Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data traffic monitoring method for cloudstack

A monitoring method and data flow technology, applied in the field of cloud computing, can solve the problems that traditional information security is difficult to deal with, and achieve the effect of easy deployment

Inactive Publication Date: 2017-06-30
FUZHOU UNIV
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the rise of cloud computing, the traditional information security with isolation as the main idea has become increasingly difficult to deal with in the new IT architecture.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data traffic monitoring method for cloudstack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The technical solution of the present invention will be specifically described below in conjunction with the accompanying drawings.

[0017] The present invention provides a cloudstack-oriented data flow monitoring method, which is deployed on each Hypervisor cluster host of the cloudstack, and calls the packet capture tool in the form of a script file for 24 hours for all virtual network cards on each host Uninterrupted automatic packet capture, and the packet is stored in a folder in a unified command format, so as to monitor the data traffic at the virtual network card level on the cloudstack.

[0018] Furthermore, in the cloudstack network architecture, CloudStack designs management, public, customer, and storage networks according to different types of data traffic. When a virtual machine needs to access the Internet or an external network, it needs to go through the public network; when the end user runs the virtual machine instance created by CloudStack, guest tr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to data traffic monitoring method for cloudstack. For all virtual network cards of each hypervisor cluster host deployed in cloudstack, a package grabbing sub-module calls a package grabbing tool to carry out 24-hour uninterrupted automatic package grabbing in the form of a script file; a package file passes through a local storage sub-module, and the package file is stored in a folder in a unified command format; and a package analysis sub-module is used to analyze information in the folder, and the data traffic of the virtual network card level on cloudstack is monitored. According to the data traffic monitoring method for cloudstack, a basis is provided for subsequent network security protection by finding the corresponding virtual machine for the preliminary analysis of a data package on a cloudstack cloud platform.

Description

technical field [0001] The invention relates to the field of cloud computing, in particular to a cloudstack-oriented data flow monitoring method. Background technique [0002] In the traditional information security era, isolation is mainly used as a security method, which is divided into physical isolation, internal and external network isolation, and encrypted isolation. Practice has proved that this isolation method can effectively protect traditional IT architecture. With the rise of cloud computing, this kind of traditional information security with isolation as the main idea has become increasingly difficult to deal with in the new IT architecture. The typical scenario of public cloud is multi-tenant sharing, but compared with traditional IT architecture, the original trusted boundary is completely broken, threats may directly come from adjacent tenants, and cloud security becomes particularly important. CloudStack is an open source cloud operating system that can hel...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/30
Inventor 刘漳辉项滔陈星
Owner FUZHOU UNIV
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More