Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Isolation attack method and system for distributed virtual network

A virtual network and distributed technology, applied in the field of isolated attack methods and systems for distributed virtual networks, can solve problems such as massive network structure prediction attacks, lack of dynamic deployment security protection strategies, and lack of control methods for traffic data.

Inactive Publication Date: 2020-06-12
武汉思普崚技术有限公司
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a distributed virtual network isolation attack method and system, to solve the lack of control methods for traffic data between massive virtual machines in the prior art, the lack of dynamic deployment security protection strategies, and the prediction of attacks against massive network structures technical issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Isolation attack method and system for distributed virtual network
  • Isolation attack method and system for distributed virtual network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, and the protection scope of the present invention can be more clearly defined.

[0043] figure 1 A flow chart of the method for isolating attacks of a distributed virtual network provided by this application, the method comprising:

[0044] Obtain traffic data in the distributed virtual network, use the OpenFlow protocol to collect traffic statistics, analyze and extract feature vectors and flow entries in the traffic data, and obtain each virtual machine in the distributed virtual network according to the association relationship of the flow entries communication relationship;

[0045] Before obtaining the communication relationship of each virtual machine in the distributed virtual network, it also includes obtaining all ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an isolation attack method and system for a distributed virtual network. The method comprises the following steps: collecting, analyzing and extracting feature vectors and flowtable entries in flow data by using an OpenFlow protocol; obtaining a communication relationship between virtual machines in a distributed virtual environment, carrying out micro-isolation grouping onthe virtual machines by using clustering processing; verifying whether a network attack behavior exists between the virtual machines in the communication relationship or not; dynamically deploying asecurity protection strategy for micro-isolation grouping of the virtual machine according to a verification result; situational values of a single device and a local network are evaluated, the architecture composition of the whole network is combined to obtain the situation value of the whole system, the situation values of different levels are imported into a neural network model for attack prediction, and finally, the security protection strategy of related micro-isolation groups is dynamically adjusted according to the prediction result.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a method and system for isolating attacks of a distributed virtual network. Background technique [0002] Now it is more and more common to use virtualization technology to build data centers, which brings new security issues. In a virtualized network environment, a large amount of traffic data is forwarded through virtual switches instead of firewalls, making traditional security protection measures ineffective. The communication flow between virtual machines becomes uncontrollable, and the threats of internal virtual machines cannot be detected or controlled. There are a large number of virtual machines in a distributed virtual environment. How to dynamically deploy security protection policies is also a technical problem that needs to be solved urgently. [0003] At the same time, a large number of virtual machines form a huge network structure, and potenti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24G06K9/62
CPCH04L63/1408H04L63/1441H04L63/1433H04L63/20H04L41/12G06F18/231G06F18/2321G06F18/23213
Inventor 段彬
Owner 武汉思普崚技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products