Unlock instant, AI-driven research and patent intelligence for your innovation.

A timing-based cloud computing intelligent security system

A security system and cloud computing technology, applied in the field of cloud computing security to achieve the effect of defending against malicious attacks and ensuring system security

Active Publication Date: 2020-06-16
鹤壁城市云云计算有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the urgent and necessary work of cloud computing virtualization security management and control, so as to ensure the stable and safe operation of the business system in the cloud computing environment, the present invention provides a time-sequence-based cloud computing intelligent security system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A timing-based cloud computing intelligent security system
  • A timing-based cloud computing intelligent security system
  • A timing-based cloud computing intelligent security system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] The reference picture is figure 1 , figure 2 . A timing-based cloud computing intelligent security system, comprising: a cache module 1, an analysis module 2, a simulation module 3, and an interception module 4, the cache module 1 is connected to the analysis module 2, and the analysis module 2 is connected to the simulation module Module 3, the simulation module 3 is connected to the interception module 4, the cache module 1 caches the data flow, the analysis module 2 analyzes the data flow, and the simulation module 3 simulates the data flow according to the analysis result Impact on the system, the interception module 4 intercepts the data stream according to the simulation results of the simulation module 3, the cache module 1 includes a number of virtual cache spaces, the virtual cache spaces are marked with a time series sequence, and the cache module 1 according to The timing signal of the data stream splits the data stream and stores the data stream in a virt...

Embodiment 2

[0031] The reference picture is figure 1 , image 3 . With regard to Embodiment 1, the difference of this embodiment lies in:

[0032] As a preferred mode of the present invention, the analysis module 2 includes a clock signal identification block 21, and the identification block 21 identifies the clock signal and compares it with the overall timing signal to make a role corresponding to the data node in the data stream Position judgment and judgment on the overall orientation of the data flow.

[0033] As a preferred mode of the present invention, the interception module 4 includes an identification block 41, and the identification block 41 identifies the timing signal of the current data flow and the clock signal of the current data flow to confirm the data flow and perform intercept.

[0034] As a preferred mode of the present invention, the interception module 4 also includes an identification block 42, the virtual cache space includes a disaster recovery space, and th...

Embodiment 3

[0037] The reference picture is figure 1 , Figure 4 . With regard to Embodiment 1, the difference of this embodiment lies in:

[0038] As a preferred mode of the present invention, it also includes a log management module 5, the log management module 5 is respectively connected to the cache module 1, the analysis module 2, the simulation module 3 and the interception module 4, and the log management module 5 is aimed at all The cache module 1, the analysis module 2, the simulation module 3 and the interception module 4 perform log records on the processing of the data flow and the data flow ontology.

[0039] As a preferred mode of the present invention, the log management module 5 performs log feedback of the cache module 1, the simulation module 3 and the interception module 4 according to the data stream processing process, simulation process and guidance process based on time series information in the log records.

[0040] As a preferred manner of the present invention...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a cloud computing intelligent security system based on a time sequence. The system comprises a caching module, an analysis module, a simulation module and an interception module; the caching module is used for caching data flow; the analysis module is used for analyzing the data flow; the simulation module is used for simulating the influence of the data flow on the systemaccording to an analysis result; the interception module is used for intercepting the data flow according to a simulation result of the simulation module; the caching module comprises a plurality ofvirtual caching spaces; the virtual caching spaces are calibrated with the time sequence; the caching module carries out data flow splitting according to a time sequence signal of the data flow and performs time sequence-based corresponding virtual caching storage on the data flow; the analysis module judges an action position corresponding to a data node in the data flow based on the time sequence signal and judges the overall guide of the data flow; the simulation module simulates an influence process of the data flow for a system module according to the analysis result of the analysis module; and the interception module intercepts the data flow for the influence process.

Description

technical field [0001] The invention relates to the field of cloud computing security, in particular to a timing-based cloud computing intelligent security system. Background technique [0002] With the continuous development of information technology, cloud computing has become a new computing method following distributed computing, parallel computing, and grid computing. It can provide users with services such as resource leasing, service outsourcing, and application hosting. The advantages of economy and easy expansion have quickly become the hot spot in the development of information technology. But while bringing convenience to users, it also poses great challenges to users' information security, asset security, and privacy security. At present, cloud computing security has become an urgent problem in the development of cloud computing, and its criticality and urgency cannot be ignored. [0003] In the cloud computing virtual environment, there are multiple virtual ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F21/57
CPCG06F21/55G06F21/57
Inventor 李峰
Owner 鹤壁城市云云计算有限公司