Cloud host-oriented full-flow network access protection method and device

A network access, full-traffic technology, applied in the field of cloud host full-traffic network access protection, can solve problems such as cumbersome operation steps, firewall technology cannot meet cloud host security protection, cloud host protection policy configuration conflicts, etc., to optimize the operation experience , The effect of efficient management and rapid network security policy configuration and distribution

Active Publication Date: 2022-04-19
COSCO SHIPPING TECH CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem that traditional firewall technology cannot meet the security protection of existing cloud hosts, the north-south protection of traditional cloud hosts requires high professional technical requirements through local firewalls, and the east-west direction of cloud hosts Conflicts with the north-south traffic protection method are likely to exist in the protection policy configuration, and the protection policy configuration of the east-west and north-south traffic related to multiple cloud hosts lacks synergy and cumbersome operation steps. Method and device for cloud host full-flow network access protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud host-oriented full-flow network access protection method and device
  • Cloud host-oriented full-flow network access protection method and device
  • Cloud host-oriented full-flow network access protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only Embodiments of some, but not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0050] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of cloud computing and information security, in particular to a cloud host full-flow network access protection method and device. Under the traditional north-south flow protection, the protection capability of the east-west level of cloud resources is realized through the cloud computing service arrangement and automation technology, and the protection capability is complementary with the north-south flow protection to form full-flow network access protection. The method specifically comprises the following steps: establishing a response rule of a distributed firewall, establishing a response rule of a full-flow firewall, configuring a full-flow protection strategy, obtaining a full-flow protection strategy demand and responding, thereby automatically realizing protection of full-flow network access. The invention further provides a corresponding device, and the problems that the professional requirement of a traditional firewall technology is high, protection strategy configuration conflicts exist in a protection mode, protection strategy configuration among multiple cloud hosts lacks collaboration, operation steps are tedious and the like are solved.

Description

technical field [0001] The invention relates to the technical field of cloud computing and information security, in particular to a method and device for cloud host full-flow network access protection. Background technique [0002] A firewall is a system composed of computer hardware and software. It is deployed on the network border and serves as a bridge between the internal network and the external network. Internal network data security. Firewall technology is an applied security technology based on network technology and information security technology. Almost all enterprise internal networks and external networks (such as the Internet) will be equipped with firewalls at the borders connecting them. Firewalls can perform security filtering and security isolation. Harmful network security information and behaviors such as external network attacks and intrusions. But in the face of cloud hosts, traditional network firewall technology can no longer meet the requirements ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/02H04L63/10H04L63/0263H04L63/0227Y02D30/50
Inventor 吴中岱王骏翔郭磊胡蓉韩冰刘晋
Owner COSCO SHIPPING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products