Protection method and device of virtual environment

A virtualized environment and environment technology, applied in the field of protection methods and devices for virtualized environments, can solve problems such as poor protection function and inability to prevent hacker detection, and achieve the effect of improving the protection effect

Active Publication Date: 2018-01-09
BEIJING QIHOO TECH CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the process of implementing the present invention, the inventor found that the existing virtualization environment has at least the following problems: experienced hackers usually write codes to access the relevant feature information of the virtualization environment, so as to detect the current location accordin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method and device of virtual environment
  • Protection method and device of virtual environment
  • Protection method and device of virtual environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0025] figure 1 A flow chart of a method for protecting a virtualized environment provided by an embodiment of the present invention is shown. Wherein, the virtualization environment in this embodiment includes: a virtualization environment constructed by a virtual machine, and / or a virtualized environment constructed by a sandbox. Such as figure 1 As shown, the method includes the following steps:

[0026] Step S100: Predetermi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a protection method and device of a virtual environment. The protection method comprises the steps of intercepting an access request message when the access request message used for accessing the environment character information of the virtual environment is monitored; determining access result data which correspond to the access request message and determining the data type of the access result data; inquiring a protection strategy which matches the data type of the access result data, and performing protection processing on the access request message based on the inquired protection strategy. As a result, the protection method and device of the virtual environment can monitor the access request message which is used for accessing the environment character information of the virtual environment and can perform the corresponding protection processing on the access request message to prevent people from identifying the virtual environment, and the protection effect of the virtual environment is improved.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a protection method and device for a virtualized environment. Background technique [0002] With the continuous development of communication technology, the Internet has been integrated into every aspect of life. However, as a derivative of the development of the Internet, hacking technology has also become pervasive, threatening network security increasingly seriously. Take the wireless network as an example, although the wireless network has won more and more users because of its advantages of easy access. However, incidents of hacking attacks by invading wireless networks are also increasing. For this reason, various defensive means have emerged to deal with hacker intrusions. For example, the behavior of hackers can be detected and analyzed through a virtualized environment, so that targeted defense measures can be taken. [0003] However, in the process of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 柴坤哲曹鸿健王永涛杨卿
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products