Container malicious behavior detection method and device

A container and behavioral technology, applied in the computer field, can solve the threat of malware and other problems, achieve the effect of preventing intrusion, improving security, and preventing container operation

Inactive Publication Date: 2020-09-29
SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of today's information technology, the cloud computing platform based on the container-based microservice architecture has brought great convenience to enterprises and individuals, but while people enjoy the convenience of work and life brought by the Internet, They are also threatened by computer malware all the time, and computer viruses have become one of the main threats to computer security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Container malicious behavior detection method and device
  • Container malicious behavior detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the object, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0043] Based on the above purpose, the first aspect of the embodiments of the present invention proposes an embodiment of a method for container malicious behavior detection. figure 1 Shown is a schematic flow chart of the method.

[0044] like figure 1 As shown in , the method may include the following steps:

[0045] S1 collects a sample set of container behavior and establishes a container behavior library, and obtains a container behavior sample set by pre-running a container with normal software (non-malicious) and a container with malware;

[0046] S2 uses the behavior library as a deep learning sample library, and uses multiple learning algorithms to train and combine to obtain a container beha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a container malicious behavior detection method and device. The method comprises the following steps: collecting a sample set of container behaviors, and establishing a behaviorlibrary of containers; taking the behavior library as a deep learning sample library, and performing training and combining by using a plurality of learning algorithms to obtain a container behaviorjudgment model; in response to operation of the container on the host, obtaining behavior data of the container and performing judgment by using the judgment model; and processing the container in response to the judgment that malicious behaviors exist in the behavior data of the container. By the adoption of the scheme, invasion of malicious software can be effectively defended, the container with malicious behaviors is prevented from running, and the safety of the container in the cloud computing and micro-service environment is improved.

Description

technical field [0001] This field relates to the computer field, and more specifically relates to a method and device for container malicious behavior detection. Background technique [0002] With the rapid development of today's information technology, the cloud computing platform based on the container-based microservice architecture has brought great convenience to enterprises and individuals, but while people are enjoying the convenience of work and life brought by the Internet, It is also threatened by computer malware all the time, and computer viruses have become one of the main threats to computer security. At the same time as the development of information technology, the technology of computer malware is also developing at the same time. It is developing in the direction of advanced, large-scale, complex, and service-oriented development and cross-platform development. Cloud hosts in the cloud computing environment have become its main object of attack. In respon...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F9/455
CPCG06F9/45558G06F21/566
Inventor 韩春超
Owner SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products