Unlock instant, AI-driven research and patent intelligence for your innovation.

Detection defense method, server and storage medium

A server and virtual machine technology, applied in the field of network security, can solve problems such as difficulty in solving system security resources, generating overhead, and inability to detect internal attacks that sneak into the internal virtual machine system, etc.

Pending Publication Date: 2021-12-07
CHINA MOBILE SUZHOU SOFTWARE TECH CO LTD +1
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The network-based detection method puts the monitoring agent on the network layer, and monitors the circulating traffic to identify malicious behavior by detecting various data packets in the network segment. However, the network-based detection system may not be able to detect internal attacks that sneak into the internal virtual machine system.
Host-based detection and defense methods usually deploy monitoring agents on hosts that need to be protected, monitor attack activities and report abnormal behaviors by reading logs on the hosts, but host-based detection systems detect abnormalities after the attack event ends , and the detection system needs to be deployed to hosts in the network, which will generate a certain amount of overhead
[0003] The traditional game mechanism is only based on the monitoring of simple attack scenarios, lacks real-time learning of the types and targets of attackers who attack cloud systems, and is difficult to solve the problem of limited security resources of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection defense method, server and storage medium
  • Detection defense method, server and storage medium
  • Detection defense method, server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] The technical solution in this embodiment will be clearly and completely described below in conjunction with the accompanying drawings in this embodiment.

[0073] Such as figure 1 As shown, this embodiment provides a detection and defense method applied to a server, including:

[0074] S101. Obtain device-related information and historical attack information of each virtual machine in each time unit.

[0075] In the embodiment of the present application, the monitoring agent is set in a server or a cloud system, and the server assigns the host management program to observe the virtual machine system and identify malicious activities on the virtual machine system. In the preset time period of discrete time, (for example, [t1, t2]) for each time unit, the server will obtain the device-related information of each virtual machine, and then obtain each virtual machine through the detection load distributed on each virtual machine Historical attack information of the virtu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a detection and defense method. The detection and defense method comprises the following steps: acquiring equipment related information and historical attack information of each virtual machine; obtaining a risk index of the virtual machine according to the historical attack information and the equipment related information; according to the risk indexes of the virtual machines, determining a source virtual machine with the highest risk index in the virtual machines and a corresponding target virtual machine; when detecting that the source virtual machine is attacked, running the migration service copy by adopting an idle virtual machine to attract the attack; and acquiring actual attack data of attacking the idle virtual machine, and adjusting the distribution condition of the detection load on each virtual machine through a Bayesian game according to the actual attack data. Attacks are induced and attack behaviors are learned through a honeypot technology, and the detection load is optimized based on analysis of the attack behaviors, so that budgeting of security resources is realized, and optimal detection response is ensured.

Description

technical field [0001] The present application relates to the field of network security, in particular to a detection and defense method, a server and a storage medium. Background technique [0002] Existing intrusion detection methods are mainly divided into: network-based and host-based. The network-based detection method puts the monitoring agent at the network layer, and monitors the circulating traffic to identify malicious behaviors by detecting various data packets in the network segment. However, the network-based detection system may not be able to detect internal attacks that sneak into the internal virtual machine system. Host-based detection and defense methods usually deploy monitoring agents on hosts that need to be protected, monitor attack activities and report abnormal behaviors by reading logs on the hosts, but host-based detection systems detect abnormalities after the attack event ends , and the detection system needs to be deployed to hosts in the netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06K9/62G06F9/455H04L29/06
CPCG06F21/55G06F9/45558H04L63/1416H04L63/1491G06F2009/4557G06F18/2411G06F18/29
Inventor 缪红娣
Owner CHINA MOBILE SUZHOU SOFTWARE TECH CO LTD