Container-based security event processing method and device and storage medium

A security event and container technology, applied in the computer field, can solve the problems of high container false alarm rate and affect the efficiency of security event processing, and achieve the effect of reducing false alarm rate, reducing the duration of risk exposure, and optimizing the processing mechanism

Pending Publication Date: 2022-06-03
CHINA TELECOM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing container security protection system only considers the characteristics of the matching decision rule base, and does not consider the actual impact on the container,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Container-based security event processing method and device and storage medium
  • Container-based security event processing method and device and storage medium
  • Container-based security event processing method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030]The present disclosure is described more fully below with reference to the accompanying drawings, wherein thereof illustrates exemplary embodiments of the present disclosure. The following will be combined with the accompanying drawings in the present disclosure embodiment, the technical solution in the present disclosure embodiment is clearly and completely described, obviously, the embodiment described is only a part of the embodiment of the present disclosure, not all embodiments. Based on embodiments in the present disclosure, all other embodiments obtained by those of ordinary skill in the art without doing creative work are within the scope of the present disclosure. The following in conjunction with various diagrams and embodiments of the present disclosure of the technical solution to a multi-faceted description.

[0031] Figure 1 For a process diagram of an embodiment of a container-based security event handling method disclosed herein, such as Figure 1 As shown:

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security event processing method and device based on a container and a storage medium, and relates to the technical field of computers, and the method comprises the steps: calculating a security coefficient of a container security event based on a container security factor; wherein the container security factors comprise a sensitive degree value of an accessed object of the container, an accessed frequency value of the container and a state change amplitude value of the container; sorting the container security events based on the security coefficients; and performing event type matching on the container security events according to the sorting result, and performing security scanning. According to the method, the device and the storage medium disclosed by the invention, the safety factor can be calculated in combination with a plurality of safety factors and weights of the container, and reasonable judgment is performed according to actual influence on the container, so that a container safety event processing mechanism can be optimized; the risk exposure time can be reduced, and the false alarm rate is effectively reduced.

Description

Technical field [0001] The present disclosure relates to the field of computer technology, in particular to a container-based secure event processing method, apparatus and storage medium. Background [0002] MeC (Multi-access Edge Computing, multi-access edge computing) platform through network capabilities open, the intensive computing power sinks to the edge node closer to the user side, MEC applications can call in real time to access network information, to provide users with high-speed, low-latency quality services. Since the MEC platform and application are deployed in containers, container security protection has become one of the key technologies to ensure the safe and reliable operation of the MEC platform and applications. At present, the container security protection system is based on firewall, intrusion detection and prevention, host monitoring and honeypot load to enable security event listening, and generate container security events by triggering the decision rule...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55
CPCG06F21/554
Inventor 潘家铭何明沈军樊宁吴国威张蔚茵李柯汪来富金华敏
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products