CN105871942B - A kind of IaaS management platform and method - Google Patents

A kind of IaaS management platform and method Download PDF

Info

Publication number
CN105871942B
CN105871942B CN201510024893.8A CN201510024893A CN105871942B CN 105871942 B CN105871942 B CN 105871942B CN 201510024893 A CN201510024893 A CN 201510024893A CN 105871942 B CN105871942 B CN 105871942B
Authority
CN
China
Prior art keywords
virtual machine
network
reinforcement elements
memory source
page table
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510024893.8A
Other languages
Chinese (zh)
Other versions
CN105871942A (en
Inventor
柏洪涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201510024893.8A priority Critical patent/CN105871942B/en
Publication of CN105871942A publication Critical patent/CN105871942A/en
Application granted granted Critical
Publication of CN105871942B publication Critical patent/CN105871942B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of IaaS management platform and methods, comprising: network reinforcement elements, for intercepting autonomous network configuration operations when detecting that client domain virtual machine user executes autonomous network configuration operations;And page table is sent to service unit and modifies service request;Service unit in virtual machine monitor, service request is modified for receiving the page table that the network reinforcement elements are sent, and service request is modified according to the page table and determines subsystem call table, the network reinforcement elements are modified to the corresponding page table entry operating right of the subsystem call table, and send page table modification service response instruction to the network reinforcement elements;The network reinforcement elements, the page table modification service response instruction for being also used to send according to the virtual machine monitor received, the autonomous network configuration operations of the client domain virtual machine user of interception are handled, to solve bring management and safety problem when user intentionally or accidentally changes IP address or MAC Address.

Description

A kind of IaaS management platform and method
Technical field
The present invention relates to field of cloud computer technology, serviced more particularly, to a kind of basis instrument (English: Infrastructure as a Service, abbreviation: IaaS) manage platform and method.
Background technique
Since cloud computing concept proposes, the upsurge of cloud computing has swept across entire IT industry, changes the letter of the whole society Breath service provides and usage mode, has started domestic and international cloud computing in IaaS, platform and has serviced (English: Platform as a Service abbreviation: PaaS), program i.e. service (English: Software as a Service, abbreviation: SaaS) research boom.
Wherein, IaaS mainly delivers virtual machine capable of making remote access to user;Currently, mainstream IaaS service includes that business is public Take charge of Amazon EC2, open source tissue Eucalyptus, OpenStack, OpenNebula etc..Under present circumstances, in current main-stream IaaS solution in, be related to the mainstream virtualization software of bottom, such as Xen, KVM, VM Ware, Hyper-V etc., and Amazon EC2, Eucalyptus, Open Stack, the Open Nebula on upper layer etc..Overwhelming majority enterprise or research aircraft at present Structure is when constructing and studying IaaS, it is intended to based on mainstream open source technology, the Internet protocol that will be used needed for virtual machine (English: Internet Protocol, abbreviation: IP) address is bound with virtual machine instance, can prevent user with changing IP Location bring management and safety problem.
However, the IaaS solution released by open source mechanism, from underlying virtual software such as Xen, KVM, Hyper-V, IaaS software such as Eucalyptus, Open Stack, Open Nebula to upper layer are directed to be constructed based on virtualization technology Network environment under IaaS environment carries out security hardening, can not solve user change IP address or media access control (English: Madia Access Control, abbreviation: MAC) address bring management and safety problem, the safety of network environment it is poor.
Summary of the invention
The present invention provides a kind of IaaS management platform and method, to solve user intentionally or accidentally change IP address or Bring management and safety problem when MAC Address, improve the safety of network environment.
A kind of IaaS management platform, comprising:
Network reinforcement elements, for intercepting when detecting that client domain virtual machine user executes autonomous network configuration operations The autonomous network configuration operations;And page table is sent to service unit and modifies service request;
Service unit in virtual machine monitor is asked for receiving the page table modification service that the network reinforcement elements are sent It asks, and service request is modified according to the page table and determines subsystem call table, modify the network reinforcement elements to the system tune Page table modification service response instruction is sent with the corresponding page table entry operating right of table, and to the network reinforcement elements;
The network reinforcement elements, the page table modification service for being also used to send according to the virtual machine monitor received Response instruction, handles the autonomous network configuration operations of the client domain virtual machine user of interception.
The autonomous network configuration operations that the client domain virtual machine user of the network reinforcement elements detection executes include: to net The off permanently or temporarily modification of network configuration file.
The network profile that the client domain virtual machine user of the network reinforcement elements detection executes, comprising: client domain The internet protocol address of virtual machine;And/or the MAC address of client domain virtual machine.
The network reinforcement elements are also used to register for requesting to execute autonomous network configuration to client domain virtual machine user Operate the network environment detected.
The network reinforcement elements are specifically used for sending memory source operation requests to service unit;
The service unit is specifically used for receiving memory source operation requests, and according to the memory source operation requests, The network reinforcement elements are set to the modification authority of memory source;And memory source operation is sent to network reinforcement elements and is rung Answer message;
The network reinforcement elements disappear specifically for receiving the memory source operation response that the virtual machine monitor is sent Breath;According to the memory setting permission in memory source operation response message, the memory source is modified.
The service unit is also used to after the network reinforcement elements modify the memory source, is restored in described The modification authority of resource is deposited, and forbids modifying to the memory source.
Further include:
Module hidden unit, for hiding the network reinforcement elements.
A kind of IaaS method, comprising:
When detecting that client domain virtual machine user executes autonomous network configuration operations, the autonomous network configuration behaviour is intercepted Make;And
Page table, which is sent, to virtual machine monitor modifies service request;And
The page table modification service response instruction sent according to the virtual machine monitor received, to the visitor of interception The autonomous network configuration operations of family domain virtual machine user are handled.
The autonomous network configuration operations include:
Off permanently or temporarily modification to network profile.
Network profile, comprising:
The internet protocol address of client domain virtual machine;And/or
The MAC address of client domain virtual machine.
Before executing autonomous network configuration operations detection to client domain virtual machine user, further includes:
Registration is for requesting to execute the network environment that autonomous network configuration operations are detected to client domain virtual machine user.
Registration is used to request to execute the network environment that autonomous network configuration operations are detected to client domain virtual machine user, Include:
Memory source operation requests are sent to virtual machine monitor;And
Receive the memory source operation response message that the virtual machine monitor is sent;
According to the memory setting permission in memory source operation response message, the memory source is modified.
Further include:
It hides for requesting to execute the network environment that autonomous network configuration operations are detected to client domain virtual machine user.
A kind of IaaS method, comprising:
It receives page table and modifies service request;And
Service request is modified according to the page table and determines subsystem call table, modifies the network reinforcement elements to the system The corresponding page table entry operating right of call list;And
Page table modification service response instruction is sent, instruction is repaired according to the page table that the virtual machine monitor received is sent Change service response instruction, the autonomous network configuration operations of the client domain virtual machine user of interception are handled.
Before receiving page table modification service request, further includes:
Receive memory source operation requests;And
According to the memory source operation requests, the modification authority to memory source is set;And
It sends memory source and operates response message.
After sending memory source operation response message, further includes:
The modification authority of the memory source is restored, and forbids modifying to the memory source.
By using above-mentioned technical proposal, the subframe network configuration operation that client domain virtual machine user executes is reset To, and service response instruction is modified by the page table that service unit is sent, to the hoc network of the client domain virtual machine user of interception Network configuration operation is handled, and is realized and is intercepted autonomous network configuration operations, intentionally or accidentally changes IP address to solve user Or bring management and safety problem when MAC Address, improve the safety of network environment.
Detailed description of the invention
Fig. 1 is in the embodiment of the present invention one, and the IaaS of proposition manages platform structure composition schematic diagram;
Fig. 2 a is in the embodiment of the present invention one, and the IaaS management platform of proposition intercepts network autonomous configuration behavior schematic diagram;
Fig. 2 b is in the embodiment of the present invention one, and the network reinforcement elements of proposition handle network autonomous configuration behavior schematic diagram;
Fig. 3 is the IaaS method flow diagram of proposition in the embodiment of the present invention two;
Fig. 4 is the IaaS method flow diagram of proposition in the embodiment of the present invention two.
Specific embodiment
For under open source environment, bring management and safety are asked when user intentionally or accidentally changes IP address or MAC Address Topic, the poor problem of the safety of network environment, the present invention propose a kind of technical solution, by increasing network reinforcement elements, use In when detecting that client domain virtual machine user executes autonomous network configuration operations, the autonomous network configuration operations are intercepted;And Page table modification service request and service unit are sent to service unit, the page table that the network reinforcement elements are sent is received and repairs Change service request, and service request is modified according to page table and determines subsystem call table, modifies network reinforcement elements to the system tune Page table modification service response instruction is sent with the corresponding page table entry operating right of table, and to network reinforcement elements, network is reinforced Unit, the page table modification service response instruction for being also used to send according to the virtual machine monitor received, to the institute of interception The autonomous network configuration operations for stating client domain virtual machine user are handled.IP address is intentionally or accidentally changed to solve user Or bring management and safety problem when MAC Address, improve the safety of network environment.
Below in conjunction with each attached drawing to the main realization principle of technical solution of the embodiment of the present invention, specific embodiment and Its beneficial effect corresponding to reach is set forth.
Embodiment one
The embodiment of the present invention one proposes a kind of IaaS management platform, as shown in Figure 1, including for carrying out pipe to whole system Cloud computing platform, interchanger and at least one physical machine of reason, are provided at least one virtual machine in physical machine, physical machine it Between by interchanger connect, carry out data transmission.Wherein:
In the technical solution that the embodiment of the present invention one proposes, with the operating system of virtual machine monitor be Xen, client domain it is empty Intend the operating system of machine to be described in detail for Linux, but in being embodied, the operation system of virtual machine monitor The operating system of system and client domain virtual machine is not limited to this mode.For the virtual machine in physical machine, network is added Reinforcement elements and service unit 2.
Network reinforcement elements are deployed in the virtual machine of client domain, can be set to system boot and load automatically.It is opened in system When machine, initialization client domain virtual machine network reinforces environment, and the registration of network reinforcement elements uses client domain virtual machine for requesting Family executes the network environment that autonomous network configuration operations are detected.Network reinforcement elements send memory source to service unit Operation requests.
Service unit is deployed in virtual machine monitor, in system boot, for receiving the transmission of network reinforcement elements Memory source operation requests, and according to the memory source operation requests received, network reinforcement elements are set to memory source Modification authority, and send memory source to network reinforcement elements and operate response message.
Specifically, the write permission of memory source is arranged according to the memory source operation requests received in service unit.
Network reinforcement elements receive the memory source that the service unit in virtual machine monitor is sent and operate response message, According to the memory setting permission in the memory source operation response message received, memory source is modified.
Specifically, network reinforcement elements intra vires, modify the memory source, at the default network configuration of system Reason process guides network reinforcement elements into.
Service unit is also used to after network reinforcement elements modify memory source, restores the modification authority of memory source, And forbid modifying to the memory source.
Specifically, the operating right of service unit reduction memory source, and any of the memory source is repaired after refusing Change request.
By the above process, operation ring needed for completing network reinforcement elements is had been built up when client domain virtual machine starts After border, when user carries out network configuration, the system calling triggered will be redirected to network reinforcement elements, by network plus Gu unit handles the request of specific network operation, to realize the real-time blocking to user network autonomous configuration behavior.
Wherein, above-mentioned IaaS manages platform, can also include module hidden unit, be set in the virtual machine of client domain, use In hiding network reinforcement elements.
User's either intentionally or unintentionally deletion/offloading network reinforcement elements can be prevented by module hidden unit.
After having been built up running environment needed for completing network reinforcement elements in the starting of client domain virtual machine, such as Fig. 2 a It is shown, it intercepts user and executes autonomous network configuration operations.
Network reinforcement elements, for intercepting when detecting that client domain virtual machine user executes autonomous network configuration operations The autonomous network configuration operations, and send page table to service unit and modify service request.
As shown in Figure 2 b, client domain virtual machine user is by calling application program, when executing corresponding operating, kernel inquiry system Call list of uniting obtains the entry address of alignment processing function.System relevant to network configuration calls execution process steering network to add Gu unit, remaining system calls then steering system default process.Network reinforcement elements judge system call operation whether with network Configuration is related, if it is judged that be it is yes, then return to application layer and refuse execution, otherwise steering system default processing flow.
For example, by taking client domain virtual machine user modifies MAC Address as an example, to be further elaborated on network reinforcement elements Interception scheme.Client domain virtual machine user executes ip link set in the virtual machine (SuSE) Linux OS of client domain Eth0address 00:E0:4C:6A:1A:8E modifies MAC Address, and user executes ip link set eth0address 00: E0:4C:6A:1A:8E, the process can initiate execve system calling, and by feature string ip link set For eth0address 00:E0:4C:6A:1A:8E as its parameter, which, which calls, turns to network reinforcement elements.Network is reinforced single Member judges that user's operation is network according to feature string ip link set eth0address00:E0:4C:6A:1A:8E Configuration behavior directly returns.Wherein, network reinforcement elements before intercepting network configuration behavior can also include log recording or Send warning etc..
Wherein, the autonomous network configuration operations that the client domain virtual machine user of network reinforcement elements detection executes include following Two kinds of situations:
The first: the permanent modification to network profile.
Second: the provisional modification to network profile.
Above-mentioned network profile includes:
The IP address of client domain virtual machine;And/or the MAC Address of client domain virtual machine.
Specifically, network reinforcement elements send page table to service unit by hypercalls and modify service request.
Service unit, the page table for receiving the transmission of network reinforcement elements modifies service request, and is modified and taken according to page table Business requests to determine subsystem call table, modifies network reinforcement elements to the corresponding page table entry operating right of subsystem call table, Yi Jixiang Network reinforcement elements send page table modification service response instruction.
Specifically, the page table that service unit receives that network reinforcement elements are sent modifies service request, modifies subsystem call table The operating right of page table entry is mapped as writeable by corresponding page table entry.
Network reinforcement elements, the page table modification service response instruction for being sent according to the virtual machine monitor received, The autonomous network configuration operations of the client domain virtual machine user of interception are handled.
Specifically, network reinforcement elements modify subsystem call table, guide system default network configuration treatment process into network Reinforcement elements.
Service unit restores the corresponding page table entry operating right of subsystem call table.
Specifically, operating right is reduced to read-only, refusal net by the corresponding page table entry of service unit reduction subsystem call table Any modification of the network reinforcement elements to the page table entry.
IaaS set forth above of the embodiment of the present invention manages platform, of the invention as shown in figure 1 to implement a deployment provided Figure, wherein network reinforcement elements, service unit and module hidden unit.Wherein network reinforcement elements and module hidden unit It is deployed in the virtual machine of client domain, is disposed as the automatic loading mode of system boot.Since IaaS management platform is for user When providing virtual machine service, client domain virtual machine is usually instantiated by virtual machine template, therefore the embodiment of the present invention proposes Technical solution in, network reinforcement elements 101 and module hidden unit 102 are directly packaged in virtual machine template.Service is single Member 103 is then set in virtual machine monitor, for handling the resource request for carrying out automatic network reinforcement elements.
Embodiment two
Platform is managed based on above-mentioned IaaS shown in FIG. 1, the embodiment of the present invention two proposes a kind of IaaS method, such as Fig. 3 institute Show, specific process flow is for example following:
Step 30, registration is for requesting to execute the net that autonomous network configuration operations are detected to client domain virtual machine user Network environment.
Firstly, sending memory source operation requests to virtual machine monitor.
Secondly, receiving the memory source operation response message that the virtual machine monitor is sent.
Finally, modifying memory source according to the memory setting permission in memory source operation response message.
By the above process, client domain virtual machine start when have been built up complete needed for running environment after, when with When family carries out network configuration, the system calling triggered will be redirected, to realize to user network autonomous configuration behavior Real-time blocking.
Step 31, it when detecting that client domain virtual machine user executes autonomous network configuration operations, intercepts autonomous network and matches Set operation.
Wherein, autonomous network configuration operations include: the off permanently or temporarily modification to network profile.
Wherein, network profile, comprising:
The IP address of client domain virtual machine;And/or
The MAC Address of client domain virtual machine.
Client domain virtual machine user is by calling application program, and when executing corresponding operating, kernel inquiry system call list is obtained Take the entry address of alignment processing function.System relevant to network configuration, which is called, executes process redirection, remaining system is called Then steering system defaults process.Whether related to network configuration judge system call operation, if it is judged that be it is yes, then return Application layer not executes, otherwise steering system default processing flow.
For example, by taking client domain virtual machine user modifies MAC Address as an example, to be further elaborated on interception scheme.Client Domain virtual machine user executes ip link set eth0address 00:E0 in the virtual machine (SuSE) Linux OS of client domain: 4C:6A:1A:8E modifies MAC Address, and user executes ip link set eth0address00:E0:4C:6A:1A:8E, the mistake Journey can initiate execve system calling, and by feature string ip link set eth0address 00:E0:4C:6A:1A: 8E is redirected as its parameter, system calling.According to feature string ip link set eth0address 00:E0: 4C:6A:1A:8E judges that user's operation is network configuration behavior, directly returns.Wherein, before intercepting network configuration behavior It can also include log recording or transmission warning etc..
Step 32, page table is sent to virtual machine monitor modify service request.
Step 33, the page table modification service response instruction sent according to the virtual machine monitor received, to the visitor of interception The autonomous network configuration operations of family domain virtual machine user are handled.
Wherein, the above method further include:
It hides for requesting to execute the network environment that autonomous network configuration operations are detected to client domain virtual machine user.
It can prevent user's either intentionally or unintentionally deletion/offloading network reinforcement elements.
Correspondingly, the embodiment of the present invention two also proposes a kind of IaaS method, as shown in figure 4, its specific process flow is as follows It states:
Step 41, it receives page table and modifies service request.
Step 42, service request is modified according to page table and determines subsystem call table, modify the network reinforcement elements to described The corresponding page table entry operating right of subsystem call table.
Specifically, it receives page table and modifies service request, the corresponding page table entry of modification subsystem call table, by the operation of page table entry Permissions mapping is writeable.
Step 43, page table modification service response instruction, the page that instruction is sent according to the virtual machine monitor received are sent Table modifies service response instruction, handles the autonomous network configuration operations of the client domain virtual machine user of interception.
Optionally, before above-mentioned steps 41 receive page table modification service request, further includes:
Step 1 receives memory source operation requests.
The modification authority to memory source is arranged according to memory source operation requests in step 2.
Specifically, the write permission of memory source is arranged according to the memory source operation requests received in service unit.
Step 3 sends memory source and operates response message.
Optionally, after above-mentioned steps 43 send memory source operation response message, can also include:
The modification authority of memory source is restored, and forbids modifying to the memory source.
Specifically, the corresponding page table entry of reduction subsystem call table, operating right is reduced to read-only, is refused to the page table entry Any modification.
The treatment process of one~step 3 through the above steps has been built up in the starting of client domain virtual machine and completes network After running environment needed for reinforcement elements, when user carries out network configuration, the system calling triggered will be redirected to Network reinforcement elements are handled the request of specific network operation by network reinforcement elements, to realize to user network certainly The real-time blocking of main configuration behavior.
It will be understood by those skilled in the art that the embodiment of the present invention can provide as method, apparatus (equipment) or computer Program product.Therefore, in terms of the present invention can be used complete hardware embodiment, complete software embodiment or combine software and hardware Embodiment form.Moreover, it wherein includes the meter of computer usable program code that the present invention, which can be used in one or more, The computer implemented in calculation machine usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of program product.
The present invention be referring to according to the method for the embodiment of the present invention, the flow chart of device (equipment) and computer program product And/or block diagram describes.It should be understood that each process in flowchart and/or the block diagram can be realized by computer program instructions And/or the combination of the process and/or box in box and flowchart and/or the block diagram.It can provide these computer programs to refer to Enable the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to generate One machine so that by the instruction that the processor of computer or other programmable data processing devices executes generate for realizing The device for the function of being specified in one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.

Claims (16)

1. a kind of IaaS manages platform characterized by comprising
Network reinforcement elements, for when detecting that client domain virtual machine user executes autonomous network configuration operations, described in interception Autonomous network configuration operations;And page table is sent to service unit and modifies service request;
Service unit in virtual machine monitor modifies service request for receiving the page table that the network reinforcement elements are sent, And service request is modified according to the page table and determines subsystem call table, the network reinforcement elements are modified to the subsystem call table Corresponding page table entry operating right, and page table modification service response instruction is sent to the network reinforcement elements;
The network reinforcement elements are also used to modify service response according to the page table that the virtual machine monitor received is sent Instruction, handles the autonomous network configuration operations of the client domain virtual machine user of interception.
2. platform as described in claim 1, which is characterized in that the client domain virtual machine user of the network reinforcement elements detection The autonomous network configuration operations executed include: the off permanently or temporarily modification to network profile.
3. platform as claimed in claim 2, which is characterized in that the client domain virtual machine user of the network reinforcement elements detection The network profile of execution, comprising: the internet protocol address of client domain virtual machine;And/or the matchmaker of client domain virtual machine Body access control MAC address.
4. the platform as described in claims 1 to 3 is any, which is characterized in that the network reinforcement elements are also used to registration and are used for Request executes the network environment that autonomous network configuration operations are detected to client domain virtual machine user.
5. platform as claimed in claim 4, which is characterized in that the network reinforcement elements are specifically used for sending out to service unit Send memory source operation requests;
The service unit is specifically used for receiving memory source operation requests, and according to the memory source operation requests, setting Modification authority of the network reinforcement elements to memory source;And memory source operation response is sent to network reinforcement elements and is disappeared Breath;
The network reinforcement elements operate response message specifically for receiving the memory source that the virtual machine monitor is sent; According to the memory setting permission in memory source operation response message, the memory source is modified.
6. platform as claimed in claim 5, which is characterized in that the service unit is also used in the network reinforcement elements After modifying the memory source, the modification authority of the memory source is restored, and forbids modifying to the memory source.
7. the platform as described in claims 1 to 3 is any, which is characterized in that further include:
Module hidden unit, for hiding the network reinforcement elements.
8. a kind of IaaS method characterized by comprising
When detecting that client domain virtual machine user executes autonomous network configuration operations, the autonomous network configuration operations are intercepted; And
Page table, which is sent, to virtual machine monitor modifies service request;And
The page table modification service response instruction sent according to the virtual machine monitor received, to the client domain of interception The autonomous network configuration operations of virtual machine user are handled.
9. method according to claim 8, which is characterized in that the autonomous network configuration operations include:
Off permanently or temporarily modification to network profile.
10. method as claimed in claim 9, which is characterized in that network profile, comprising:
The internet protocol address of client domain virtual machine;And/or
The MAC address of client domain virtual machine.
11. the method as described in claim 8~10 is any, which is characterized in that autonomous being executed to client domain virtual machine user Before network configuration operations detection, further includes:
Registration is for requesting to execute the network environment that autonomous network configuration operations are detected to client domain virtual machine user.
12. method as claimed in claim 11, which is characterized in that registration executes certainly client domain virtual machine user for requesting The network environment that master network configuration operation is detected, comprising:
Memory source operation requests are sent to virtual machine monitor;And
Receive the memory source operation response message that the virtual machine monitor is sent;
According to the memory setting permission in memory source operation response message, the memory source is modified.
13. the method as described in claim 8~10 is any, which is characterized in that further include:
It hides for requesting to execute the network environment that autonomous network configuration operations are detected to client domain virtual machine user.
14. a kind of IaaS method characterized by comprising
It receives page table and modifies service request;And
Service request is modified according to the page table and determines subsystem call table, modifies network reinforcement elements to the subsystem call table pair The page table entry operating right answered;And
Page table modification service response instruction is sent, the page table modification service that instruction is sent according to the virtual machine monitor received is rung It should instruct, the autonomous network configuration operations of the client domain virtual machine user of interception are handled.
15. method as claimed in claim 14, which is characterized in that before receiving page table modification service request, further includes:
Receive memory source operation requests;And
According to the memory source operation requests, the modification authority to memory source is set;And
It sends memory source and operates response message.
16. method as claimed in claim 15, which is characterized in that after sending memory source operation response message, also wrap It includes:
The modification authority of the memory source is restored, and forbids modifying to the memory source.
CN201510024893.8A 2015-01-19 2015-01-19 A kind of IaaS management platform and method Active CN105871942B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510024893.8A CN105871942B (en) 2015-01-19 2015-01-19 A kind of IaaS management platform and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510024893.8A CN105871942B (en) 2015-01-19 2015-01-19 A kind of IaaS management platform and method

Publications (2)

Publication Number Publication Date
CN105871942A CN105871942A (en) 2016-08-17
CN105871942B true CN105871942B (en) 2019-03-22

Family

ID=56622689

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510024893.8A Active CN105871942B (en) 2015-01-19 2015-01-19 A kind of IaaS management platform and method

Country Status (1)

Country Link
CN (1) CN105871942B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109002354B (en) * 2017-06-07 2022-05-03 中国科学院信息工程研究所 OpenStack-based computing resource capacity elastic expansion method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103167041A (en) * 2013-03-28 2013-06-19 广州中国科学院软件应用技术研究所 System and method for supporting cloud environment application cluster automation deployment
CN103457974A (en) * 2012-06-01 2013-12-18 中兴通讯股份有限公司 Safety control method and device for virtual machine mirror images
CN103746823A (en) * 2011-12-31 2014-04-23 华茂云天科技(北京)有限公司 Resource management and operation system
CN103870749A (en) * 2014-03-20 2014-06-18 中国科学院信息工程研究所 System and method for implementing safety monitoring of virtual machine system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10445121B2 (en) * 2012-02-23 2019-10-15 Red Hat Inc. Building virtual machine disk images for different cloud configurations from a single generic virtual machine disk image

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103746823A (en) * 2011-12-31 2014-04-23 华茂云天科技(北京)有限公司 Resource management and operation system
CN103457974A (en) * 2012-06-01 2013-12-18 中兴通讯股份有限公司 Safety control method and device for virtual machine mirror images
CN103167041A (en) * 2013-03-28 2013-06-19 广州中国科学院软件应用技术研究所 System and method for supporting cloud environment application cluster automation deployment
CN103870749A (en) * 2014-03-20 2014-06-18 中国科学院信息工程研究所 System and method for implementing safety monitoring of virtual machine system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
IaaS模式下虚拟机部署机制研究;曹伟杰;《计算机技术与发展》;20121031;全文

Also Published As

Publication number Publication date
CN105871942A (en) 2016-08-17

Similar Documents

Publication Publication Date Title
CN110612512B (en) Protecting virtual execution environments
US10956184B2 (en) On-demand disposable virtual work system
Berger et al. TVDc: managing security in the trusted virtual datacenter
US9935971B2 (en) Mitigation of virtual machine security breaches
US9503475B2 (en) Self-adaptive and proactive virtual machine images adjustment to environmental security risks in a cloud environment
US10540499B2 (en) Method for monitoring the security of a virtual machine in a cloud computing architecture
CN106384045B (en) Android storage application sandbox based on application program virtualization and communication method
RU2462747C2 (en) Protection of operating system resources
US8380987B2 (en) Protection agents and privilege modes
KR100938521B1 (en) Method, apparatus and system for enabling a secure location-aware platform
CN104331375B (en) Shared virtual resource management method under shared virtualization resource pool environment and device
JP2010514028A (en) A system that enables multiple execution environments to share a single data process
JP2007220086A (en) Input/output controller, input/output control system, and input/output control method
CN111880891B (en) Extensible virtual machine monitor based on microkernel and embedded system
US20160162685A1 (en) Monitoring application execution in a clone of a virtual computing instance for application whitelisting
CN108509251A (en) A kind of safety virtualization system suitable for credible performing environment
CN108549571A (en) A kind of safety virtualization method suitable for credible performing environment
CN104036185A (en) Virtualization based power and function isolating method for loading module of monolithic kernel operation system
TWI772747B (en) Computer implement method, computer system and computer program product for injecting interrupts and exceptions into secure virtual machine
US9697027B1 (en) Hypercall-based security for hypervisors
JP4576449B2 (en) Switch device and copy control method
WO2017036376A1 (en) Data access method, code calling method, and virtual machine monitor
CN105871942B (en) A kind of IaaS management platform and method
WO2016037650A1 (en) Memory privilege
CN115576626A (en) Method, device and storage medium for safe mounting and dismounting of USB (Universal Serial bus) device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant