Check patentability & draft patents in minutes with Patsnap Eureka AI!

Security scheduling method and system for virtual micro-isolation network

A virtual network and security technology, applied in the field of network security, which can solve the problems of lack of control methods for traffic data, scheduling of massive resources, and lack of dynamic deployment of security protection strategies.

Inactive Publication Date: 2020-06-12
武汉思普崚技术有限公司
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a security scheduling method and system for a virtual micro-isolated network, to solve the lack of control methods for traffic data between massive virtual machines in the prior art and the lack of dynamic deployment security protection strategies, how to solve the problem in the case of private cloud Technical Issues in Scheduling Massive Resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security scheduling method and system for virtual micro-isolation network
  • Security scheduling method and system for virtual micro-isolation network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0043] figure 1 A flow chart of the security scheduling method for the virtual micro-isolated network provided by this application, the method includes:

[0044] Obtain traffic data in the distributed virtual network, use the OpenFlow protocol to collect traffic statistics, analyze and extract feature vectors and flow entries in the traffic data, and obtain each virtual machine in the distributed virtual network according to the association relationship of the flow entries communication relationship;

[0045] Before obtaining the communication relationship of each virtual machine in the distributed virtual network, it also includes obtaining all...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security scheduling method and system for a virtual micro-isolation network. The method comprises the following steps: collecting, analyzing and extracting feature vectors andflow table entries in flow data by using an OpenFlow protocol; obtaining a communication relationship between virtual machines in a distributed virtual environment, carrying out micro-isolation grouping on the virtual machines by using clustering processing; verifying whether a network attack behavior exists between the virtual machines in the communication relationship or not; dynamically deploying a security protection strategy for micro-isolation grouping of the virtual machine according to a verification result; the private cloud divides a resource pool into a plurality of resource groupsaccording to the micro-isolation groups, wherein each resource group corresponds to one or more micro-isolation groups, different flows are sent to the corresponding micro-isolation groups after passing through the security components in the corresponding resource groups, detection is carried out again according to the security protection strategies of the micro-isolation groups, and service processing is carried out by the virtual machines in the groups after the detection is passed.

Description

technical field [0001] The present application relates to the technical field of network security, and in particular to a security scheduling method and system for a virtual micro-isolated network. Background technique [0002] Now it is more and more common to use virtualization technology to build data centers, which brings new security issues. In a virtualized network environment, a large amount of traffic data is forwarded through virtual switches instead of firewalls, making traditional security protection measures ineffective. The communication flow between virtual machines becomes uncontrollable, and the threats of internal virtual machines cannot be detected or controlled. There are a large number of virtual machines in a distributed virtual environment. How to dynamically deploy security protection policies is also a technical problem that needs to be solved urgently. [0003] At the same time, each unit will build a private cloud, which may deploy a large number o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455G06K9/62H04L29/06
CPCG06F9/45558H04L63/1416H04L63/1433H04L63/20H04L63/02H04L63/30G06F2009/45587G06F2009/45595G06F2009/4557G06F18/23213G06F18/23
Inventor 段彬
Owner 武汉思普崚技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More