A method for intelligently scheduling cloud resources based on DDoS attack

A technology of intelligent scheduling and cloud resources, applied in electrical components, transmission systems, etc., can solve problems such as untimely switching of equipment, attack pre-evaluation, slow polling speed of scheduling cloud resources, etc., to achieve the effect of ensuring uninterrupted

Inactive Publication Date: 2018-12-25
ANHUI ZHONGXIN SOFTWARE
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, most customers use a single device for protection. As a result, the defense performance of a single device under large-scale attacks is limited. On the one hand, the master-slave device switch is not timely, and due to timeliness issues, the services provided by users cannot operate normally.
The traditional resource health status monitoring method under cloud protection can only solve non-persistent malicious attacks, and does not make pre-assessment and early-warning strategic defenses for attacks, which will result in insufficient response to attacks in a timely manner. The resource polling speed is too slow, and the user business is not pulled in time, causing the service to be attacked intermittently
It cannot play a good role in resource scheduling under cloud services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the technical solutions in the embodiments of the present invention will be clearly and completely described below. Obviously, the described embodiments are only a part of the present invention. example, not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0018] A method for intelligently scheduling cloud resources based on DDoS attacks, comprising the following steps:

[0019] Step 1. Integrate cloud resources: Deploy node resource services in different geographical locations and integrate them into cloud resources to provide cloud resource services in a cloud environment. Deploy protection servers in IDC computer rooms in different geographical locations as node resource...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of network security protection, in particular to a method for intelligently scheduling cloud resources under DDoS attack, comprising the steps of integrating cloud resources, monitoring the health status of each node resource server, eliminating overloaded server resources, re-accessing after repair, and seamlessly migrating user services under cloud services. The invention has the advantages of not only monitoring the load state and the hardware utilization rate, but also increasing the cloud resource distribution rate and the state monitoring of the cleaning amount, and pre-evaluating the access node mode. The allocation rate indicates how many resources the cloud resources are allocated, i.e., the utilization rate. The cleaning amount indicates the magnitude of the node's resource cleaning data, and the attack peak value is obtained. The return of the cleaning throughput value is used as the parameter of the pre-evaluation protection. Ability to make resource judgments and adjustments efficiently and in a timely manner; make an effective judgment of cloud resource status in advance to provide users with online services to protect against attacks through the integration of cloud resources to ensure the normal operation of the business carried by users.

Description

technical field [0001] The invention relates to the technical field of network security protection, in particular to a method for intelligently scheduling cloud resources based on DDoS attacks. Background technique [0002] With the rapid development of the Internet, it quickly occupies market share, making more people feel dependent on the Internet. Especially as mobile payments, shared services, the Internet of Things, and artificial intelligence are more connected to Internet platforms, network security has become particularly important. How to prevent flood-like attacks and protect user data security has become the focus of network security, because the server resources of a single node can withstand the attack peak is limited. This requires us to further integrate cloud resources and provide solutions for protecting against malicious attacks under cloud services. Based on the different needs of users and the consideration of different weight priorities, it is necessar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L63/1441H04L63/1458H04L67/51H04L67/60
Inventor 周先东邹甜杰朱静轩孟彦
Owner ANHUI ZHONGXIN SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products