully implement the present invention by using their software programming skills. The aforementioned software functional modules include but are not limited to: monitoring terminal management module, learning time setting module, learning result receiving module, behavior rule library management module, behavior monitoring information receiving module, learning module...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the cloud security management technology, and aims to provide a system and method for preventing attacks by self-learning in a cloud environment. The system for preventing the attacks by self-learning in the cloud environment comprises a management end and a monitoring end; the management end and the monitoring end use a C / S architecture; the management end is deployed at a Server end, and the monitoring end is deployed in each host in the cloud environment. The system for preventing the attacks by self-learning in the cloud environment provided by the invention forms a behavior rule base after host behavior learning, which greatly reduces the difficulty and complexity of host attack prevention in the cloud environment, thereby improving the efficiency of the host attack prevention in the cloud environment; and besides, the system can flexibly adjust the behavior rule base, which greatly improves the accuracy of the host attack prevention in the cloud environment.

Description

technical field [0001] The invention relates to the technical field of cloud security management, in particular to a system and method for preventing attacks through self-learning in a cloud environment. Background technique [0002] The cloud environment refers to the unification of a series of resources such as hardware, software, and network in a wide area network or a local area network to realize data calculation, storage, processing, and sharing. With the improvement and development of cloud services, more and more cloud users are connected to each other through cloud technology. Due to the high concentration of cloud users and information resources, the security incidents and risks caused by the cloud environment are much higher than those of traditional applications. Since 2009, major security incidents have occurred in the cloud computing servers of well-known IT companies such as Microsoft, Amazon, and Google, which have affected the information servers of many cl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06N99/00
CPCG06F21/562G06N20/00
Inventor 胡冬范渊徐长明龙文洁
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products