Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A virtualization platform security monitoring method and system

A virtualization platform and security monitoring technology, applied in the security monitoring method and system of the virtualization platform, and the security field of the virtualization platform, can solve the problems of monitoring and protection of the virtual machine monitor, inability to perform security monitoring, and high cost, and achieve the application wide range of effects

Active Publication Date: 2019-11-26
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, there are currently few technical solutions that can monitor and protect the virtual machine monitor (VMM).
Patent CN201610229787.8 uses TPM trusted hardware to monitor the integrity of VMM. This solution has two disadvantages: 1. It is necessary to install TPM trusted custom hardware on a general-purpose X86 server, and the cost is relatively high; 2. This solution can only The integrity of the underlying VMM is detected when the virtual machine starts, and security monitoring at runtime cannot be achieved
[0006] At present, realizing the runtime monitoring of the virtual machine monitor (VMM) to ensure the normal operation of the virtual machine monitor (VMM) cannot be solved by existing technical solutions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A virtualization platform security monitoring method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments, but the scope of the present invention is not limited in any way.

[0033] This embodiment adopts as figure 1 In the system structure shown, the server is installed on a separate host, and the client is deployed on the monitored virtual machine host.

[0034] Step 1: First, the user logs in to the system webpage and customizes his own security requirements as follows:

[0035] 1) Monitoring granularity: function level

[0036] 2) Virtual host IP network segment: 192.168.10.1--192.168.10.5

[0037] 3) Virtual host model: dell rack server R730,

[0038] 4) Virtual host VMM model: KVM (Kernel-Based Virtual Machine)

[0039] Step 2: The policy analysis component parses the above security requirements into an XML file conf.xml, and stores it in the data storage module (local file system). Afterwards, the server sends SSH requests to eac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for virtualization platform security monitoring and control. The method comprises the first step that a server terminal is arranged on a main engine or a virtual machine, and a client-side is arranged on a virtualization machine monitor unit of a virtual host being monitored; the second step that the server terminal analyzes the safety need made by a user to a needed configuration file with a standard format and stores the needed configuration file; the third step that the client-side obtains the needed configuration file from the server terminal, monitors and collects in real time the operating information of the virtual machine monitor unit, and sends the operating information to the server terminal; the fourth step that the server terminal sets an abnormal threshold value according to historical collecting data, then conducts abnormal detection on the data collected in real time based on the abnormal threshold value, and sends the data collected in real time to the user; the fifth step that the server terminal generates label data according to a normal event and an abnormal attack event in a confirming result of the user, then establishes a disaggregated model based on the label data and historical collecting data, then utilizes the disaggregated model to conduct the abnormal detection on the data collected in real time, and sends a detection result to the user.

Description

technical field [0001] The invention relates to the security of a virtualization platform, in particular to a method and system for monitoring the security of a virtualization platform. It belongs to the field of information security technology. Background technique [0002] With the continuous maturity and wide application of virtualization technology and cloud computing technology, users gradually migrate their IT infrastructure to the virtualization platform to take advantage of various conveniences brought by virtualization technology: on-demand expansion, flexible migration, Data backup, failure recovery, etc. [0003] A virtualization platform refers to an infrastructure platform built using virtualization technology, including underlying hardware, a virtual machine monitor (VMM) and user virtual machines. Among them, the virtual machine monitor is the core part of the whole system. It is a system software that directly controls the underlying hardware and abstracts ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/455
CPCG06F9/45558G06F2009/45591G06F2009/45595
Inventor 陈驰申培松田雪于晶王贞灵杨玉婷张婧婧邢立华于秦宋根尧
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products