Detection defense method, server and storage medium
A server and virtual machine technology, applied in the field of network security, can solve problems such as difficulty in solving system security resources, generating overhead, and inability to detect internal attacks that sneak into the internal virtual machine system, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0072] The technical solution in this embodiment will be clearly and completely described below in conjunction with the accompanying drawings in this embodiment.
[0073] Such as figure 1 As shown, this embodiment provides a detection and defense method applied to a server, including:
[0074] S101. Obtain device-related information and historical attack information of each virtual machine in each time unit.
[0075] In the embodiment of the present application, the monitoring agent is set in a server or a cloud system, and the server assigns the host management program to observe the virtual machine system and identify malicious activities on the virtual machine system. In the preset time period of discrete time, (for example, [t1, t2]) for each time unit, the server will obtain the device-related information of each virtual machine, and then obtain each virtual machine through the detection load distributed on each virtual machine Historical attack information of the virtu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


