Unlock instant, AI-driven research and patent intelligence for your innovation.

Protection method and related equipment thereof

A technology of equipment and protection systems, applied in the field of cloud computing, can solve problems such as low security

Active Publication Date: 2021-11-05
SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in some cases, hackers can use the container to invade the virtual machine (or host) where the container is located, so that the security of the virtual machine (or host) deployed with the container is relatively low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method and related equipment thereof
  • Protection method and related equipment thereof
  • Protection method and related equipment thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In the research on the container, the inventor found that the business application deployed on the container will expose the ports to the public network, and hackers can invade the container through these ports, thereby invading the virtual machine (host machine) where the container is located, which leads to the virtual machine (host) where the container is deployed. The security of the host machine (or, the host machine) is relatively low.

[0044]Based on the above findings, in order to solve the technical problems in the background technology, an embodiment of the present application provides a protection method, the method includes: after the kernel layer obtains the operation to be executed, if the kernel layer determines that the operation to be executed The execution operation belongs to the first preset operation type, it is determined that the operation to be performed is a process in the container, and the target directory corresponding to the operation to be ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a protection method and related equipment, and the method comprises the steps: obtaining a to-be-executed operation in a kernel layer; if it is determined that the to-be-executed operation belongs to a first preset operation type, the to-be-executed operation is a process in a container, a target directory corresponding to the to-be-executed operation is a to-be-used mounting directory pre-stored in a memory, and a target mounting device corresponding to the to-be-executed operation belongs to a host storage device, sending notification information to an application layer, so that the application layer to migrate a target operation object corresponding to the operation to be executed to an isolation area, and generating alarm information according to the target operation object; enabling the application layer to send the alarm information to an interaction layer, so that the interaction layer judges whether the operation to be executed is a normal business operation or not, obtaining an identification result corresponding to the operation to be executed, and sending the identification result to the application layer; and enabling the application layer to determine the object processing operation corresponding to the operation to be executed according to the identification result, so that the security of a virtual machine (or a host machine) deployed with a container can be effectively improved.

Description

technical field [0001] The present application relates to the technical field of cloud computing, in particular to a protection method and related equipment. Background technique [0002] With the rapid development of cloud computing technology, virtualization technology has gradually become a popular technology. The hardware-based virtualization technology usually refers to a virtual machine, while the operating system-based virtualization technology usually refers to a container. For example: one hardware server can virtualize multiple virtual machines, and each virtual machine can virtualize multiple containers. [0003] The advantage of containers is that they can isolate resources and avoid mutual interference. Therefore, many cloud users deploy business applications on containers. [0004] However, in some cases, a hacker can use the container to invade the virtual machine (or host machine) where the container is located, so that the security of the virtual machine (...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455G06F9/50
CPCG06F9/45558G06F9/5016G06F2009/45562Y04S10/50
Inventor 甄鹏梁媛唐超
Owner SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More