CN109981355A - Security defend method and system, computer readable storage medium for cloud environment - Google Patents

Security defend method and system, computer readable storage medium for cloud environment Download PDF

Info

Publication number
CN109981355A
CN109981355A CN201910182074.4A CN201910182074A CN109981355A CN 109981355 A CN109981355 A CN 109981355A CN 201910182074 A CN201910182074 A CN 201910182074A CN 109981355 A CN109981355 A CN 109981355A
Authority
CN
China
Prior art keywords
network element
virtual
standby
secure network
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910182074.4A
Other languages
Chinese (zh)
Inventor
郭春梅
胡毅勋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING LEADSEC TECHNOLOGY CO LTD
Venustech Group Inc
Original Assignee
BEIJING LEADSEC TECHNOLOGY CO LTD
Venustech Group Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING LEADSEC TECHNOLOGY CO LTD, Venustech Group Inc filed Critical BEIJING LEADSEC TECHNOLOGY CO LTD
Priority to CN201910182074.4A priority Critical patent/CN109981355A/en
Publication of CN109981355A publication Critical patent/CN109981355A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0663Performing the actions predefined by failover planning, e.g. switching to standby network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/22Alternate routing

Abstract

This application discloses a kind of security defend method and systems for cloud environment, computer readable storage medium, the system comprises the first virtual secure network element module, the first virtual interacting network element module and first detection modules, first virtual secure network element module includes one or more virtual secure network element groups, and virtual secure network element group includes active and standby two virtual secures network element;First virtual interacting network element module carries out flow forwarding in cloud platform and the first defence service interchain, and the first defence service chaining is to connect the Prevention-Security circuit of each virtual secure network element group in a designated order;First detection module detects whether each active and standby virtual secure network element can be used by the first detection service chain, and the first detection service chain is the available test loop for connecting first detection module and each virtual secure network element.The application realizes the serial defence capability of High Availabitity and the fault identification and recovery capability of automation, low delay by the way that active and standby two virtual secures network element is arranged and by detection service chain detection node failure.

Description

Security defend method and system, computer readable storage medium for cloud environment
Technical field
The present invention relates to computer security technical fields, and in particular to a kind of safety defense method for cloud environment and is System, computer readable storage medium.
Background technique
With the continuous development of networked information era, cloud computing is increasingly becoming the mainstream deployment side of all kinds of industries and business Formula, however traditional security problems can not only be amplified after cloud in business, it can also bring new security risk.Existing mainstream vendor Way be in such a way that side is hung by virtual secure network element deployment in external secure resources pond, and external money is drained in cloud Virtualization is realized in source pond.After flow introduces secure resources pond, serially product will be defendd to lead to by constructing software service chain It crosses certain sequence and carries out layout, form complete Prevention-Security function.
However, for serially defending product, other than security defense capability, most importantly High Availabitity ability, one A serial defence product without High Availabitity ability is after security node damage, for the flow all by protection node It can be blocked, to form network paralysis, consequence is extremely serious.
Main-standby nodes are arranged in the solution of some mainstream vendors, are cut manually when user perceives Network Abnormal It changes, this mode is based on the behavior of user's subjectivity to abnormal judgement, and by restoring manually, network recovery speed is very slow, effect Fruit is bad.There are also some manufacturers by judging that security node on-off electricity condition is judged, this mode can not judge seemingly-dead shape State (i.e. security node is powered, but internal without flow processing and forwarding, to block flow), monitoring effect is poor, once There is torpor in node, still may cause network paralysis.
Summary of the invention
The embodiment of the invention provides a kind of security defend method and systems for cloud environment, computer-readable storage medium Matter can automatically and accurately detect the state of each virtual secure network element, realize the high availability of network.
In order to reach the object of the invention, the technical solution of the embodiment of the present invention is achieved in that
The embodiment of the invention provides a kind of safety defense systems for cloud environment, including the first virtual secure network element mould Block, the first virtual interacting network element module and first detection module, in which:
The first virtual secure network element module includes one or more virtual secures for realizing Prevention-Security function Network element group, the virtual secure network element group include active and standby two virtual secure network elements;
The first virtual interacting network element module, for receiving the service traffics of cloud platform, and is forwarded to the first broigne Business chain entrance;The service traffics of the first defence service chaining outlet are received, and are forwarded to cloud platform, the first defence service chaining is According to the Prevention-Security circuit of specified one or more virtual secure network element groups that are linked in sequence;
First detection module, for detecting active and standby two in the virtual secure network element group by the first detection service chain Whether virtual secure network element can be used, and the first detection service chain is connection first detection module and the virtual secure network element Test loop can be used.
In one embodiment, when the main virtual secure network element in the virtual secure network element group is available, described the is accessed The virtual secure network element of one defence service chaining is the main virtual secure network element;
When the main virtual secure network element in the virtual secure network element group is unavailable but standby virtual secure network element is available, connect The virtual secure network element for entering the first defence service chaining is the standby virtual secure network element;
When the active and standby virtual secure network element in the virtual secure network element group is unavailable, the first defence service chaining Bypass passes through the virtual secure network element group.
In one embodiment, each virtual secure network element includes at least four virtual network ports: ingress for service, business go out Mouth, the first management mouth and HA mouthfuls of dual-computer redundancy, wherein the disengaging of ingress for service and business outlet for service traffics, the first pipe Reason mouth is for being managed the virtual secure network element, and HA mouthfuls for shape synchronous between active and standby two virtual secure network elements State information.
In one embodiment, the first virtual interacting network element module includes active and standby two virtual datas interaction network element, institute State active and standby two virtual datas interaction, one internet Protocol IP address of virtual group of network-element share.
In one embodiment, active and standby two virtual datas interaction whether available method of network element is detected, comprising:
Test bag is sent to active and standby two virtual datas interaction network element by first detection module and detects whether energy Enough receive the test bag that active and standby two virtual datas interaction network element returns;Alternatively,
By the way that respectively deployment is used to indicate itself whether online heart on active and standby two virtual datas interaction network element Jump submodule.
In one embodiment, each virtual data interaction network element includes at least four virtual network ports: functional area, serial Give out a contract for a project mouth, serial packet receiving mouth and the second management mouth, wherein functional area is for receiving the service traffics in cloud platform and be forwarded to string Capable mouth of giving out a contract for a project, the service traffics for receiving the serial packet receiving mouth transmission are simultaneously forwarded to cloud platform, and mouth of serially giving out a contract for a project is for receiving industry The service traffics of business mouth transmission and the entrance for being forwarded to the first defence service chaining, serial packet receiving mouth is for receiving described first It defends the service traffics of the outlet of service chaining and is forwarded to the functional area, the second management mouth is used for virtual data interaction Network element is managed.
In one embodiment, the virtual secure network element includes at least one of: firewall, intrusion prevention system IPS, Intruding detection system IDS, Virtual Private Network VPN, fort machine.
In one embodiment, the safety defense system further includes management module and network module, in which:
The management module, for by tenant and/or by the first virtual secure network element module described in service creation, described the One virtual interacting network element module, the first detection module;
The network module, for by tenant and/or by the first defence service chaining described in service creation and first inspection Survey service chaining.
The embodiment of the invention also provides a kind of safety defense systems for cloud environment, including the second virtual secure network element Module, the second virtual interacting network element module and the second detection module, in which:
The second virtual secure network element module includes one or more virtual secures for realizing Prevention-Security function Network element;
The second virtual interacting network element module, active and standby two virtual datas including sharing a virtual group IP address are handed over Mutual network element for receiving the service traffics of cloud platform, and is forwarded to the second defence service chaining entrance;Receive the second defence service chaining The service traffics of outlet, and it is forwarded to cloud platform, the second defence service chaining is one or more according to specified sequential connection The Prevention-Security circuit of the virtual secure network element;
Second detection module, for being by the second detection service chain detection active and standby two virtual datas interaction network element It is no available, the second detection service chain be connect the second detection module and active and standby two virtual datas interact network element can Use test loop.
In one embodiment, when the main virtual data interaction network element in active and standby two virtual datas interaction network element is available When, flow forwarding is carried out between cloud platform and the second defence service chaining by the main virtual data interaction network element;
When the main virtual data interaction network element in active and standby two virtual datas interaction network element is unavailable but counts for virtual According to interaction network element can with when, by the standby virtual data interaction network element between cloud platform and the second defence service chaining into The forwarding of row flow;
When the interactive network element of active and standby two virtual datas is unavailable, the service traffics of cloud platform institute is not forwarded to State the second defence service chaining entrance.
The embodiment of the invention also provides a kind of safety defense methods for cloud environment, comprising:
First virtual interacting network element module receives the service traffics of cloud platform, and is forwarded to the first defence service chaining entrance, The first defence service chaining is to return according to the specified Prevention-Security for being linked in sequence one or more virtual secure network element groups Road, the virtual secure network element group include active and standby two virtual secure network elements, are detected by the first detection service chain described virtual Whether active and standby two virtual secure network elements in safety net tuple can be used, and the first detection service chain is connection the first detection mould The available test loop of block and the virtual secure network element;
First virtual interacting network element module receives the service traffics of the first defence service chaining outlet, and is forwarded to cloud platform.
The embodiment of the invention also provides a kind of safety defense methods for cloud environment, comprising:
Second virtual interacting network element module receives the service traffics of cloud platform, and is forwarded to the second defence service chaining entrance, The second defence service chaining be according to the Prevention-Security circuit of specified one or more virtual secure network elements that are linked in sequence, The second virtual interacting network element module includes the active and standby two virtual datas interaction network element for sharing a virtual group IP address, is led to Cross whether the second detection service chain detection active and standby two virtual datas interaction network element can be used, the second detection service chain is Connect the available test loop of the second detection module and active and standby two virtual datas interaction network element;
Second virtual interacting network element module receives the service traffics of the second defence service chaining outlet, and is forwarded to cloud platform.
The embodiment of the invention also provides a kind of computer readable storage medium, deposited on the computer readable storage medium One or more program is contained, one or more of programs can be executed by one or more processor, to realize such as The step of safety defense method for cloud environment of any description above.
The embodiment of the invention also provides a kind of safety defense system for cloud environment, including processor and memory, The processor is for executing the program stored in the memory, to realize the peace for cloud environment such as any description above The step of full defence method.
The technical solution of the embodiment of the present invention, has the following beneficial effects:
Security defend method and system provided in an embodiment of the present invention for cloud environment, computer readable storage medium, By the way that active and standby two virtual secure network elements are arranged in each virtual secure network element group, and detection module and detection service are set Chain realizes the active-standby switch in virtual secure network element group, realizes the serial defence of High Availabitity when detecting node failure Ability and automation, the fault identification of low delay and failover capability, to ensure that customer service and network are normally transported Row;
Further, the application can not reduce other safety by active-standby switch and bypass pass-through mode in group Under the premise of function, ensureing the communication of user, (as soon as existing mode is usually to have a node to be broken on chain, the bypass of whole chain is logical It crosses, intact security capabilities can be lost in this way, reduce overall security).
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is a kind of structural schematic diagram of safety defense system for cloud environment of the embodiment of the present invention;
Fig. 2 is the structural schematic diagram that the another kind of the embodiment of the present invention is used for the safety defense system of cloud environment;
Fig. 3 is the structural schematic diagram of one kind the first virtual interacting network element module of the embodiment of the present invention;
Fig. 4 is a kind of flow diagram of safety defense method for cloud environment of the embodiment of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention Embodiment be described in detail.It should be noted that in the absence of conflict, in the embodiment and embodiment in the application Feature can mutual any combination.
As shown in Figure 1, a kind of safety defense system for cloud environment according to an embodiment of the present invention, including first virtual Security network element module 101, the first virtual interacting network element module 102 and first detection module 103, in which:
The first virtual secure network element module 101 includes one or more virtual peaces for realizing Prevention-Security function The whole network tuple, the virtual secure network element group include active and standby two virtual secure network elements;
The first virtual interacting network element module 102, for receiving the service traffics of cloud platform, and is forwarded to the first defence Service chaining entrance;The service traffics of the first defence service chaining outlet are received, and are forwarded to cloud platform, the first defence service chaining For according to the Prevention-Security circuit of specified one or more virtual secure network element groups that are linked in sequence;
First detection module 103, it is active and standby in the virtual secure network element group for being detected by the first detection service chain Whether two virtual secure network elements can be used, and the first detection service chain is connection first detection module 103 and the virtual peace The available test loop of the whole network member.
When using the safety defense system for cloud environment of the application, it is necessary first to according to tenant's demand configuration first Virtual secure network element module 101, the first virtual interacting network element module 102, first detection module 103, first defend service chaining and First detection service chain.The safety defense system passes through strategy by the service traffics in cloud platform by tenant and/or by business Routing mode leads to the first virtual interacting network element module 102 of tenant resource pool Nei, the first 102 turns of virtual interacting network element module The entrance that sending service flow defends service chaining to first;The service traffics of entrance are led to each void by the first defence service chaining step by step Quasi- safety net tuple, default Virtual safety net tuple realizes security function by main virtual secure network element, when first detection module 103 It was found that automatically switching to standby virtual secure network element after main virtual secure network element exception.
In one embodiment of this invention, the virtual secure network element includes but is not limited to: firewall, intrusion prevention system (Intrusion Prevention System, IPS), intruding detection system (Intrusion Detection System, IDS), Virtual Private Network (Virtual Private Network, VPN), fort machine.
In an example of the present embodiment, the firewall includes but is not limited to basic firewall, Web application guard system (Web Application Firewall, WAF), database firewall etc..
In one embodiment of this invention, as shown in Fig. 2, the first virtual interacting network element module 102 includes active and standby two A virtual data interaction network element, described active and standby two virtual datas interaction, one virtual group Internet protocol of network-element share The address (Internet Protocol, IP).
In an example of the present embodiment, Virtual Router Redundacy Protocol (Virtual Router can be passed through Redundancy Protocol, VRRP) height of active and standby two virtual datas interaction network element drag flow amount can described in protocol realization With.
It in this example, can respectively deployment be used to indicate itself and be on active and standby two virtual datas interaction network element No online heartbeat submodule, heartbeat submodule send heartbeat data packets periodically to judge active and standby two virtual datas interaction The availability of network element realizes virtual ip address by main virtual data interaction network element when both can be used, when standby virtual data is handed over When mutual network element does not receive the heartbeat data packets of main virtual data interaction network element within the specified period, standby virtual data interaction is enabled Network element realizes the node switching of automatic High Availabitity, guarantees that the first virtual interacting network element module 102 operates normally.
In another embodiment of the invention, active and standby two virtual datas interaction whether available side of network element is detected Method, it may also is that sending test bag to active and standby two virtual datas interaction network element by first detection module 103 and detecting Whether test bag that the active and standby two virtual data interaction network element return can be received.
In another embodiment of the invention, when the main virtual data in active and standby two virtual datas interaction network element is handed over When mutual network element can be used, flowed between cloud platform and the second defence service chaining by the main virtual data interaction network element Amount forwarding;
When the main virtual data interaction network element in active and standby two virtual datas interaction network element is unavailable but counts for virtual According to interaction network element can with when, by the standby virtual data interaction network element between cloud platform and the second defence service chaining into The forwarding of row flow;
When the interactive network element of active and standby two virtual datas is unavailable, the service traffics of cloud platform institute is not forwarded to State the second defence service chaining entrance.
The safety defense system for cloud environment of the application passes through active and standby two virtual datas interaction network-element share one Virtual group IP designs 1 layer of High Availabitity ability at drainage, eliminates Single Point of Faliure risk when drainage;Then by anti-first Virtual secure network element group is constructed at each node of imperial service chaining, active and standby two are arranged in each virtual secure network element group virtually Security network element is connected each virtual secure network element group by flow entry, realizes 2 layers of High Availabitity energy at the first defence service chaining Power.First detection module 103 is set simultaneously, by the first detection service chain by first detection module 103 and each virtual secure Network element connection, first detection module 103 send test bag and judge whether each virtual secure network element breaks down, and work as failure Shi Xiugai first defends the content of service chaining, realizes the switching of active and standby virtual secure network element, while detecting active and standby virtual interacting net The state of member, when main virtual interacting network element breaks down, modification the first defence service chaining return flow flow table realizes virtual hand over The active-standby switch of mutual network element, ensures business normal operation, the serial defence capability of High Availabitity is realized, to realize on the whole Automatic detection and automatic recovery capability, realize the fault recovery of low delay, and complete since drainage under aforementioned capabilities High Availabitity function of safety protection comprehensively whole in resource pool.
In one embodiment of this invention, each virtual data interaction network element includes at least four virtual network ports: industry Business mouth, mouth of serially giving out a contract for a project, serial packet receiving mouth and the second management mouth, wherein functional area is used to receive the service traffics in cloud platform And be forwarded to mouth of serially giving out a contract for a project, receive the service traffics of the serial packet receiving mouth transmission and be forwarded to cloud platform, mouth of serially giving out a contract for a project For receiving the service traffics of functional area transmission and being forwarded to the described first entrance for defending service chaining, serial packet receiving mouth is for connecing It receives the service traffics of the outlet of the first defence service chaining and is forwarded to the functional area, the second management mouth is used for the void Quasi- data interaction network element is managed.
The received tenant's flow in functional area is forwarded to mouth of serially giving out a contract for a project by the virtual data interaction network element, by serial packet receiving The received data traffic modification target MAC (Media Access Control) address of mouth, which drains opposite end MAC Address for strategy and is forwarded to functional area, to be exported, and industry is formed Business flow link.
For OpenvSwitch (a kind of open virtual switch standard), setting source IP address is 192.168.100.20 To purpose IP address be 192.168.30.50 or source IP is the stream that 192.168.30.50 is 192.168.100.20 to destination IP Amount, the first defence service chaining by virtual secure network element group, the mouth difference wherein active and standby virtual data interaction network element is serially given out a contract for a project It is 1,3, serial packet receiving mouth is respectively 2,4, and active and standby virtual secure net element business entrance is respectively 50,52, and business outlet is respectively 51,53, the flow entry added on the virtual switch being connected with the virtual secure network element group is as follows:
A) in_port=1, nw_src=192.168.100.20/32, nw_dst=192.168.30.50/32, Actions=group:666
B) in_port=1, nw_src=192.168.30.50/32, nw_dst=192.168.100.20/32, Actions=group:666
C) in_port=3, nw_src=192.168.100.20/32, nw_dst=192.168.30.50/32, Actions=group:666
D) in_port=3, nw_src=192.168.30.50/32, nw_dst=192.168.100.20/32, Actions=group:666
E) group_id=666, type=all, bucket=output:50
F) in_port=51, nw_src=192.168.100.20/32, nw_dst=192.168.30.50/32, Actions=group:688
G) in_port=51, nw_src=192.168.30.50/32, nw_dst=192.168.100.20/32, Actions=group:688
H) in_port=53, nw_src=192.168.100.20/32, nw_dst=192.168.30.50/32, Actions=group:688
I) in_port=53, nw_src=192.168.30.50/32, nw_dst=192.168.100.20/32, Actions=group:688
J) group_id=688, type=all, bucket=output:2
Wherein, it a) matches to e) flow entry from main or standby virtual interacting network element and issues source IP as 192.168.100.20 to mesh IP be 192.168.30.50 or source IP is the service traffics that 192.168.30.50 is 192.168.100.20 to destination IP, if Setting its ID is 666, and checks that ID is 666 group, and flow is forwarded to 50 mouthfuls in group 666, and 50 mouthfuls are virtual secure network element group In main virtual secure network element.F) matching to j) flow entry and issuing source from main or standby virtual secure network element is 192.168.100.20 To destination IP be 192.168.30.50 or source IP is the Business Stream that 192.168.30.50 is 192.168.100.20 to destination IP Amount, it is 688 that its ID, which is arranged, and checks that ID is 688 group, and flow is forwarded to main virtual interacting network element receiving port in group 688 In.
In one embodiment of this invention, the first detection module 103 includes at least three virtual network port: mouth of giving out a contract for a project is received Packet mouth and third manage mouth, when carrying out state-detection to each virtual secure network element, by mouth of giving out a contract for a project to each virtual secure Network element sends test bag, and by whether can receive whether the test bag issued judges corresponding virtual secure network element from packet receiving mouth It can use.Third management mouth is for being managed the first detection module 103 and carrying out heartbeat inspection to virtual interacting network element It surveys.
In one embodiment of this invention, as shown in figure 3, the first detection module 103 can be placed in the first virtual friendship In mutual network element module 102, the monitoring to virtual secure network element is realized by the first virtual interacting network element module 102.By by first Detection module 103 is placed among the first virtual interacting network element module 102, is reduced the resource consumption of system host, is realized The unified management of component improves system global controllability.
First detection service chain sends and receives test to specified virtual secure network element for first detection module 103 Packet, construct flow table with realize to first detection module 103 give out a contract for a project mouth sending test bag match, and according to test order will Test bag leads to the ingress for service of specified virtual secure network element, still carries out to the data packet of the business outlet of virtual secure network element Matching, leads to first detection module 103 for specified test bag, to form test bag in first detection module 103 and virtual Available test loop in security network element.
For adding the state of test bag detection virtual secure network element group in OpenvSwitch, the flow entry of addition It is as follows:
K) in_port=101, nw_src=1.0.0.1/32, nw_dst=1.0.0.2/32, actions=output: 50
L) in_port=101, nw_src=1.0.0.3/32, nw_dst=1.0.0.4/32, actions=output: 52
M) in_port=51, nw_src=1.0.0.1/32, nw_dst=1.0.0.2/32, actions=output: 102
N) in_port=53, nw_src=1.0.0.3/32, nw_dst=1.0.0.4/32, actions=output: 102
Wherein k), l) by the test bag issued by first detection module 103, (source IP is 1.0.0.1 destination IP to flow table respectively Be 1.0.0.3 destination IP for 1.0.0.2 and source IP it is 1.0.0.4) it is forwarded to main virtual secure network element and standby virtual secure network element, And flow table m), the test bag that n) then transfers active and standby virtual secure network element return to first detection module 103, the first detection mould Block 103 then by whether the test bag that can receive return judges whether tested virtual secure network element effective, it should be noted that , different virtual secure network elements may use different types of test bag, such as WAF to use HTTP packet.In this way Test bag detection mode can solve existing method can not judge virtual secure network element it is seemingly-dead (network element be powered starting but flow turn Hair failure) the problem of.
It should be noted that detecting the active and standby whether available side of two virtual secure network elements in the embodiment of the present invention Method, can also be by the way that respectively deployment is used to indicate itself whether online heartbeat on active and standby two virtual secure network elements The method of module is detected.But detected by the method for heartbeat detection, it cannot differentiate that seemingly-dead feelings occurs in egress Condition.It is detected by first detection module 103 and the first detection service chain, can accurately and effectively detect each virtual peace The state of the whole network member, to realize the high availability of network.
First defends the implementation of service chaining to configure flow table in the virtual switch that virtual secure network element is connected Rule realizes flow lead.Group is set by virtual secure network element group, and according to specified sequence by each virtual secure net Tuple is connected, the mode of connection to configure flow entry in the virtual switch that virtual secure network element is connected, flow entry Content be the data packet that exports business each in upper virtual secure network element group according to 5 tuples (source IP, source port, destination IP, Destination port, agreement) match cognization flow, the flow orientation that match cognization goes out is led to the business of next virtual secure network element group Entrance, under default situations, the ingress for service of next virtual secure network element group is the main virtual secure of next virtual secure network element group The ingress for service of network element.Wherein the inlet flow rate of first virtual secure network element group is from the first virtual interacting network element module 102 The flow of mouth sending of serially giving out a contract for a project match cognization and drain.
In one embodiment of this invention, when the main virtual secure network element in virtual secure network element group is available, access the The virtual secure network element of one defence service chaining is main virtual secure network element;
When the main virtual secure network element in virtual secure network element group is unavailable but standby virtual secure network element is available, access the The virtual secure network element of one defence service chaining is standby virtual secure network element;
When the active and standby virtual secure network element in virtual secure network element group is unavailable, the first defence service chaining bypass Pass through virtual secure network element group described in this.
Inlet flow rate is led to each virtual secure network element group by the first defence service chaining step by step, virtual under default situations Safety net tuple realizes Prevention-Security function by main virtual secure network element, when first detection module 103 finds main virtual secure net After first exception, virtual secure network element group Group flow table is modified, flow in the Group is led into standby virtual secure network element, thus real Existing High Availabitity function, Logistics networks normal communication.
Still by taking the first defence service chaining added in above-mentioned OpenvSwitch as an example, when main virtual secure network element is unavailable When, it is as follows to modify above-mentioned e) flow entry:
E) group_id=666, type=all, bucket=output:52
Former flow table e) is revised as above-mentioned flow table, service traffics are changed to the standby virtual secure network element for being 52 to entrance, it is real Existing active-standby switch.
When main virtual data interaction network element is unavailable, it is as follows to modify above-mentioned j) flow entry:
J) group_id=688, type=all, bucket=output:4
Former flow table j) is revised as above-mentioned flow table, virtual secure network element return flow is forwarded to standby virtual data interactive network Member realizes the active-standby switch of virtual data interaction network element.
In one embodiment of this invention, each virtual secure network element includes at least four virtual network ports: business enters Mouthful, business outlet, the first management mouth and HA mouthful of dual-computer redundancy, wherein ingress for service and business outlet be used for service traffics into Out, for the first management mouth for being managed to the virtual secure network element, HA mouthfuls are used for active and standby two virtual secure network elements Between Synchronization Status Message.
In one embodiment of this invention, the safety defense system further includes management module and network module, in which:
The management module, for by tenant and/or by the first virtual secure network element module 101, institute described in service creation State the first virtual interacting network element module 102, the first detection module 103;
The network module, for by tenant and/or by the first defence service chaining described in service creation and first inspection Survey service chaining.
In this embodiment, the safety defense system leads to by the service traffics in cloud platform by tenant and/or by business Cross the first virtual interacting network element module 102 that policybased routing mode leads to tenant resource pool Nei, the first virtual interacting network element mould Block 102 forwards the service traffics of the tenant to the entrance of the first defence service chaining.
In an example of the embodiment, the management module configuration strategy routing drainage, both ends address is respectively that cloud is flat The virtual group IP address of the docking IP address of platform and the first virtual interacting network element module 102;
The inlet flow rate of functional area is forwarded to by the first virtual interacting network element module 102 configuration flow table strategy serially gives out a contract for a project Mouthful, the flows modification target MAC (Media Access Control) address of serial packet receiving mouth for the corresponding MAC Address of docking IP address of cloud platform and is forwarded to The outlet of functional area.
In another embodiment of the invention, the management module is also used to manage each other modules in resource pool, including But it is not limited to communication interaction, order is issued and parsed, log recording etc..
In one embodiment of this invention, the network module is also used to tissue and building resource pool internal network intercommunication, Including but not limited to multimachine interaction, Network Isolation etc., and for creating, managing the first defence service chaining and the first detection service Chain, and automatically switch the content of the first defence service chaining according to testing result, to realize cutting automatically for active and standby virtual secure network element It changes.
The embodiment of the invention also provides a kind of safety defense systems for cloud environment, including the second virtual secure network element Module, the second virtual interacting network element module and the second detection module, in which:
The second virtual secure network element module includes one or more virtual secures for realizing Prevention-Security function Network element;
The second virtual interacting network element module, active and standby two virtual datas including sharing a virtual group IP address are handed over Mutual network element for receiving the service traffics of cloud platform, and is forwarded to the second defence service chaining entrance;Receive the second defence service chaining The service traffics of outlet, and it is forwarded to cloud platform, the second defence service chaining is one or more according to specified sequential connection The Prevention-Security circuit of the virtual secure network element;
Second detection module, for being by the second detection service chain detection active and standby two virtual datas interaction network element It is no available, the second detection service chain be connect the second detection module and active and standby two virtual datas interact network element can Use test loop.
When using the safety defense system for cloud environment of the application, it is necessary first to according to tenant's demand configuration second Virtual secure network element module, the second virtual interacting network element module, the second detection module, the second defence service chaining and the second detection clothes Business chain.The safety defense system is drawn by the service traffics in cloud platform by tenant and/or by business by policybased routing mode The second virtual interacting network element module of the tenant, the second virtual interacting network element module forwards service traffics to second in resource pool Defend the entrance of service chaining;The service traffics of entrance are led to each virtual secure network element by the second defence service chaining step by step, are defaulted Second virtual interacting network element module realizes service traffics forwarding capability by main virtual data interaction network element, when the second detection module is sent out Now after main virtual data interaction network element exception, standby virtual data interaction network element is automatically switched to.
In one embodiment of this invention, the interaction network element of active and standby two virtual datas described in VRRP protocol realization can be passed through Draw the High Availabitity of flow.
It should be noted that whether detect active and standby two virtual datas interaction network element in the embodiment of the present invention available Method, can also be by the way that respectively whether online for deployment if being used to indicate itself on active and standby two virtual datas interaction network element The method of heartbeat submodule is detected.But detected by the method for heartbeat detection, it is false cannot to differentiate that egress occurs Dead situation.It is detected by the second detection module and the second detection service chain, can accurately and effectively detect each void The state of quasi- virtual data interaction network element, to realize the high availability of network.The application is handed over by active and standby two virtual datas One virtual group IP of mutual network-element share, designs 1 layer of High Availabitity ability at drainage, eliminates Single Point of Faliure risk when drainage.
In another embodiment of the invention, when the main virtual data in active and standby two virtual datas interaction network element is handed over When mutual network element can be used, flowed between cloud platform and the second defence service chaining by the main virtual data interaction network element Amount forwarding;
When the main virtual data interaction network element in active and standby two virtual datas interaction network element is unavailable but counts for virtual According to interaction network element can with when, by the standby virtual data interaction network element between cloud platform and the second defence service chaining into The forwarding of row flow;
When the interactive network element of active and standby two virtual datas is unavailable, the service traffics of cloud platform institute is not forwarded to State the second defence service chaining entrance.
As shown in figure 4, including the following steps: the embodiment of the invention also provides a kind of safety defense method
Step 401: the first virtual interacting network element module receives the service traffics of cloud platform, and is forwarded to the first defence service Chain entrance, the first defence service chaining are the safety according to specified one or more virtual secure network element groups that are linked in sequence Circuit is defendd, the virtual secure network element group includes active and standby two virtual secure network elements, detects institute by the first detection service chain Whether the active and standby two virtual secure network elements stated in virtual secure network element group can be used, and the first detection service chain is connection first The available test loop of detection module and the virtual secure network element;
In one embodiment of this invention, before the step 401, the method also includes:
According to tenant's demand configure the first virtual interacting network element module, virtual secure network element group, first defence service chaining with And the first detection service chain.
Active and standby two virtual secure network elements are respectively configured in each virtual secure network element group, as shown in Figure 1, each virtual secure Network element includes at least 4 virtual network ports, including the outlet of ingress for service, business, the first management mouth, HA mouthfuls.Functional area is used for business The disengaging of flow, the first management mouth are used for management equipment, and HA mouthfuls are used for synchronous safety network element state information.
Optionally, virtual secure network element includes but is not limited to firewall, WAF, IPS, database firewall, IDS, VPN, fort Base machine etc..
In this embodiment, as shown in Fig. 2, active and standby 2 virtual datas can be configured for the first virtual interacting network element module Interaction network element, each virtual data interaction network element at least configure 4 network interfaces, including functional area, mouth of serially giving out a contract for a project, serial packet receiving mouth With the second management mouth.Functional area IP address is respectively configured in active and standby virtual data interaction network element, configures virtual data interactive network tuple Virtual IP address is based on 1 layer of High Availabitity of VRRP protocol realization the first virtual interacting network element module.
In another embodiment of the invention, when the main virtual data in active and standby two virtual datas interaction network element is handed over When mutual network element can be used, flowed between cloud platform and the second defence service chaining by the main virtual data interaction network element Amount forwarding;
When the main virtual data interaction network element in active and standby two virtual datas interaction network element is unavailable but counts for virtual According to interaction network element can with when, by the standby virtual data interaction network element between cloud platform and the second defence service chaining into The forwarding of row flow;
When the interactive network element of active and standby two virtual datas is unavailable, the service traffics of cloud platform institute is not forwarded to State the second defence service chaining entrance.
In one embodiment of this invention, the first detection module include at least 3 virtual network ports, including mouth of giving out a contract for a project, Packet receiving mouth and third manage mouth, for carrying out state-detection to each virtual secure network element, send to each virtual secure network element Test bag, and by judging whether to receive the test bag issued judges whether respective fictional security network element effective.
The High Availabitity security service chain of the application includes the first defence service chaining and the first detection service chain, completes 2 layers High Availabitity function, in which:
First defends the implementation of service chaining to configure flow table in the virtual switch that virtual secure network element is connected Rule realizes flow lead.Group is set by virtual secure network element group, and according to specified sequence by each virtual secure net Tuple connection, the mode of connection to configure flow entry in the virtual switch that virtual secure network element is connected, flow entry it is interior Hold the data packet to export business each in upper virtual secure network element group according to 5 tuples (source IP, source port, destination IP, mesh Port, agreement) match cognization flow, the flow orientation that match cognization goes out is led into the business of next virtual secure network element group and is entered Mouthful, under default situations, the ingress for service of next virtual secure network element group is the main virtual secure net of next virtual secure network element group The ingress for service of member.Wherein, the inlet flow rate of first virtual secure network element group is the string from the first virtual interacting network element module The capable flow for giving out a contract for a project mouth sending carries out match cognization and drains.
With added in OpenvSwitch source IP be 192.168.100.20 to destination IP be 192.168.30.50 or source IP is the flow that 192.168.30.50 is 192.168.100.20 to destination IP, and the service chaining by virtual secure network element group is Example, wherein active and standby virtual data interaction network element is serially given out a contract for a project, mouth is respectively 1,3, and serial packet receiving mouth is respectively 2,4, active and standby virtual peace The whole network member ingress for service is respectively 50,52, and business outlet is respectively 51,53, and the flow entry of addition is as follows:
A) in_port=1, nw_src=192.168.100.20/32, nw_dst=192.168.30.50/32, Actions=group:666
B) in_port=1, nw_src=192.168.30.50/32, nw_dst=192.168.100.20/32, Actions=group:666
C) in_port=3, nw_src=192.168.100.20/32, nw_dst=192.168.30.50/32, Actions=group:666
D) in_port=3, nw_src=192.168.30.50/32, nw_dst=192.168.100.20/32, Actions=group:666
E) group_id=666, type=all, bucket=output:50
F) in_port=51, nw_src=192.168.100.20/32, nw_dst=192.168.30.50/32, Actions=group:688
G) in_port=51, nw_src=192.168.30.50/32, nw_dst=192.168.100.20/32, Actions=group:688
H) in_port=53, nw_src=192.168.100.20/32, nw_dst=192.168.30.50/32, Actions=group:688
I) in_port=53, nw_src=192.168.30.50/32, nw_dst=192.168.100.20/32, Actions=group:688
J) group_id=688, type=all, bucket=output:2
Wherein, it a) matches to e) flow entry from main or standby virtual interacting network element and issues source IP as 192.168.100.20 to mesh IP be 192.168.30.50 or source IP is the service traffics that 192.168.30.50 is 192.168.100.20 to destination IP, if Setting its ID is 666, and checks that ID is 666 group, and flow is forwarded to 50 mouthfuls in group 666, and 50 mouthfuls are virtual secure network element group In main virtual secure network element.F) matching to j) flow entry and issuing source from main or standby virtual secure network element is 192.168.100.20 To destination IP be 192.168.30.50 or source IP is the Business Stream that 192.168.30.50 is 192.168.100.20 to destination IP Amount, it is 688 that its ID, which is arranged, and checks that ID is 688 group, and flow is forwarded to main virtual interacting network element receiving port in group 688 In.
First detection service chain sends and receives test bag, structure to specified virtual secure network element for first detection module It makes flow table and is matched with the test bag for realizing the mouth sending of giving out a contract for a project to first detection module, and according to test order by test bag The ingress for service for leading to specified virtual secure network element, the data packet still progress to the business outlet of virtual secure network element Match, specified test bag is led into first detection module, to form test bag in first detection module and virtual secure network element In test loop.
For adding the state of test bag detecting visual safety net tuple in OpenvSwitch, the flow entry of addition It is as follows:
K) in_port=101, nw_src=1.0.0.1/32, nw_dst=1.0.0.2/32, actions=output: 50
L) in_port=101, nw_src=1.0.0.3/32, nw_dst=1.0.0.4/32, actions=output: 52
M) in_port=51, nw_src=1.0.0.1/32, nw_dst=1.0.0.2/32, actions=output: 102
N) in_port=53, nw_src=1.0.0.3/32, nw_dst=1.0.0.4/32, actions=output: 102
Wherein k), l) by the test bag issued by first detection module, (source IP is that 1.0.0.1 destination IP is to flow table respectively 1.0.0.2 be 1.0.0.3 destination IP with source IP it is 1.0.0.4) it is forwarded to main virtual secure network element and standby virtual secure network element, and Flow table m), the test bag for n) then transferring active and standby virtual secure network element return to first detection module, and first detection module then leads to Whether cross, which can receive the test bag of return, judges whether tested virtual secure network element is effective, it should be noted that different Virtual secure network element may use different types of test bag, such as WAF use HTTP packet.Test bag detection in this way Mode, which can solve existing method, can not judge virtual secure network element seemingly-dead (network element, which is powered, starts still flow forwarding failure) Problem.
In one embodiment of this invention, as shown in figure 3, the first detection module can be placed in the first virtual interacting net In element module, the monitoring of virtual secure network element is realized by the first virtual interacting network element module.By the way that first detection module is placed in In first virtual interacting network element module, it is possible to reduce system host resource consumption realizes the unified management for component, improves System global controllability.
In one embodiment of this invention, the height based on VRRP protocol realization the first virtual interacting network element module traction flow Can use, further includes: configure heartbeat module in the first virtual interacting network element module, heartbeat module periodically send heartbeat data packets with The availability for judging active and standby two virtual datas interaction network element in the first virtual interacting network element module, when both can be used, Virtual ip address is realized by main virtual data interaction network element, when standby virtual data interaction network element does not receive master in predetermined period When the heartbeat data packets of virtual data interaction network element, standby virtual data interaction Network Element Function is enabled, realizes the section of automatic High Availabitity Point switching, guarantees the normal operation of virtual data function of exchange.
Inlet flow rate is led to each virtual secure network element group, default Virtual peace by the first defence service chaining of the application step by step The whole network tuple realizes Prevention-Security function by main virtual secure network element, when first detection module finds that main virtual secure network element is abnormal Afterwards, standby virtual secure network element is automatically switched to;
Under the action of the first defence service chaining, tenant's flow leads to each virtual secure network element group step by step, and default by Main virtual secure network element in virtual secure network element group realizes Prevention-Security function, when first detection module passes through the first detection clothes After business chain detects that Network Abnormal occurs for main virtual secure network element, flow entry is modified, automatically by flow from main virtual secure network element Switch to standby virtual secure network element.
With added in OpenvSwitch source IP be 192.168.100.20 to destination IP be 192.168.30.50 or source IP is the flow that 192.168.30.50 is 192.168.100.20 to destination IP, and the service chaining by virtual secure network element group is Example, when main virtual secure network element is unavailable, the flow entry of modification is as follows:
E) group_id=666, type=all, bucket=output:52
Former flow entry e) is revised as above-mentioned flow table, and flow is forwarded to the standby virtual secure network element that entrance is 52, realizes master Standby switching.
When main virtual data interaction network element is unavailable, it is as follows to modify above-mentioned j) flow entry:
J) group_id=688, type=all, bucket=output:4
Former flow table j) is revised as above-mentioned flow table, virtual secure network element return flow is forwarded to standby virtual data interactive network Member realizes the active-standby switch of virtual data interaction network element.
Step 402: the first virtual interacting network element module receives the service traffics of the first defence service chaining outlet, and is forwarded to Cloud platform.
The application can be led to tenant's business datum in cloud platform in resource pool by tenant by policybased routing mode The first virtual interacting network element module of the tenant, first virtual interacting network element module forwards tenant's flow to the first defence service The traffic ingress of chain.When configuration strategy is routed and drained, the first virtual interacting network element module is docked with cloud platform, secure resources pond It provides and receives flow IP, in the present embodiment, configure a first virtual interacting network element module for each tenant, each first is empty Quasi- interactive network element module externally provides a virtual group IP, distinguishes tenant using virtual group IP and receives policybased routing drainage number According to.Meanwhile configuring cloud platform in the first virtual interacting network element module and docking IP, realizing will protect return flow to return in resource pool It is back in cloud platform.
The embodiment of the invention also provides a kind of safety defense methods, comprising:
Second virtual interacting network element module receives the service traffics of cloud platform, and is forwarded to the second defence service chaining entrance, The second defence service chaining be according to the Prevention-Security circuit of specified one or more virtual secure network elements that are linked in sequence, The second virtual interacting network element module includes the active and standby two virtual datas interaction network element for sharing a virtual group IP address, is led to Cross whether the second detection service chain detection active and standby two virtual datas interaction network element can be used, the second detection service chain is Connect the available test loop of the second detection module and active and standby two virtual datas interaction network element;
Second virtual interacting network element module receives the service traffics of the second defence service chaining outlet, and is forwarded to cloud platform.
In one embodiment of this invention, when the main virtual data interaction in active and standby two virtual datas interaction network element When network element can be used, flow is carried out between cloud platform and the second defence service chaining by the main virtual data interaction network element Forwarding;
When the main virtual data interaction network element in active and standby two virtual datas interaction network element is unavailable but counts for virtual According to interaction network element can with when, by the standby virtual data interaction network element between cloud platform and the second defence service chaining into The forwarding of row flow;
When the interactive network element of active and standby two virtual datas is unavailable, the service traffics of cloud platform institute is not forwarded to State the second defence service chaining entrance.
When using the safety defense method of the application, it is necessary first to configure the second virtual secure network element according to tenant's demand Module, the second virtual interacting network element module, the second detection module, the second defence service chaining and the second detection service chain.The peace Full defence method is by the service traffics in cloud platform are by tenant and/or led in resource pool by business by policybased routing mode should The second virtual interacting network element module of tenant, the second virtual interacting network element module forwards service traffics to the second defence service chaining Entrance;The service traffics of entrance are led to each virtual secure network element by the second defence service chaining step by step, default the second virtual interacting Network element module realizes service traffics forwarding capability by main virtual data interaction network element, when the second detection module finds main virtual data After interaction network element exception, standby virtual data interaction network element is automatically switched to.
In one embodiment of this invention, the interaction network element of active and standby two virtual datas described in VRRP protocol realization can be passed through Draw the High Availabitity of flow.
It should be noted that whether detect active and standby two virtual datas interaction network element in the embodiment of the present invention available Method, can also be by the way that respectively whether online for deployment if being used to indicate itself on active and standby two virtual datas interaction network element The method of heartbeat submodule is detected.But detected by the method for heartbeat detection, it is false cannot to differentiate that egress occurs Dead situation.It is detected by the second detection module and the second detection service chain, can accurately and effectively detect each void The state of quasi- virtual data interaction network element, to realize the high availability of network.The application is handed over by active and standby two virtual datas One virtual group IP of mutual network-element share, designs 1 layer of High Availabitity ability at drainage, eliminates Single Point of Faliure risk when drainage.
The embodiment of the invention also provides a kind of computer readable storage medium, deposited on the computer readable storage medium One or more program is contained, one or more of programs can be executed by one or more processor, to realize such as The step of safety defense method described in any of the above item.
The embodiment of the invention also provides a kind of safety defense system for cloud environment, including processor and memory, The processor for executing the program stored in the memory, with realize as described in above one be used for cloud environment The step of safety defense method.
Security defend method and system disclosed by the embodiments of the present invention, computer readable storage medium, are first each rent Family configures virtual interacting network element module (the first virtual interacting network element module or the second virtual interacting network element module), then according to rent Family demand for security configure respective fictional safety net tuple, defence service chaining (first defence service chaining or second defence service chaining) and Detection service chain (the first detection service chain or the second detection service chain) then leads to tenant's flow configuration strategy routing in cloud Virtual interacting network element module in secure resources pond, virtual interacting network element module is again by flow by defending service chaining to lead in order Each virtual secure network element group realizes serial protection.Whole process realizes the double-deck High Availabitity defence method, in virtual interacting network element Module configures virtual group IP, realizes that one layer of virtual data exchanges network element High Availabitity based on VRRP, realizes the High Availabitity energy of drainage Power.Then the protection high availability scheme of two layers of service chaining realization, the High Availabitity security service chain of the application are defendd by High Availabitity It is divided into and defends service chaining and detection service chain, each virtual secure network element group of defence service chaining series connection, and responsible pair of detection service chain The availability of each virtual secure network element realizes monitoring, when the main virtual secure network element failure that virtual secure network element group default uses Afterwards, flow is forwarded to standby virtual secure network element automatically, to realize two layers of defence High Availabitity ability.By the above-mentioned means, High Availabitity function of safety protection comprehensively whole in resource pool is completed since drainage, and passes through detection module (the first detection Module or the second detection module) validation checking to each virtual secure network element may be implemented, solving existing scheme can not identify Seemingly-dead problem, while the high availability scheme automated is realized based on detection module, to ensure business normal operation, in above-mentioned energy The fault recovery of low delay is realized under power.
Those of ordinary skill in the art will appreciate that all or part of the steps in the above method can be instructed by program Related hardware is completed, and described program can store in computer readable storage medium, such as read-only memory, disk or CD Deng.Optionally, one or more integrated circuits also can be used to realize, accordingly in all or part of the steps of above-described embodiment Ground, each module/unit in above-described embodiment can take the form of hardware realization, can also use the shape of software function module Formula is realized.The present invention is not limited to the combinations of the hardware and software of any particular form.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (14)

1. a kind of safety defense system for cloud environment, which is characterized in that including the first virtual secure network element module, the first void Quasi- interactive network element module and first detection module, in which:
The first virtual secure network element module includes one or more virtual secure network elements for realizing Prevention-Security function Group, the virtual secure network element group include active and standby two virtual secure network elements;
The first virtual interacting network element module for receiving the service traffics of cloud platform, and is forwarded to the first defence service chaining Entrance;The service traffics for receiving the first defence service chaining outlet, and are forwarded to cloud platform, the first defence service chaining be according to The Prevention-Security circuit of specified one or more virtual secure network element groups that are linked in sequence;
First detection module, it is virtual for detecting active and standby two in the virtual secure network element group by the first detection service chain Whether security network element can be used, and the first detection service chain is connect first detection module and the virtual secure network element available Test loop.
2. safety defense system according to claim 1, which is characterized in that the main void in the virtual secure network element group When quasi- security network element can be used, the virtual secure network element for accessing the first defence service chaining is the main virtual secure network element;
When the main virtual secure network element in the virtual secure network element group is unavailable but standby virtual secure network element is available, institute is accessed The virtual secure network element for stating the first defence service chaining is the standby virtual secure network element;
When the active and standby virtual secure network element in the virtual secure network element group is unavailable, the first defence service chaining bypass Pass through virtual secure network element group described in this.
3. safety defense system according to claim 1, which is characterized in that each virtual secure network element includes at least Four virtual network ports: ingress for service, business outlet, the first management mouth and HA mouthfuls of dual-computer redundancy, wherein ingress for service and business go out Mouth is used for the disengaging of service traffics, and for the first management mouth for being managed to the virtual secure network element, HA mouthfuls are used for the master Synchronization Status Message between standby two virtual secure network elements.
4. safety defense system according to claim 1, which is characterized in that the first virtual interacting network element module includes Active and standby two virtual datas interaction network element, described active and standby two virtual datas interaction, one internet protocol IP of virtual group of network-element share Address.
5. safety defense system according to claim 4, which is characterized in that detection active and standby two virtual datas interaction The whether available method of network element, comprising:
Test bag is sent to active and standby two virtual datas interaction network element by first detection module and detects whether to connect Receive the test bag that active and standby two virtual datas interaction network element returns;Alternatively,
By the way that respectively deployment is used to indicate itself whether online heartbeat on active and standby two virtual datas interaction network element Module.
6. safety defense system according to claim 4, which is characterized in that each virtual data interacts network element and includes At least four virtual network ports: functional area, mouth of serially giving out a contract for a project, serial packet receiving mouth and the second management mouth, wherein functional area is for receiving Service traffics in cloud platform are simultaneously forwarded to mouth of serially giving out a contract for a project, receive service traffics that the serial packet receiving mouth is sent and be forwarded to Cloud platform, mouth of serially giving out a contract for a project are used to receive the service traffics of functional area transmission and are forwarded to entering for the first defence service chaining Mouthful, serial packet receiving mouth is used to receive the service traffics of the outlet of the first defence service chaining and is forwarded to the functional area, the Two management mouths are used to be managed virtual data interaction network element.
7. safety defense system according to claim 1, which is characterized in that the virtual secure network element include it is following at least One of: firewall, intrusion prevention system IPS, intruding detection system IDS, Virtual Private Network VPN, fort machine.
8. safety defense system according to any one of claims 1 to 7, which is characterized in that further include management module and network Module, in which:
The management module, for by tenant and/or by the first virtual secure network element module described in service creation, first void Quasi- interactive network element module, the first detection module;
The network module, for by tenant and/or by the first defence service chaining described in service creation and the first detection clothes Business chain.
9. a kind of safety defense system for cloud environment, which is characterized in that including the second virtual secure network element module, the second void Quasi- interactive network element module and the second detection module, in which:
The second virtual secure network element module includes one or more virtual secure network elements for realizing Prevention-Security function;
The second virtual interacting network element module, active and standby two virtual data interactive networks including sharing a virtual group IP address Member for receiving the service traffics of cloud platform, and is forwarded to the second defence service chaining entrance;Receive the second defence service chaining outlet Service traffics, and be forwarded to cloud platform, the second defence service chaining be according to specified sequentials connection it is one or more described in The Prevention-Security circuit of virtual secure network element;
Whether the second detection module may be used for detecting active and standby two virtual datas interaction network element by the second detection service chain With the second detection service chain is the available survey for connecting the second detection module and active and standby two virtual datas interaction network element Try circuit.
10. safety defense system according to claim 9, which is characterized in that when active and standby two virtual datas interaction When main virtual data interaction network element in network element can be used, by the main virtual data interaction network element in cloud platform and described second It defends to carry out flow forwarding between service chaining;
When the unavailable but standby virtual data of main virtual data interaction network element in active and standby two virtual datas interaction network element is handed over When mutual network element can be used, flowed between cloud platform and the second defence service chaining by the standby virtual data interaction network element Amount forwarding;
When active and standby two virtual datas interaction network element is unavailable, the service traffics of cloud platform are not forwarded to described the Two defence service chaining entrances.
11. a kind of safety defense method for cloud environment characterized by comprising
First virtual interacting network element module receives the service traffics of cloud platform, and is forwarded to the first defence service chaining entrance, described First defence service chaining is according to the Prevention-Security circuit of specified one or more virtual secure network element groups that are linked in sequence, institute Stating virtual secure network element group includes active and standby two virtual secure network elements, detects the virtual secure net by the first detection service chain Whether active and standby two virtual secure network elements in tuple can be used, and the first detection service chain is connection first detection module and institute State the available test loop of virtual secure network element;
First virtual interacting network element module receives the service traffics of the first defence service chaining outlet, and is forwarded to cloud platform.
12. a kind of safety defense method for cloud environment characterized by comprising
Second virtual interacting network element module receives the service traffics of cloud platform, and is forwarded to the second defence service chaining entrance, described Second defence service chaining be according to the Prevention-Security circuit of specified one or more virtual secure network elements that are linked in sequence, it is described Second virtual interacting network element module includes the active and standby two virtual datas interaction network element for sharing virtual group IP address, by the Whether two detection service chains detection active and standby two virtual datas interaction network element can be used, and the second detection service chain is connection The available test loop of second detection module and active and standby two virtual datas interaction network element;
Second virtual interacting network element module receives the service traffics of the second defence service chaining outlet, and is forwarded to cloud platform.
13. a kind of computer readable storage medium, which is characterized in that be stored on the computer readable storage medium one or The multiple programs of person, one or more of programs can be executed by one or more processor, to realize such as claim 11 The step of described safety defense method for cloud environment any to claim 12.
14. a kind of safety defense system for cloud environment, which is characterized in that including processor and memory, the processor For executing the program stored in the memory, with realize such as claim 11 to claim 12 it is any as described in for cloud The step of safety defense method of environment.
CN201910182074.4A 2019-03-11 2019-03-11 Security defend method and system, computer readable storage medium for cloud environment Pending CN109981355A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910182074.4A CN109981355A (en) 2019-03-11 2019-03-11 Security defend method and system, computer readable storage medium for cloud environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910182074.4A CN109981355A (en) 2019-03-11 2019-03-11 Security defend method and system, computer readable storage medium for cloud environment

Publications (1)

Publication Number Publication Date
CN109981355A true CN109981355A (en) 2019-07-05

Family

ID=67078455

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910182074.4A Pending CN109981355A (en) 2019-03-11 2019-03-11 Security defend method and system, computer readable storage medium for cloud environment

Country Status (1)

Country Link
CN (1) CN109981355A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110311838A (en) * 2019-07-24 2019-10-08 北京神州绿盟信息安全科技股份有限公司 A kind of method and device of security service traffic statistics
CN110365577A (en) * 2019-07-24 2019-10-22 北京神州绿盟信息安全科技股份有限公司 A kind of drainage system in secure resources pond
CN111131319A (en) * 2019-12-30 2020-05-08 北京天融信网络安全技术有限公司 Security capability expansion method and device, electronic equipment and storage medium
CN111147449A (en) * 2019-12-09 2020-05-12 杭州迪普科技股份有限公司 Method, device, system, equipment and medium for testing packet filtering strategy
CN112187533A (en) * 2020-09-18 2021-01-05 北京浪潮数据技术有限公司 Virtual network equipment defense method, device, electronic equipment and medium
CN113810348A (en) * 2020-06-17 2021-12-17 华为技术有限公司 Network security detection method, system, equipment and controller
CN114070639A (en) * 2021-11-19 2022-02-18 北京天融信网络安全技术有限公司 Message secure forwarding method and device and network security equipment
CN115484208A (en) * 2022-09-16 2022-12-16 杭州安恒信息技术股份有限公司 Distributed drainage system and method based on cloud security resource pool

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105337971A (en) * 2015-10-20 2016-02-17 上海电机学院 Electric power information system cloud safety guarantee system and implementation method thereof
CN106612312A (en) * 2015-10-23 2017-05-03 中兴通讯股份有限公司 Virtualized data center scheduling system and method
CN106789542A (en) * 2017-03-03 2017-05-31 清华大学 A kind of implementation method of cloud data center security service chain
CN107566440A (en) * 2016-06-30 2018-01-09 丛林网络公司 The automatic discovery that is serviced in the network environment of software definition and automatic scalable
CN108199958A (en) * 2017-12-29 2018-06-22 深信服科技股份有限公司 A kind of general secure resources pond service chaining realization method and system
CN108234223A (en) * 2018-04-19 2018-06-29 郑州云海信息技术有限公司 A kind of security service design method of data center's total management system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105337971A (en) * 2015-10-20 2016-02-17 上海电机学院 Electric power information system cloud safety guarantee system and implementation method thereof
CN106612312A (en) * 2015-10-23 2017-05-03 中兴通讯股份有限公司 Virtualized data center scheduling system and method
CN107566440A (en) * 2016-06-30 2018-01-09 丛林网络公司 The automatic discovery that is serviced in the network environment of software definition and automatic scalable
CN106789542A (en) * 2017-03-03 2017-05-31 清华大学 A kind of implementation method of cloud data center security service chain
CN108199958A (en) * 2017-12-29 2018-06-22 深信服科技股份有限公司 A kind of general secure resources pond service chaining realization method and system
CN108234223A (en) * 2018-04-19 2018-06-29 郑州云海信息技术有限公司 A kind of security service design method of data center's total management system

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110311838A (en) * 2019-07-24 2019-10-08 北京神州绿盟信息安全科技股份有限公司 A kind of method and device of security service traffic statistics
CN110365577A (en) * 2019-07-24 2019-10-22 北京神州绿盟信息安全科技股份有限公司 A kind of drainage system in secure resources pond
CN110311838B (en) * 2019-07-24 2021-05-04 绿盟科技集团股份有限公司 Method and device for counting safety service flow
CN110365577B (en) * 2019-07-24 2021-10-15 绿盟科技集团股份有限公司 Drainage system of safety resource pool and safety inspection method
CN111147449A (en) * 2019-12-09 2020-05-12 杭州迪普科技股份有限公司 Method, device, system, equipment and medium for testing packet filtering strategy
CN111131319A (en) * 2019-12-30 2020-05-08 北京天融信网络安全技术有限公司 Security capability expansion method and device, electronic equipment and storage medium
CN113810348A (en) * 2020-06-17 2021-12-17 华为技术有限公司 Network security detection method, system, equipment and controller
CN113810348B (en) * 2020-06-17 2023-04-07 华为技术有限公司 Network security detection method, system, equipment and controller
CN112187533A (en) * 2020-09-18 2021-01-05 北京浪潮数据技术有限公司 Virtual network equipment defense method, device, electronic equipment and medium
CN114070639A (en) * 2021-11-19 2022-02-18 北京天融信网络安全技术有限公司 Message secure forwarding method and device and network security equipment
CN114070639B (en) * 2021-11-19 2024-04-23 北京天融信网络安全技术有限公司 Message security forwarding method and device and network security equipment
CN115484208A (en) * 2022-09-16 2022-12-16 杭州安恒信息技术股份有限公司 Distributed drainage system and method based on cloud security resource pool

Similar Documents

Publication Publication Date Title
CN109981355A (en) Security defend method and system, computer readable storage medium for cloud environment
US11716265B2 (en) Anomaly detection and reporting in a network assurance appliance
CN106375384B (en) The management system and control method of image network flow in a kind of virtual network environment
US10158533B2 (en) System and method for base topology selection
US9942623B2 (en) Data center network architecture
US9204207B2 (en) Hierarchy of control in a data center network
US9301026B2 (en) Affinity modeling in a data center network
CN104468181B (en) The detection and processing of virtual network device failure
CN1761240B (en) Intelligent integrated network security device for high-availability applications
CN107210959A (en) Router logic with multiple route parts
CN104025513B (en) Apparatus and method for the control level in data center network
CN103493434B (en) Fault protecting method and fail-safe system in multiple-domain network
CN109644157A (en) Use the fringe node cluster network redundancy and fast convergence of bottom anycast VTEP IP
CN108353006A (en) Non-invasive methods for testing and dissecting network service function
CN107852368A (en) Highly usable service chaining for network service
CN106953788A (en) A kind of Virtual Network Controller and control method
CN107395445A (en) The network architecture with middleboxes
CN101981560A (en) Load-balancing bridge cluster for network node
CN107077579A (en) Stateful service on stateless cluster edge
CN106850459A (en) A kind of method and device for realizing virtual network load balancing
CN109981613A (en) A kind of flow rate testing methods and resource pool system for cloud environment
CN107181623A (en) Information network equipment fault handling method and device
Wang et al. Efficient network security policy enforcement with policy space analysis
CN109889533A (en) Security defend method and system, computer readable storage medium under cloud environment
CN107659582A (en) A kind of depth defense system for successfully managing APT attacks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190705

RJ01 Rejection of invention patent application after publication