CN106844144A - A kind of secure virtual machine monitoring method - Google Patents

A kind of secure virtual machine monitoring method Download PDF

Info

Publication number
CN106844144A
CN106844144A CN201611241724.0A CN201611241724A CN106844144A CN 106844144 A CN106844144 A CN 106844144A CN 201611241724 A CN201611241724 A CN 201611241724A CN 106844144 A CN106844144 A CN 106844144A
Authority
CN
China
Prior art keywords
virtual machine
machine
monitoring
packet
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201611241724.0A
Other languages
Chinese (zh)
Inventor
曹蕊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Kai Yao Asset Management Co Ltd
Original Assignee
Guangzhou Kai Yao Asset Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Kai Yao Asset Management Co Ltd filed Critical Guangzhou Kai Yao Asset Management Co Ltd
Priority to CN201611241724.0A priority Critical patent/CN106844144A/en
Publication of CN106844144A publication Critical patent/CN106844144A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/301Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is a virtual computing platform, e.g. logically partitioned systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45583Memory management, e.g. access or allocation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances

Abstract

The present invention relates to server virtualization and the technical field of virtual machine monitoring, and in particular to a kind of secure virtual machine monitoring method, comprise the following steps:S1, configures the operational factor of virtual machine network, and virtual machine network includes dummy machine system and external network;Dummy machine system includes monitor of virtual machine and at least one virtual machine;S2, configures the security monitoring strategy of monitor of virtual machine;S3, the packet communicated between capture virtual machine or between virtual machine and external network;S4, parses packet, security control is carried out to respective virtual machine according to security monitoring strategy, and monitoring process and result are shown in customer terminal webpage.The present invention solves that virtual machine committed memory is excessive by setting up the security strategy that is associated with dummy machine system for carrying out the management of virtual machine, and the system card for causing is waited indefinitely problem;By the way of internal control and outside monitoring are combined, the efficiency of virtual machine monitoring is improve, it is ensured that the safe and highly efficient operation of dummy machine system.

Description

A kind of secure virtual machine monitoring method
Technical field
The present invention relates to server virtualization and the technical field of virtual machine monitoring, and in particular to a kind of secure virtual machine prison Prosecutor method.
Background technology
At present, the terminal device such as computer often occurs the increasingly slower situation of the speed of service in use, this When, in order to improve the speed of service, it is necessary to carry out system optimization to it.Existing optimal way generally by file clean-up or The method of garbage-cleaning, for example, cache file useless in cleaning system, search and mobile file for taking disk space etc., So as to Free up Memory, allow system to keep cleaning, make overall operation more smooth.
But, existing some services and applications will not generally automatically exit from process after execution, and these processes according to Substantial amounts of system resource can so be taken, user cannot often perceive, until system or program occur in that it is stuck in addition collapse Situation.Existing system optimization mode can only carry out some basic file clean-up work, stuck for system, and backstage Situations such as program took various flow then cannot effectively be processed, it is impossible to effectively available internal memory and other systems in release system Resource etc..
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome above mentioned problem or at least in part solve on A kind of secure virtual machine monitoring method of problem is stated, is comprised the following steps:
S1, configures the operational factor of virtual machine network, and the virtual machine network includes dummy machine system and external network;Institute Stating dummy machine system includes monitor of virtual machine and at least one virtual machine;
S2, configures the security monitoring strategy of monitor of virtual machine;
S3, the packet communicated between capture virtual machine or between virtual machine and external network;
S4, parses the packet, and security control is carried out to respective virtual machine according to the security monitoring strategy, and in visitor Family end page is shown in face of monitoring process and result.
Preferably, the security monitoring strategy in the step S2 is specially:Set up intrusion detection domain, Provisioning Policy module, Various security strategies are configured in the policy module, the policy module is connected with policy framework, it is right that the policy framework is used for The request of operating system interface is responded.
Preferably, the step S2 also includes:The packet of virtual switch port is entered using network counter group Row monitoring;And using the internal control and the outside based on control point in monitor of virtual machine driven safely based on virtual machine kernel The monitor mode that monitoring is combined.
Preferably, the step S3 is specially:Row buffering is entered to packet by virtual switch storehouse, in virtual switch The packet communicated between virtual machine or between virtual machine and external network is checked and captured in storehouse.
Preferably, the packet is captured using Hook Mechanism, specially:Global hook is created, will be described complete Office's hook adds globally shared data variable, creates hook executable program and captures the packet.
Preferably, the security control is specially the one kind or many in internal memory protection, kernel code protection and access control Kind.
Preferably, the security monitoring strategy in the step S2 is specially:To normal procedure in the dummy machine system Data set up finite automaton state machine, correlation function are called as state with the dummy machine system, then to being detected process Packet be monitored, call correlation function to be contrasted with the state in finite state machine the dummy machine system, such as Fruit matches then current process safety, and otherwise current process has been infected.
The present invention is used to carry out the management of virtual machine by setting up the security strategy associated with dummy machine system, effectively solves Virtual machine committed memory is excessive, and the system card that causes is waited indefinitely problem;And various security strategies are configured with, and set up Hook Mechanism Packet to virtual machine is captured, the monitor mode being combined using internal control and outside monitoring, substantially increases void Intend the efficiency of machine monitoring, it is ensured that the safe and highly efficient operation of dummy machine system.
Described above is only the general introduction of technical solution of the present invention, in order to better understand technological means of the invention, And can be practiced according to the content of specification, and in order to allow the above and other objects of the present invention, feature and advantage can Become apparent, be exemplified below specific embodiment of the invention.
According to the accompanying drawings to the detailed description of the specific embodiment of the invention, those skilled in the art will be brighter Of the invention above-mentioned and other purposes, advantages and features.
Brief description of the drawings
Fig. 1 is the corresponding system structure diagram of secure virtual machine monitoring method of the invention.
Specific embodiment
Exemplary embodiment disclosed by the invention is more fully described below with reference to accompanying drawings.Although showing this in accompanying drawing The exemplary embodiment of disclosure of the invention, it being understood, however, that may be realized in various forms the disclosure without that should be explained here The embodiment stated is limited.Conversely, there is provided these embodiments are able to thoroughly understand the disclosure, and can be by this public affairs The scope opened it is complete convey to those skilled in the art.
As shown in figure 1, the corresponding system structure diagram of secure virtual machine monitoring method of the invention.The virtual machine network Including:External network, hardware layer, operating system layer, virtual machine layer;By hardware layer, operating system layer and the common structure of virtual machine layer Into dummy machine system;Dummy machine system is connected with external network;Operating system has monitor of virtual machine, virtual machine layer operation There are multiple virtual machines.
With the virtual machine network system to corresponding, there is provided a kind of secure virtual machine monitoring method, comprise the following steps:
S1, configures the operational factor of virtual machine network, and the virtual machine network includes dummy machine system and external network;Institute Stating dummy machine system includes monitor of virtual machine and at least one virtual machine;
S2, configures the security monitoring strategy of monitor of virtual machine;
S3, the packet communicated between capture virtual machine or between virtual machine and external network;
S4, parses the packet, and security control is carried out to respective virtual machine according to the security monitoring strategy, and in visitor Family end page is shown in face of monitoring process and result.
Because the virtual machine network system is configured with security strategy, the single monitoring side of conventional virtual machine system is overcome Formula, security performance is higher.And the security strategy can be adjusted dynamically, flexibility is stronger.It is also possible to using neutral net etc. Intelligent algorithm is trained and optimizes.It should be noted that above-mentioned several security strategies both provide it is different types of excellent Change method, can optional one of which or several for the present invention.
Used as a kind of implementation method, the security strategy in step S2 is specially:Set up intrusion detection domain, Provisioning Policy mould Block, configures various security strategies in the policy module, the policy module is connected with policy framework, and the policy framework is used for Request to operating system interface is responded.Policy module contains policy library, Policy Decision Point and Policy Enforcement Point.Strategy is determined Pinpoint for response policy event, and lock corresponding policing rule;The validity check of completion status and resource;Will be stored in The form that policing rule conversion forming apparatus in policy library can perform.Policy Enforcement Point, is distributed on each network node, is responsible for Corresponding tactical management operation is performed according to the strategy received from Policy Decision Point, and simultaneously by the result of strategy execution Offer Policy Decision Point.The wherein tactful mode that issues is divided into two kinds, outsourcing mode and method of supplying.
Used as a kind of implementation method, step S3 is specially:Using network counter group to the number of virtual switch port It is monitored according to bag;Packet in virtual switch storehouse to being communicated between virtual machine or between virtual machine and external network Checked and captured.
Used as a kind of implementation method, monitoring is specially based on the internal control of virtual machine kernel safety driving and based on virtual The monitor mode that the outside monitoring of control point is combined in machine manager.The monitoring method that the inside is combined with outside, specifically Including:Start outside monitoring programme, and automated procedures are started by the outside monitoring programme;By outside monitoring programme to described Automated procedures are monitored;Internal control program and execution thread are opened by automated procedures;By internal control program to institute Execution thread is stated to be monitored.
As a kind of implementation method, the packet is captured using Hook Mechanism;Specially:Create global hook Son, globally shared data variable is added by the global hook, is created hook executable program and is captured the packet.Monitor single Unit can capture the packet in watch-dog core network stack, such as opening based on linux kernel by hook (hook) mechanism The virtualization software of increasing income of source virtual platform has carried hook mechanism, such as Xen, and KVM both provides a set of being based on The Hook Mechanism of Netfilter.Thus, the method goes for various Katyuan virtualization softwares, and packet packet capturing Journey can be circulated to be carried out.
Used as a kind of implementation method, the security control in step S4 is specially internal memory protection, kernel code protection and accesses One or more in control.Shadow page can be set up in above-mentioned security control process, so that attack code is confused, in malice generation Malicious operation is directed to shadow page when attacking system by code, effectively prevent the malice of normal operation code is distorted with Replicate.
Used as a kind of implementation method, the security strategy in step S2 is specially:Data to normal procedure in system are set up Finite automaton state machine, calls correlation function as state with system, and then the packet for being detected process is monitored, will Its system calls correlation function to be contrasted with the state in finite state machine, if matching if current process safety, otherwise when Preceding process has been infected.Finite automaton state machine possesses the state of finite number amount, and each state can move to zero or many Individual state, input word string determines to perform the migration of that state.Finite automaton is set up by the data to normal procedure in system State machine, realizes the effective monitoring to packet.
The present invention is used to carry out the management of virtual machine by setting up the security strategy associated with dummy machine system, effectively solves Virtual machine committed memory is excessive, and the system card that causes is waited indefinitely problem;And various security strategies are configured with, and set up Hook Mechanism Packet to virtual machine is captured, the monitor mode being combined using internal control and outside monitoring, substantially increases void Intend the efficiency of machine monitoring, it is ensured that the safe and highly efficient operation of dummy machine system.
Although embodiments of the invention are described above, it should be understand that its mode unrestricted only by example Presented.It is therefore preferable that the width and scope of embodiment should not be by mentioned earlier any one exemplary embodiment limited, and answer Limited according only to ensuing claim and its equivalent.

Claims (7)

1. a kind of secure virtual machine monitoring method, it is characterised in that comprise the following steps:
S1, configures the operational factor of virtual machine network, and the virtual machine network includes dummy machine system and external network;The void Plan machine system includes monitor of virtual machine and at least one virtual machine;
S2, configures the security monitoring strategy of monitor of virtual machine;
S3, the packet communicated between capture virtual machine or between virtual machine and external network;
S4, parses the packet, and security control is carried out to respective virtual machine according to the security monitoring strategy, and in client The page shows to monitoring process and result.
2. method according to claim 1, it is characterised in that the security monitoring strategy in the step S2 is specially:Build Vertical intrusion detection domain, Provisioning Policy module configures various security strategies, the policy module and tactful frame in the policy module Frame is connected, and the policy framework is used to respond the request of operating system interface.
3. method according to claim 1, it is characterised in that the step S2 also includes:Using network counter group Packet to virtual switch port is monitored;And using the internal control driven safely based on virtual machine kernel and be based on The monitor mode that the outside monitoring of control point is combined in monitor of virtual machine.
4. method according to claim 1, it is characterised in that the step S3 is specially:By virtual switch storehouse pair Packet enters row buffering, the data in virtual switch storehouse to being communicated between virtual machine or between virtual machine and external network Bag is checked and captured.
5. the method according to claim 1 or 4, it is characterised in that captured to the packet using Hook Mechanism, Specially:Global hook is created, the global hook is added into globally shared data variable, create the capture of hook executable program The packet.
6. method according to claim 1, it is characterised in that the security control is specially internal memory protection, kernel code One or more in protection and access control.
7. method according to claim 1, it is characterised in that the security monitoring strategy in the step S2 is specially:It is right The data of normal procedure set up finite automaton state machine in the dummy machine system, and correlation function is called with the dummy machine system As state, then the packet for being detected process is monitored, by the dummy machine system call correlation function with it is limited State in state machine is contrasted, and the current process safety if matching, otherwise current process has been infected.
CN201611241724.0A 2016-12-29 2016-12-29 A kind of secure virtual machine monitoring method Withdrawn CN106844144A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611241724.0A CN106844144A (en) 2016-12-29 2016-12-29 A kind of secure virtual machine monitoring method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611241724.0A CN106844144A (en) 2016-12-29 2016-12-29 A kind of secure virtual machine monitoring method

Publications (1)

Publication Number Publication Date
CN106844144A true CN106844144A (en) 2017-06-13

Family

ID=59113280

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611241724.0A Withdrawn CN106844144A (en) 2016-12-29 2016-12-29 A kind of secure virtual machine monitoring method

Country Status (1)

Country Link
CN (1) CN106844144A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109412831A (en) * 2018-08-29 2019-03-01 无锡华云数据技术服务有限公司 A kind of method and cloud platform based on FSM management virtual port

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103354530A (en) * 2013-07-18 2013-10-16 北京启明星辰信息技术股份有限公司 Virtualization network boundary data flow gathering method and apparatus
CN103457945A (en) * 2013-08-28 2013-12-18 中国科学院信息工程研究所 Intrusion detection method and system
CN103870749A (en) * 2014-03-20 2014-06-18 中国科学院信息工程研究所 System and method for implementing safety monitoring of virtual machine system
CN104113522A (en) * 2014-02-20 2014-10-22 西安未来国际信息股份有限公司 Design of virtual firewall assembly acting on cloud computing data center security domain
CN105337789A (en) * 2014-08-12 2016-02-17 北京启明星辰信息安全技术有限公司 Method and device for monitoring flow of virtual network
CN105635035A (en) * 2014-10-27 2016-06-01 青岛金讯网络工程有限公司 Method for monitoring flow of virtual machine

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103354530A (en) * 2013-07-18 2013-10-16 北京启明星辰信息技术股份有限公司 Virtualization network boundary data flow gathering method and apparatus
CN103457945A (en) * 2013-08-28 2013-12-18 中国科学院信息工程研究所 Intrusion detection method and system
CN104113522A (en) * 2014-02-20 2014-10-22 西安未来国际信息股份有限公司 Design of virtual firewall assembly acting on cloud computing data center security domain
CN103870749A (en) * 2014-03-20 2014-06-18 中国科学院信息工程研究所 System and method for implementing safety monitoring of virtual machine system
CN105337789A (en) * 2014-08-12 2016-02-17 北京启明星辰信息安全技术有限公司 Method and device for monitoring flow of virtual network
CN105635035A (en) * 2014-10-27 2016-06-01 青岛金讯网络工程有限公司 Method for monitoring flow of virtual machine

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109412831A (en) * 2018-08-29 2019-03-01 无锡华云数据技术服务有限公司 A kind of method and cloud platform based on FSM management virtual port

Similar Documents

Publication Publication Date Title
US11652852B2 (en) Intrusion detection and mitigation in data processing
CN110545260B (en) Cloud management platform construction method based on mimicry structure
US9838415B2 (en) Fight-through nodes for survivable computer network
US9769250B2 (en) Fight-through nodes with disposable virtual machines and rollback of persistent state
US9166988B1 (en) System and method for controlling virtual network including security function
US11522904B2 (en) Self-healing architecture for resilient computing services
CN103870749B (en) A kind of safety monitoring system and method for realizing dummy machine system
CN102999716B (en) virtual machine monitoring system and method
WO2016160599A1 (en) System and method for threat-driven security policy controls
CN112671807B (en) Threat processing method, threat processing device, electronic equipment and computer readable storage medium
WO2018027226A1 (en) Detection mitigation and remediation of cyberattacks employing an advanced cyber-decision platform
US20160110544A1 (en) Disabling and initiating nodes based on security issue
CN107797859A (en) A kind of dispatching method of timed task and a kind of dispatch server
Ariffin et al. API vulnerabilities in cloud computing platform: attack and detection
CN105245336B (en) A kind of file encryption management system
CN106844144A (en) A kind of secure virtual machine monitoring method
US20050076236A1 (en) Method and system for responding to network intrusions
CN103139169A (en) Virus detection system and method based on network behavior
CN115086081B (en) Escape prevention method and system for honeypots
CN111258712B (en) Method and system for protecting safety of virtual machine under virtual platform network isolation
WO2022141340A1 (en) Method and apparatus for determining dependency between application services, and processor
US20220006819A1 (en) Detection of malicious C2 channels abusing social media sites
CN110958267B (en) Method and system for monitoring threat behaviors in virtual network
CN109218315A (en) A kind of method for managing security and security control apparatus
US20240086522A1 (en) Using thread patterns to identify anomalous behavior

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20170613