Supercharge Your Innovation With Domain-Expert AI Agents!

Traffic auditing method applicable to cloud environment

A flow auditing and cloud environment technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as data risk amplification and hidden dangers in the positive development of cloud environment platforms

Active Publication Date: 2018-01-09
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, since a large number of servers are included in the cloud environment, a master server and a large number of slave servers are included in the server cluster. When data exchange is performed between the slave servers, the traffic between them does not pass through the switch, so it cannot be used The traffic of the audit object is collected in the way of switch mirroring, which further amplifies the data risk in the cloud environment and brings hidden dangers to the positive development of the cloud environment platform

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traffic auditing method applicable to cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work belong to the protection of the present invention. scope.

[0034] As shown in the figure, the present invention relates to a traffic audit method based on a cloud environment, the cloud environment includes a master server and several slave servers connected to the master server, and the method includes the following steps.

[0035] Step 1: Determine any slave server as the target server, install the packet cap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a traffic auditing method applicable to a cloud environment. The cloud environment comprises a main server and a plurality of slave servers connected with the main server. Anyslave server is determined as a target server, and a packet capturing program and a traffic proxy module are installed. The traffic proxy module of the target server needing to be audited is registered to an auditing device. The target server needing to be audited is configured in the auditing device and is synchronized to the traffic proxy module. The traffic proxy module controls the packet capturing program to collect a traffic packet of the target server needing to be audited. The traffic packet of the target server needing to be audited is filtered according to configuration information.Packaging information is increased and packaging is carried out. The packaged traffic packet is sent to the auditing device through the traffic proxy module. According to the method, the auditing device controls the target server and the packet capturing program on the target server to work through the traffic proxy module, the traffic packet of the target server is captured and packaged and thenis transmitted back to the auditing device for auditing, a function of obtaining access traffic of an auditing object in the cloud environment is realized, and an auditing purpose is finally achieved.

Description

technical field [0001] The present invention relates to the transmission of digital information, such as the technical field of telegram communication, and in particular to a traffic auditing method suitable for cloud environment in terms of network technology and database auditing. Background technique [0002] Cloud technology refers to a hosting technology that unifies a series of resources such as hardware, software, and network in a wide area network or a local area network to realize data calculation, storage, processing, and sharing. [0003] In the network under the cloud environment, various storage devices are connected to work together through application software to provide data storage and access services to the outside world. A large amount of data is stored in a collection composed of different servers and storage devices. Distributed data storage way to manage. [0004] The cloud environment platform includes a large number of servers. The server cluster inc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26
Inventor 吴雅琴范渊刘博龙文洁
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More