Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for monitoring threat behaviors in virtual network

A virtual network and behavioral technology, applied in the field of cloud computing security, can solve problems such as virtual network resource damage, inability to accurately identify malicious internal threats in the cloud service environment, and achieve the effect of ensuring security

Active Publication Date: 2020-04-03
BEIJING UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a monitoring method and system for virtual network internal threat behaviors, which are used to solve the phenomenon that in the prior art, it is impossible to accurately identify malicious internal threats in the cloud service environment, resulting in damage to virtual network resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for monitoring threat behaviors in virtual network
  • Method and system for monitoring threat behaviors in virtual network
  • Method and system for monitoring threat behaviors in virtual network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0047]In view of the problem in the prior art that it is impossible to accurately identify malicious internal attacks and tampering in the cloud service environment, resulting in the destruction of virtual network resources, an embodiment of the present invention provides a method for monitoring internal threat behaviors in a virtual network. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and a system for monitoring threat behaviors in a virtual network. The method comprises: acquiring a tenant normal behavior request, and constructinga credible level calling model based on the normal behavior request; collecting actual behavior requests of the tenants, and if it is monitored that the tenants carry out virtual network management configuration operation, generating an actual call process model through a behavior tracing mode based on the collected actual behavior request information; and matching the actual call process model with the trusted level call model to obtain a behavior matching result, judging whether the actual behavior request is a malicious attack behavior or not according to the matching result, and feeding back the matching result to the tenant. According to the embodiment of the invention, by adopting a behavior tracing and monitoring method for internal security threats and combining behavior matching,on the basis of a credible hierarchical association model, an actual behavior is compared with a credible behavior model, and feedback is realized, so that internal security risk monitoring is realized, and the security of a virtual network in a cloud environment is ensured.

Description

technical field [0001] The invention relates to the technical field of cloud computing security, in particular to a method and system for monitoring threat behaviors inside a virtual network. Background technique [0002] Cloud computing has become one of the current research hotspots in the information field. By introducing a virtual layer between system software and hardware, it shields the dynamics, distribution, and heterogeneity of the hardware platform, and realizes the effective aggregation and reuse of underlying IT resources. , and provide dynamic, scalable large-scale computing and storage services to remote computer users in a simple and transparent manner. [0003] However, because the user's available resources are placed in the cloud service provider, the user has limited management rights to the virtual machine used by the user, including storage, computing, and network. In this scenario, malicious insiders in the cloud service provider Maliciously modifying ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/1408H04L63/1425H04L63/1441H04L41/14
Inventor 林莉杨焕增储振兴檀文婷
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products