CN105376345B - A kind of cloud platform security processing, controller and cloud computing system - Google Patents
A kind of cloud platform security processing, controller and cloud computing system Download PDFInfo
- Publication number
- CN105376345B CN105376345B CN201510849738.XA CN201510849738A CN105376345B CN 105376345 B CN105376345 B CN 105376345B CN 201510849738 A CN201510849738 A CN 201510849738A CN 105376345 B CN105376345 B CN 105376345B
- Authority
- CN
- China
- Prior art keywords
- request
- cluster
- virtual
- information
- controller
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/10—Mapping addresses of different types
- H04L61/103—Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
This application provides a kind of cloud platform security processing, controller and cloud computing systems, to ensure the safety of host, this method comprises: controller receives arp request;Judge that the request is the request of Virtual Cluster or the request of physical cluster according to the information that the request carries;According to judging result using Virtual Cluster or the control strategy of physical cluster.By the operation of controller, the removing of virtual platform and physical cluster is realized, so that the system operation of entire cloud platform does not interfere with the operation of physical cluster, true physical machine or controller will not be made under attack because of the query-attack of virtual platform.
Description
Technical field
This application involves field of cloud computer technology more particularly to a kind of cloud platform security processings, controller and cloud meter
Calculation system.
Background technique
It turns to cloud computing (cloud computing), is the great change that industry will face.Various cloud platforms
The appearance of (cloud platforms) is one of most important link of the transformation.And the maximum several features of cloud platform are exactly:
A) ultra-large
B) it virtualizes
C) high reliability
D) versatility
E) high scalability
F) cheap
In these features, enterprise or personal most pay close attention to should be exactly high reliability.Either platform is highly reliable,
Or data is highly reliable.Although cloud computing provides powerful calculating and storage capacity for user, cloud service provider is difficult to know
Whether the purpose of other user behavior, the required cloud computing service that user cannot be distinguished are legal.So some users' is illegal
Potential risk caused by request just securely and reliably produces huge impact to cloud platform.
Cracker community is locked in target of attack in the abundant cloud data center of interests, with " Guest OS (client behaviour
Make system) mirror image distorts ", " virtual machine sprawling " and " (Application Programming Interface, is answered api interface
With Program Interfaces) abuse " etc. start to occur extensively for the novel threat of representative.With block based on killing it is passive passively
Safeguard procedures, impossible to guard against in face of new Situation on Information Security, traditional network security, terminal security, security boundary solve
Scheme can not adapt to the demand for security of cloud data center.
Existing cloud platform Host Security scheme is exactly, using dedicated security server, dedicated secure virtual machine set
Part, dedicated secure operating system, dedicated safety container external member and special safety management platform, five in this way are big
Component part forms the cloud platform of a safety.
It is had the following problems using existing cloud platform Host Security scheme:
A) dependence is high.
What existing technology used is all dedicated server and dedicated service parts, this has resulted in Build Security
The dependence of cloud platform environment.
B) complexity is high.
The safe and reliable of host may be implemented really using existing technology, but need from inside to outside, from server
Carry out security protection certification all to system image to realize.Higher demand undoubtedly can be proposed to hardware in this way, while can also be made
Building for entire platform is more complicated.
Summary of the invention
The embodiment of the present application proposes a kind of cloud platform security processing, controller and cloud computing system, does not need to make
With dedicated security server, dedicated secure virtual machine external member, dedicated secure operating system, dedicated safety container external member
And special safety management platform, five in this way big component part form the cloud platform of a safety, and ensure master
The safety of machine.
In one aspect, the embodiment of the present application provides a kind of cloud platform security processing, comprising:
Controller receives arp request;
Judge that the request is the request of Virtual Cluster or the request of physical cluster according to the information that the request carries;
According to judging result using Virtual Cluster or the control strategy of physical cluster.
On the other hand, the embodiment of the present application provides a kind of controller, comprising:
Receiving module, for receiving arp request;
Judgment module, the information for being carried according to the request judge that the request is request or the physics of Virtual Cluster
The request of cluster;
Control module, for using the control strategy of Virtual Cluster or physical cluster according to judging result.
In addition, the embodiment of the present application also provides a kind of cloud computing system, including above controller.
It has the beneficial effect that:
In embodiments of the present invention, controller receives arp request;The information judgement carried according to the request
The request is the request of Virtual Cluster or the request of physical cluster;And according to judging result using Virtual Cluster or physical cluster
Control strategy.By the operation of controller, the removing of virtual platform and physical cluster is realized, so that the system of entire cloud platform
Operation does not interfere with the operation of physical cluster, will not make true physical machine or control because of the query-attack of virtual platform
Device processed is under attack.
Detailed description of the invention
The specific embodiment of the application is described below with reference to accompanying drawings, in which:
Fig. 1 shows the flow diagram of the cloud platform security processing in the embodiment of the present application;
Fig. 2 shows the flow diagrams of the cloud platform security processing of embodiment one in the embodiment of the present application;
Fig. 3 shows the message format schematic diagram of ARP protocol;
Fig. 4 shows the flow diagram of the cloud platform security processing of embodiment two in the embodiment of the present application;
Fig. 5 shows the structural schematic diagram of controller in the embodiment of the present application.
Specific embodiment
In order to which technical solution and the advantage of the application is more clearly understood, below in conjunction with attached drawing to the exemplary of the application
Embodiment is described in more detail, it is clear that and described embodiment is only a part of the embodiment of the application, rather than
The exhaustion of all embodiments.And in the absence of conflict, the feature in the embodiment and embodiment in this specification can be with
It is combined with each other.
Inventor is during invention note that existing cloud platform Host Security scheme, uses dedicated security service
Device, dedicated secure virtual machine external member, dedicated secure operating system, dedicated safety container external member and special bursting tube
Platform, the big component part of five in this way form the cloud platform of a safety.And existing cloud platform host is used to pacify
Full scheme has that dependence is high, complexity is high.Inventor wishes that the technology increased income completely is used to carry out cloud computing platform
Build.
Fig. 1 shows the cloud platform security processing in the embodiment of the present application, as shown in the figure, comprising:
Step 101, controller receives ARP (Address Resolution Protocol, address resolution protocol) request;
Step 102, judge that the ARP request is request or the physics collection of Virtual Cluster according to the information that the ARP request carries
The request of group;
Step 103, according to judging result using Virtual Cluster or the control strategy of physical cluster.
Further, control implement body how according to the ARP request carry information judge that the ARP request is Virtual Cluster
Request or physical cluster request, mode one and mode two can be divided into.
In mode one, controller monitors the request received;
The above-mentioned information carried according to the ARP request judges that the ARP request is request or the physical cluster of Virtual Cluster
Request are as follows: judge that the ARP request is request or the physics collection of Virtual Cluster according to the information of sender entrained by the ARP request
The request of group.
It can store the network interface information of each dummy node in Virtual Cluster to be judged, in controller;
Judge that the ARP request is the request of Virtual Cluster or the request of physical cluster according to the information that the ARP request carries
Are as follows: judge that the information of the sender whether there is in controller local, if so, it is judged as the request of Virtual Cluster, otherwise, judgement
For the request of physical cluster.
In specific implementation, it is not limited to store the network interface information of each dummy node in Virtual Cluster in the controller, such as
Also it can store the relevant information of each node in whole physical clusters.
The information of the sender may include sender's hardware address and/or sender's IP address.
In mode two, controller is not monitored the request received, but virtual collection monitors the virtual net of itself
Mouthful, the default mark is stamped in the request that each is issued.The above-mentioned information carried according to the ARP request judges that the ARP is asked
The request of Seeking Truth Virtual Cluster or the request of physical cluster are as follows: with the presence or absence of pre- bidding in the information carried according to the ARP request
Knowledge judges that the ARP request is the request of Virtual Cluster or the request of physical cluster.It specifically, there are the default mark is empty
The request of quasi- cluster, is otherwise the request of physical cluster.
For the ease of the implementation of the application, it is illustrated below with embodiment.
Embodiment one:
In embodiment one, building for cloud computing platform is carried out using the technology increased income completely.
The management platform of virtual machine: CloudStack management software
Server: SDN (Software Defined Network, software defined network) server
Director demon: Flowlight
Control node: high-performance computer
Storage cluster: storage cluster
SDN cloud platform is divided into three layers, and first layer is application layer (i.e. client), and the second layer is control layer (i.e. controller
Software), third layer is server layer (i.e. SDN server cluster).In this simple cloud platform, user from external API into
Enter after virtual desktop if carrying out aggressive operation, this will affect the information security of entire platform.
How data safety and Host Security are realized in this set system?
The safety of data still leans on data separating, and data are carried out separate storage, are placed on an individual storage cluster,
User carries out safe digital certificate will being called to authenticate when data acquisition.The data of user we will do it separate storage
Only it can just be called by way of safety when in use.
Host lean on safely be cluster virtual machine and physical machine cluster removing so that the system operation of entire cloud platform
The operation of physical cluster is not interfered with, it in this way would not be because of the attack of virtual platform when doing the experiment of cloud security platform
Request is so that true physical machine or controller are under attack.
And when realizing that these are safe, the removing of virtual platform and physical cluster is a ring of most critical, how real
Now remove?
Due to we be using SDN server, so the request of either Virtual Cluster or asking for physical cluster
It asks, can all carry out sending on primary controller, just will form the routing table of a SDN mode in this way.By controlling this routing
We can carry out separating treatment to Virtual Cluster and physical cluster with table, and still, problem is come, and how to carry out cluster information
Distinguish?
How the differentiation of cluster information is carried out, we would have to study breath of above delivering letters, in the information above sent,
There are some positions can not to be the cover of practical significance in the head of ARP packet, so we can be made an issue of with this, is sent upper
We some special discrimination strings are added in information.How these special discrimination strings are added again at problem, this is dependent on me
Controller, our controller be using the flowlight of open source realize that we just need inside plus one
A monitoring unit, and this monitoring unit will be set as highest level monitoring, while we will add node where controller
One database carries out the network interface information for storing our all dummy nodes.It delivers letters on each and is detected in breath, such as
There is database with us in the former IP address of breath of delivering letters on fruit and former MAC Address (i.e. the IP address and hardware address of sender)
In, mean that breath of delivering letters on this is breath of delivering letters on Virtual Cluster.In this way we can be realized as Virtual Cluster and
The single control of physical cluster on a control level.
As shown in Fig. 2, the implementation process of embodiment one is as follows:
Step 201, controller receives ARP request;
Step 202, the IP address and hardware address of the sender of ARP request carrying are obtained;
The message format of ARP is as shown in figure 3, sender's IP address and sender's hardware address can be obtained therefrom.
Step 203, it is each virtual in local virtual cluster to judge whether the IP address of the sender and hardware address are stored in
In the network interface information database of node, if so, judging that the ARP request is the request of Virtual Cluster, step 204 is carried out, otherwise,
Judge that the ARP request is the request of physical cluster, carries out step 205;
Step 204, using Virtual Cluster control strategy;
Step 205, using the control strategy of physical cluster.
Embodiment two:
In example 2, controller is not monitored the request received, but virtual collection monitors the virtual of itself
Network interface stamps the default mark in the request that each is issued.Specifically, it can use ARP request message packet header most
8 covers preset mark to carry this afterwards.
The implementation process of embodiment two is as follows:
Step 401, controller receives ARP request;
Step 402, judge whether the ARP request carries default mark, if so, carrying out step 403, otherwise carry out step
404;
Step 403, using Virtual Cluster control strategy;
Step 404, using the control strategy of physical cluster.
Based on the same inventive concept, a kind of controller and cloud computing system are additionally provided in the embodiment of the present application, due to this
The principle that a little equipment, system solve the problems, such as is similar to a kind of cloud platform security processing, therefore the implementation of these equipment can be with
Referring to the implementation of method, overlaps will not be repeated.
As shown in figure 5, the controller of the embodiment of the present application, comprising:
Receiving module, for receiving ARP request;
Judgment module, the information for being carried according to the ARP request judge that the ARP request is request or the object of Virtual Cluster
Manage the request of cluster;
Control module, for using the control strategy of Virtual Cluster or physical cluster according to judging result.
The controller may include monitoring module, for monitoring the request received;
When having monitoring module, the information of controller sender according to entrained by the ARP request judges the request
It is the request of Virtual Cluster or the request of physical cluster.
To judge the ARP request, controller can also include memory module, for storing each void in Virtual Cluster
The network interface information of quasi- node;
The above-mentioned information carried according to the ARP request judges that the ARP request is request or the physical cluster of Virtual Cluster
Request are as follows: it is local in the controller to judge that the information of the sender whether there is, if so, being judged as asking for Virtual Cluster
It asks, otherwise, is judged as the request of physical cluster.
Wherein the information of sender includes sender's hardware address and/or sender's IP address.
Controller, which can also not have, monitors module, but virtual collection monitors the virtual network port of itself, in each sending
Request in stamp default mark, the above-mentioned information carried according to the ARP request judges that the ARP request is the request of Virtual Cluster
Or the request of physical cluster are as follows: judge that the ARP request is empty with the presence or absence of default mark in the information carried according to the ARP request
The request of quasi- cluster or the request of physical cluster.
The embodiment of the invention also includes a kind of cloud computing systems, including above controller.
In addition, the cloud computing system further includes virtually collecting, which monitors the virtual network port of itself, in each sending
Request in stamp default mark.
The invention proposes virtual, physics, store the thought that three parts are independently removed.After the present invention, it is directed to big
Learn the network analog safety experiment platform of exploitation, it will be able to which ensure its safety is various hacker's network attacks behaviour using this platform
As while do not interfere with our physical cluster.
After this technology, so that it may guarantee our recovery capabilities to data to greatest extent, because we
Separate storage when data.It ensure that the safe and reliable storage of data under certain limit simultaneously.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Although the preferred embodiment of the application has been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the application range.
Claims (11)
1. a kind of cloud platform security processing characterized by comprising
Controller receives arp request;
Judge that the request is the request of Virtual Cluster or the request of physical cluster according to the information that the request carries;
According to judging result using Virtual Cluster or the control strategy of physical cluster;
The controller monitors the request received;
The information carried according to the request judges that the request is the request of Virtual Cluster or the request of physical cluster are as follows:
Judge that the request is the request of Virtual Cluster or the request of physical cluster according to the information of sender entrained by the request.
2. the method as described in claim 1, which is characterized in that the net of each dummy node in the controller storage Virtual Cluster
Message breath;
The information of the sender according to entrained by the request judges that the request is request or the physics collection of Virtual Cluster
The request of group are as follows: it is local in the controller to judge that the information of the sender whether there is, if so, being judged as Virtual Cluster
Request, otherwise, is judged as the request of physical cluster.
3. method according to claim 2, which is characterized in that the information of the sender include sender's hardware address and/
Or sender's IP address.
4. the method as described in claim 1, which is characterized in that the information carried according to the request judges the request
It is the request of Virtual Cluster or the request of physical cluster are as follows: sentence in the information carried according to the request with the presence or absence of default mark
The request of breaking is the request of Virtual Cluster or the request of physical cluster.
5. method as claimed in claim 4, which is characterized in that virtual collection monitors the virtual network port of itself, in each sending
Request in stamp the default mark.
6. a kind of controller characterized by comprising
Receiving module, for receiving arp request;
Judgment module, the information for being carried according to the request judge that the request is request or the physical cluster of Virtual Cluster
Request;
Control module, for using the control strategy of Virtual Cluster or physical cluster according to judging result;
Module is monitored, for monitoring the request received;
The information carried according to the request judges that the request is the request of Virtual Cluster or the request of physical cluster are as follows:
Judge that the request is the request of Virtual Cluster or the request of physical cluster according to the information of sender entrained by the request.
7. controller as claimed in claim 6, which is characterized in that including memory module, for storing each void in Virtual Cluster
The network interface information of quasi- node;
The information of the sender according to entrained by the request judges that the request is request or the physics collection of Virtual Cluster
The request of group are as follows: it is local in the controller to judge that the information of the sender whether there is, if so, being judged as Virtual Cluster
Request, otherwise, is judged as the request of physical cluster.
8. any controller as claimed in claims 6 or 7, which is characterized in that the information of the sender includes that sender is hard
Part address and/or sender's IP address.
9. controller as claimed in claim 6, which is characterized in that asked described in the information judgement carried according to the request
The request of Seeking Truth Virtual Cluster or the request of physical cluster are as follows: with the presence or absence of default mark in the information carried according to the request
Judge that the request is the request of Virtual Cluster or the request of physical cluster.
10. a kind of cloud computing system, which is characterized in that including any controller in such as claim 6-9.
11. cloud computing system as claimed in claim 10, which is characterized in that including virtually collecting, the virtual collection monitors itself
Virtual network port, each issue request in stamp default mark.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510849738.XA CN105376345B (en) | 2015-11-27 | 2015-11-27 | A kind of cloud platform security processing, controller and cloud computing system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510849738.XA CN105376345B (en) | 2015-11-27 | 2015-11-27 | A kind of cloud platform security processing, controller and cloud computing system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105376345A CN105376345A (en) | 2016-03-02 |
CN105376345B true CN105376345B (en) | 2019-01-25 |
Family
ID=55378139
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510849738.XA Active CN105376345B (en) | 2015-11-27 | 2015-11-27 | A kind of cloud platform security processing, controller and cloud computing system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105376345B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106130776A (en) * | 2016-07-14 | 2016-11-16 | 深圳市永达电子信息股份有限公司 | A kind of method utilizing SDN technology to carry out virtual machine and physical server mixing management and control based on CloudStack cloud platform |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101924707A (en) * | 2010-09-27 | 2010-12-22 | 杭州华三通信技术有限公司 | Method and equipment for processing message of address resolution protocol (ARP) |
CN102255903A (en) * | 2011-07-07 | 2011-11-23 | 广州杰赛科技股份有限公司 | Safety isolation method for virtual network and physical network of cloud computing |
CN102571698A (en) * | 2010-12-17 | 2012-07-11 | 中国移动通信集团公司 | Access authority control method, system and device for virtual machine |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050050179A1 (en) * | 2003-08-28 | 2005-03-03 | International Business Machines Corporation | Method, apparatus and computer program product for implementing enhanced proxy ARP for virtual IP addresses |
-
2015
- 2015-11-27 CN CN201510849738.XA patent/CN105376345B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101924707A (en) * | 2010-09-27 | 2010-12-22 | 杭州华三通信技术有限公司 | Method and equipment for processing message of address resolution protocol (ARP) |
CN102571698A (en) * | 2010-12-17 | 2012-07-11 | 中国移动通信集团公司 | Access authority control method, system and device for virtual machine |
CN102255903A (en) * | 2011-07-07 | 2011-11-23 | 广州杰赛科技股份有限公司 | Safety isolation method for virtual network and physical network of cloud computing |
Also Published As
Publication number | Publication date |
---|---|
CN105376345A (en) | 2016-03-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6952849B2 (en) | Session security partition and application profiler | |
US9661013B2 (en) | Manipulating API requests to indicate source computer application trustworthiness | |
KR101811758B1 (en) | Methods and apparatus to securely share data | |
US10880306B2 (en) | Verification information update | |
CN104601568B (en) | Virtualization security isolation method and device | |
CN108092984B (en) | Authorization method, device and equipment for application client | |
US20150350249A1 (en) | Determining trustworthiness of api requests based on source computer applications' responses to attack messages | |
CN108156175A (en) | To the access method of shared storage information under cloud computing platform | |
US9864853B2 (en) | Enhanced security mechanism for authentication of users of a system | |
JP6392985B2 (en) | Detection system, detection device, detection method, and detection program | |
CN105376345B (en) | A kind of cloud platform security processing, controller and cloud computing system | |
CN110536118A (en) | A kind of data capture method, device and computer storage medium | |
CN111585813B (en) | Management method and system of network nodes in Internet of things environment | |
CN106130968B (en) | A kind of identity identifying method and system | |
EP3718284B1 (en) | Extending encrypted traffic analytics with traffic flow data | |
JP6674443B2 (en) | Method and apparatus for using exhaustible network resources | |
CN109525553B (en) | Transmission protection method, intermediate device, server and system for URL (Uniform resource locator) request | |
CN108600149A (en) | Cloud computing high availability cluster method for managing resource | |
Barati et al. | Intrusion detection system in secure shell traffic in cloud environment | |
CN109218773B (en) | Authentication method and device for video stream address | |
JP2015103090A (en) | Authentication system, authentication device, authentication method and authentication program | |
CN111586044B (en) | Network data protection method aiming at privacy leakage and corresponding firewall | |
CN108833449A (en) | Web communication encrypted transmission method, apparatus and system based on RAS algorithm | |
Murugesan et al. | Ensuring User Security and Data Integrity in Multi-Cloud | |
CN108270865A (en) | The job scheduling method of high-performance cloud computing platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220729 Address after: 100089 building 36, courtyard 8, Dongbeiwang West Road, Haidian District, Beijing Patentee after: Dawning Information Industry (Beijing) Co.,Ltd. Patentee after: DAWNING INFORMATION INDUSTRY Co.,Ltd. Address before: 100193 building 36, Zhongguancun Software Park, 8 North East West Road, Haidian District, Beijing. Patentee before: Dawning Information Industry (Beijing) Co.,Ltd. |