Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud host security detection system and method

A technology of security detection and cloud host, which is applied in the computer field, can solve problems such as the inability to further prevent attackers from attacking, high performance consumption, and server impact, so as to improve detection accuracy, prevent network attacks, and avoid security incidents.

Inactive Publication Date: 2019-08-06
JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Some cloud host intrusion detection systems that currently exist, such as firewalls, WAFs, IDS, IPS and other products, are mainly based on signature detection and can only play a role in security protection against attacks. If hackers bypass the protection of traditional firewalls and other security products After successfully obtaining the authority of the target host, security products such as traditional firewalls cannot further prevent the attacker from attacking.
In addition, IDS and IPS products require in-depth analysis of traffic packets, which consume a lot of performance and easily affect the normal business of the server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud host security detection system and method
  • Cloud host security detection system and method
  • Cloud host security detection system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0026] figure 1 A schematic structural diagram of a cloud host security detection system according to an embodiment of the present invention is shown. Such as figure 1 As shown, the system includes: a data collection module 100 , a data analysis module 101 , a result processing module 102 , and a presentation module 103 .

[0027] The data collection module 100 is suitable for collecting cloud host data.

[0028] Specifically, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud host security detection system and method. The system comprises: a data acquisition module, which is suitable for acquiring cloud host data; a data analysis module which is suitable for carrying out security analysis on the cloud host data to obtain a security analysis result; a result processing module which is suitable for intercepting unsafe behaviors on the cloud host according to the safety analysis result; and a display module which is suitable for displaying the acquired cloud host data, the security analysis result and the interception processing result.The cloud host security detection system is based on the host. Cloud host data generated on a protected cloud host are continuously collected and analyzed; according to the security analysis result,corresponding defensive measures are taken to immediately terminate the occurrence of malicious behaviors, the attack behaviors of attackers are thoroughly blocked, the network security risk faced bythe cloud host in the cloud environment is solved, an enterprise is helped to construct a cloud host security protection system, and the cloud host is prevented from being attacked by the network.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a cloud host security detection system and method. Background technique [0002] The cloud host provides a simple, efficient, safe, reliable, and elastically scalable computing service. The use of the cloud host can simplify the development and deployment process, reduce operation and maintenance costs, and build an on-demand expansion website architecture, so as to better adapt to the rapid and changeable Internet applications. characteristic. While cloud hosting provides convenient services, it is also more prone to security issues. The convenient access feature of the cloud host will make the cloud host and the data on the cloud more and more complicated. Therefore, it is extremely important to effectively ensure the security of the cloud host. [0003] Some cloud host intrusion detection systems that currently exist, such as firewalls, WAFs, IDS, IPS and other products, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/1433H04L63/1441H04L63/205
Inventor 汪德嘉华保健柴倩沈杰张瑞钦
Owner JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products