CN107506640A - Virtual machine guard system - Google Patents

Virtual machine guard system Download PDF

Info

Publication number
CN107506640A
CN107506640A CN201710504090.1A CN201710504090A CN107506640A CN 107506640 A CN107506640 A CN 107506640A CN 201710504090 A CN201710504090 A CN 201710504090A CN 107506640 A CN107506640 A CN 107506640A
Authority
CN
China
Prior art keywords
virtual machine
cloud
protection
security
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710504090.1A
Other languages
Chinese (zh)
Inventor
林明贵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yitai Science & Technology Co Ltd Qingdao
Original Assignee
Yitai Science & Technology Co Ltd Qingdao
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yitai Science & Technology Co Ltd Qingdao filed Critical Yitai Science & Technology Co Ltd Qingdao
Priority to CN201710504090.1A priority Critical patent/CN107506640A/en
Publication of CN107506640A publication Critical patent/CN107506640A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Abstract

Virtual machine guard system, it is related to a kind of improvement of dummy machine system, and in particular to a kind of improvement of virtual machine guard system.For publicly-owned/privately owned cloud environments of VMWare and the all-around service device security platform of Amazon cloud platforms, its function includes Malware protection, Web prestige monitoring service, fire wall, Intrusion prevention, integrality monitoring and daily record inspection audit etc.;It form transparent monitoring virtual unit of the use based on VMWare vShield Endpoint by transparent monitoring virtual unit, security client (in physical machine dispose), administrative center and cloud security service network, and the design of no agency substantially reduces overhead.The present invention is full-featured:Including antivirus protection, transparent protection (no proxy access) and safe cloud service (web prestige) function;Transparent protection, advanced technology;Hot patch technology.

Description

Virtual machine guard system
Technical field
The present invention relates to a kind of improvement of dummy machine system, and in particular to a kind of improvement of virtual machine guard system.
Background technology
Virtual machine technique is one kind of virtualization technology, and things is exactly transformed into by so-called virtualization technology from a kind of form Another form, the most frequently used virtualization technology have a virtualization of internal memory in operating system, and user needs interior during actual motion The memory size of physical machine may be far longer than by depositing space, using the virtualization technology of internal memory, user can will a part it is hard Disk virtually turns to internal memory, and this is transparent to user.And for example, virtual private network technology (VPN) can be utilized in public network One safety of middle virtualization, stable " tunnel ", user's perceptual image are the same using private network.
But the security threat of virtual machine is also more and more beyond the clouds at present, such as safeguard structure defect, virtual boundary prestige The side of body, virtual boundary threat, virtual boundary threat, resource abuse, resource abuse, safeguard structure defect, side channel are threatened, maliciously used Family etc..Particularly safeguard structure defect and the new malicious attack of virtual boundary and permeability behavior are increasingly common.
The content of the invention
In view of the defects and deficiencies of the prior art, the present invention intends to provide a kind of virtual machine guard system, its work( Can be comprehensively, it is possible to achieve antivirus protection is transparent to protect, without proxy access and secure cloud service function;Transparent protection:With saving Overhead, the advantages that advanced technology.
To achieve the above object, the present invention is using following technical scheme:For publicly-owned/privately owned cloud environments of VMWare and The all-around service device security platform of Amazon cloud platforms, its function include Malware protection, Web prestige monitoring service, prevented Wall with flues, Intrusion prevention, integrality monitoring and daily record inspection audit etc.;Cloud provider can be allowed with suitable safety cost, efficiently Ground structure meets the cloud platform of compliance requirement corresponding to PCI DSS2.0, HIPAA, NIST and SAS 70;It is by transparent monitoring Virtual unit, security client (being disposed in physical machine), administrative center and the composition use of cloud security service network are based on VMWare vShield Endpoint transparent monitoring virtual unit, VM private communication channels can be detected, virtual machine jumps and right The new example of virtual machine is created and protected;Compared with needing to configure the Symantec/McAfee products of client in virtual machine, Design without agency substantially reduces overhead.
Described Symantec carries out the protection of cloud security using a series of sub- products, wherein main Protection Product is " critical system protection solution " and " data center's security bundle ".Critical system securing software by provide HIDS and HIPS, protect the safety of VMWare vSphere main frames, there is provided monitoring and centralized management to file, network.Data center Security bundle (Server Plus) is made up of the terminal security module in the transparent monitoring module and virtual machine on main frame, can The functions such as transparent monitoring, offline leak repairing are provided for virtual machine.
The present invention is full-featured:Including antivirus protection, transparent protection (no proxy access) and safe cloud service (web prestige) Function;Transparent protection:Save overhead, advanced technology;Hot patch technology:The operating virtual machine kernels of patch, do not shut down In the case of new leak (1day protection) known to protection;Dormancy patching technology:Virtual machine patch installing to dormancy, solves protection Clearance issues.
Embodiment
Present embodiment use technical scheme be:Put down for publicly-owned/privately owned cloud environments of VMWare and Amazon clouds The all-around service device security platform of platform, its function include Malware protection, Web prestige monitoring service, fire wall, invasion resistance Only, integrality monitoring and daily record inspection audit etc.;Cloud provider can be allowed efficiently to build and meet with suitable safety cost The cloud platform of compliance requirement corresponding to PCI DSS2.0, HIPAA, NIST and SAS 70;It is by transparent monitoring virtual unit, peace Full client (being disposed in physical machine), administrative center and cloud security service network composition use and are based on VMWare vShield Endpoint transparent monitoring virtual unit, VM private communication channels, virtual machine jump and the new example to virtual machine can be detected and created Build and protected;With needed in virtual machine configure client Symantec/McAfee products compared with, the design of no agency make be System expense substantially reduces.
Described Symantec carries out the protection of cloud security using a series of sub- products, wherein main Protection Product is " critical system protection solution " and " data center's security bundle ".Critical system securing software by provide HIDS and HIPS, protect the safety of VMWare vSphere main frames, there is provided monitoring and centralized management to file, network.Data center Security bundle (Server Plus) is made up of the terminal security module in the transparent monitoring module and virtual machine on main frame, can The functions such as transparent monitoring, offline leak repairing are provided for virtual machine.
VMWare in present embodiment;Configuration manager vCenter Configuration Manager;Network is pacified Full vEdge Security (VXLAN);Terminal security provides vShield Endpoint and gives cooperation manufacturer.Demand of Nation:Realize Freely efficiently circulation that is information-based, ensureing information, improves social production rate using information technology, promotes social harmony;Cloud computing Be information industry at present fastest-rising developing direction, it is necessary to occupy commanding elevation and state in terms of cloud computing using advanced technology Border market, create new economic development chance;Ensure that the CIA greens of information with sovereign right calculate, intelligence computation.Application demand:IT industry Application to cloud computing;Virtualized using PaaS, container, quick development of new applications and provide service;(case:36kr, treat Look into);Using IaaS, the application of rapid deployment oneself, elasticity setting computing resource dosage, is changed into enjoyment from traditional machine room on demand Data center's uniform server safeguards service;(case:The application case of Ali's cloud, cloud game service device);Using SaaS, carry out The shared and analysis mash up of resource, data, reconstruct new cloud service (case:The data of ifttt, microblogging and Taobao are handed over Change).
Demand of these applications of IT industry to cloud service:The automation of configuration, it is flexibly flexible and transportable:Increase deployment effect Rate, change the stable cloud service of can deployment (adjusting system is pretty troublesome) less or not as far as possible:Not delay machine and loss data For the performance monitoring and audit of cloud:Can be that Cloud Server rents third-party performance monitoring and Analysis Service.(case: CloudPhysics) safe compliance:Close rule==and trust==safety.(case:aws).
Non- IT industry:Medical industry:Cloud storage (medical imaging), cloud OA (electronic health record, write a prescription), knowledge base (analysis);Political affairs Business cloud:Cloud OA (Government Process), data sharing (public security cloud);Industry is sold soon:Desktop virtualization (easy to maintain, uniform service).
To the demand of cloud service:Can from it is existing configuration smooth migration to cloud, (configuration of network, the compatibility of system, is moved Move);Maintenance becomes simple rather than complexity (centralization);Business fluency (virtual network network speed, virtual engine efficiency);Data confidentiality Property (C);Data analysis (big data).
The growth requirement of the industry:Technology high density virtual machine, lightweight system (improve efficiency, cost-effective);Energy-conservation Environmentally friendly (power saving)
Change can deployment less or not as far as possible.Industry:Standardization:Compliance, standardized operation and management band letter Appoint;Sectionalization:Development is directed to the service of cloud service, such as monitoring, management, safety;Expanded:Extension virtualization, pair of softening As, such as NFV (telecommunication bureau's virtualization), SDN (software defined network).
Low energy consumption data center design problem --- energy-conserving and environment-protective;
Lightweight virtual machine designs --- efficiency is improved, limitation function ensures safety;
Virtualization hardware designs --- and efficiency is improved, establishes compatible PC frameworks, is adapted to the framework of an empty more and more void one. (utilizing PC frameworks, realize conventional large scale computer, the function structure of medium-sized machine);
Safety standard is formulated and compliance --- and safety code is defined with specification, safety rule are realized using the technology of correlation Model;
Realize the potentially attack to virtual machine architecture, and to the protection of this attack-- because virtualization attack does not have There is the actual example for causing serious consequence, so being all not concerned with.Realize that this attack can just provide better protection against.
The encryption of data shares and cryptogram computation --- SaaS shared datas.
Present embodiment is full-featured:Including antivirus protection, transparent protection (no proxy access) and safe cloud service (web prestige) function;Transparent protection:Save overhead, advanced technology;Hot patch technology:In the operating virtual machines of patch Core, it is non-stop-machine in the case of new leak (1day protection) known to protection;Dormancy patching technology:Benefit is beaten to the virtual machine of dormancy Fourth, solve protection clearance issues.
It is described above, it is merely illustrative of the technical solution of the present invention and unrestricted, those of ordinary skill in the art are to this hair The other modifications or equivalent substitution that bright technical scheme is made, without departing from the spirit and scope of technical solution of the present invention, It all should cover among scope of the presently claimed invention.

Claims (2)

1. virtual machine guard system, it is characterised in that:For publicly-owned/privately owned cloud environments of VMWare and the full side of Amazon cloud platforms Position server security platform;It is by transparent monitoring virtual unit, security client (in physical machine dispose), administrative center and cloud Secure service network composition uses the transparent monitoring virtual unit based on VMWare vShield Endpoint, can detect VM Private communication channel, virtual machine jump and the new example to virtual machine are created and protected;With needing to configure client in virtual machine Symantec/McAfee products are compared, and the design of no agency substantially reduces overhead.
2. virtual machine guard system according to claim 1, it is characterised in that:Described Symantec uses a series of sons Product carries out the protection of cloud security, and critical system securing software is by providing HIDS and HIPS, protection VMWare vSphere The safety of main frame, there is provided monitoring and centralized management to file, network;Data center's security bundle (Server Plus) by In transparent monitoring module and virtual machine on main frame terminal security module composition, can be provided for virtual machine it is transparent monitor, from The functions such as line leak repairing.
CN201710504090.1A 2017-06-28 2017-06-28 Virtual machine guard system Pending CN107506640A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710504090.1A CN107506640A (en) 2017-06-28 2017-06-28 Virtual machine guard system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710504090.1A CN107506640A (en) 2017-06-28 2017-06-28 Virtual machine guard system

Publications (1)

Publication Number Publication Date
CN107506640A true CN107506640A (en) 2017-12-22

Family

ID=60679342

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710504090.1A Pending CN107506640A (en) 2017-06-28 2017-06-28 Virtual machine guard system

Country Status (1)

Country Link
CN (1) CN107506640A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102523215A (en) * 2011-12-15 2012-06-27 北京海云捷迅科技有限公司 Virtual machine (VM) online antivirus system based on KVM virtualization platform
CN103067380A (en) * 2012-12-26 2013-04-24 北京启明星辰信息技术股份有限公司 Deployment configuration method and system of virtual safety device
CN103973676A (en) * 2014-04-21 2014-08-06 蓝盾信息安全技术股份有限公司 Cloud computing safety protection system and method based on SDN

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102523215A (en) * 2011-12-15 2012-06-27 北京海云捷迅科技有限公司 Virtual machine (VM) online antivirus system based on KVM virtualization platform
CN103067380A (en) * 2012-12-26 2013-04-24 北京启明星辰信息技术股份有限公司 Deployment configuration method and system of virtual safety device
CN103973676A (en) * 2014-04-21 2014-08-06 蓝盾信息安全技术股份有限公司 Cloud computing safety protection system and method based on SDN

Similar Documents

Publication Publication Date Title
US11531757B2 (en) Ransomware detection and mitigation
Zhang et al. Cloudvisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
Pék et al. A survey of security issues in hardware virtualization
US8938782B2 (en) Systems and methods for providing network access control in virtual environments
US11265291B2 (en) Malicious packet filtering by a hypervisor
Anwar et al. Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey
KR20180129830A (en) System and method for decrypting network traffic in a virtualized environment
CN103002445A (en) Safe mobile electronic equipment for providing application services
JP6580138B2 (en) Processor, method and computer program for supporting secure objects
US11755753B2 (en) Mechanism to enable secure memory sharing between enclaves and I/O adapters
US11343082B2 (en) Resource sharing for trusted execution environments
US11876815B2 (en) Device anomaly detection
CN109587106A (en) Cross-domain safety in the cloud of password subregion
Yao et al. CryptVMI: A flexible and encrypted virtual machine introspection system in the cloud
US10169584B1 (en) Systems and methods for identifying non-malicious files on computing devices within organizations
CN104639313B (en) A kind of detection method of cryptographic algorithm
US20230236870A1 (en) Safe entropy source for encrypted virtual machines
US10025617B2 (en) Steganographic message passing between a virtual machine and a hypervisor
CN107506640A (en) Virtual machine guard system
Medeiros et al. Multi-tenant isolation of what? building a secure tenant isolation architecture for cloud networks
US9912787B2 (en) Zero-copy multiplexing using copy-on-write
Kanoongo et al. Exposition of solutions to hypervisor vulnerabilities
Kumar et al. Virtualization Backbone of Cloud Computing-Analysis
Londhe et al. Imperial Analysis of Threats and Vulnerabilities in Cloud Computing.
Adla Comparing performance of HyperV and VMware considering network isolation in virtual machines

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171222