Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Target-based virtual machine key file out-of-domain real-time supervision method

A key file and virtual machine technology, which is applied in the field of real-time monitoring of key files of virtual machines based on the target, can solve problems such as virtual machine performance degradation, and achieve the effect of reducing load

Pending Publication Date: 2022-03-18
INST OF ELECTRONICS & INFORMATION ENG OF UESTC IN GUANGDONG
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since file operations are high-frequency operations, real-time file monitoring based on operations will cause high performance degradation to virtual machines, making this monitoring method unsuitable for cloud computing environments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Target-based virtual machine key file out-of-domain real-time supervision method
  • Target-based virtual machine key file out-of-domain real-time supervision method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Certain terms are used, for example, in the description and claims to refer to particular components. Those skilled in the art should understand that hardware manufacturers may use different terms to refer to the same component. The specification and claims do not use the difference in name as a way to distinguish components, but use the difference in function of components as a criterion for distinguishing. As mentioned throughout the specification and claims, "comprising" is an open term, so it should be interpreted as "including but not limited to". "Approximately" means that within an acceptable error range, those skilled in the art can solve technical problems within a certain error range and basically achieve technical effects.

[0024] In addition, the terms "first", "second", etc. are used for descriptive purposes only, and should not be construed as indicating or implying relative importance.

[0025] In the invention, unless otherwise clearly specified and l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of virtual machine file monitoring, and particularly relates to a target-based virtual machine key file out-of-domain real-time supervision method, which comprises the following steps of: 1, analyzing an operation mechanism of a Linux file system, and searching an event available for CFWatcher; 2, monitoring the access to a target file by monitoring the reference count of a dense object corresponding to the target file in the out-of-domain monitoring virtual machine; and step 3, during monitoring, protecting a dense object of the monitored file through the CFWatcher. According to the invention, the load of the virtual machine caused by real-time monitoring can be reduced, and the method can be applied to a cloud computing environment.

Description

technical field [0001] The invention belongs to the technical field of virtual machine file monitoring, and in particular relates to an object-based method for out-of-domain real-time monitoring of key files of virtual machines. Background technique [0002] The polling file monitoring system based on virtual machine introspection is suitable for monitoring a large number of system files and user files in a virtual machine because it does not cause real-time monitoring load. However, there is a problem of lack of real-time performance in polling monitoring, and it is not suitable for key core files in virtual machines, such as system configuration files. For the key files of the system and users, it is often necessary to monitor their changes in real time to achieve real-time exception response. [0003] Real-time file monitoring captures file access during virtual machine execution to analyze its security. For example, capture virtual machine file operations and log the e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/30
CPCG06F11/301
Inventor 余翔湛詹东阳叶麟郭新凯张宇刘立坤于海宁方滨兴
Owner INST OF ELECTRONICS & INFORMATION ENG OF UESTC IN GUANGDONG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products