A cloud security function scheduling system based on SDN
A technology for security functions and scheduling systems, applied in the network field
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0024] Such as figure 1 As shown, the system includes a cloud security virtual orchestration module, a cloud security virtual function module, a cloud security virtual load module, a cloud security implementation module, and a virtual resource server module. The cloud security virtual orchestration module is used to implement the definition of security orchestration, and the cloud security virtual function module is called to complete the overall operation of the security orchestration;
[0025] The cloud security virtual function module is used to establish a security configuration server and call the cloud security virtual load module to complete the automatic configuration and deployment of a single security function;
[0026] The cloud security virtual load module is used to define different types of virtual security loads and realize automatic deployment;
[0027] The cloud security implementation module is responsible for receiving and processing the deployment command for the ...
Embodiment 2
[0030] Such as figure 2 As shown, the present invention is based on the SDN architecture. The SDN controller communicates with SDN switches at all levels through the openflow protocol. The main part of the cloud security function scheduling system can be deployed on any physical host or even a virtual machine connected to the network, including cloud security virtual orchestration module, cloud security virtual function module, cloud security virtual load module and cloud security implementation module; virtual resources The server module is installed inside each host and forms a logical connection with the main system through RPC. The main part of the system interacts with the controller by calling REST API.
[0031] Cloud security shields users from the physical characteristics of a specific network platform to provide a basis for unified and standardized security function scheduling. The module design is divided into three virtualization levels: orchestration layer, functi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

