Container anomaly detection method and system

An anomaly detection and container technology, applied in the field of cloud computing security, to achieve the effects of high efficiency, reduced frequency and reduced burden

Pending Publication Date: 2021-12-10
HUAZHONG UNIV OF SCI & TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Some abnormalities may directly generate corresponding error messages to help maintenance personnel locate the cause of the abnormality, but some malicious attacks only generate normal logs as in normal operation. Finding "abnormal" logs in these normal logs only depends on manual analysis Difficult to complete

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Container anomaly detection method and system
  • Container anomaly detection method and system
  • Container anomaly detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0025] In the present invention, the terms "first", "second" and the like (if any) in the present invention and drawings are used to distinguish similar objects, and are not necessarily used to describe a specific order or sequence.

[0026] figure 1 It is a flowchart of a container abnormality detection method provided by an embodiment of the present invention, and the detection method include...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a container anomaly detection method and system, and belongs to the technical field of cloud computing security. The method comprises the steps: firstly collecting log data, filtering, simplifying and complementing the log data, and innovatively proposing to obtain new log data according to column numbering; then, respectively calculating the support degree of each column of elements in the new log data, removing the elements with the support degree smaller than the minimum support degree in each column, independently storing the remaining elements in each column, and adding zero elements to the ends of the remaining elements; sequentially and randomly selecting one element according to columns, combining the elements, and judging the support degree of the combination to find out all element combinations of which the support degree is greater than or equal to the minimum support degree and the length is equal to the log entry field number; and finally, feeding back the selected part of element combinations with the maximum weights to a system administrator so as to carry out container anomaly detection. Therefore, the method can help a system administrator to quickly and accurately position the abnormity, and reduces the burden of system maintenance personnel.

Description

technical field [0001] The invention belongs to the technical field of cloud computing security, and more specifically, relates to a container abnormality detection method and system. Background technique [0002] As a new service model different from the traditional service model, cloud computing can enable users to access high-quality, high-security infrastructure services at a lower price. Nowadays, more and more people prefer to use cloud computing technology for some large-scale data calculations. Cloud technology is the foundation of virtualization, and the resource management and development of virtualization are inseparable from the support of cloud computing. However, due to the problems of virtualization technology such as long startup time, low utilization of system resources and differences in stack environments between virtual machines, Docker container technology was born as an alternative. [0003] Docker is an operating environment designed for system admin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/18G06F16/16G06F16/903G06F9/455
CPCG06F16/1815G06F16/164G06F16/90344G06F9/45558G06F2009/45591
Inventor 谢雨来余岱松周潘冯丹
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products