CN109918173B - Openstack-based virtual machine health check method and system - Google Patents
Openstack-based virtual machine health check method and system Download PDFInfo
- Publication number
- CN109918173B CN109918173B CN201910168782.2A CN201910168782A CN109918173B CN 109918173 B CN109918173 B CN 109918173B CN 201910168782 A CN201910168782 A CN 201910168782A CN 109918173 B CN109918173 B CN 109918173B
- Authority
- CN
- China
- Prior art keywords
- virus
- virtual machine
- library
- killing
- virus library
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 24
- 230000036541 health Effects 0.000 title claims abstract description 14
- 241000700605 Viruses Species 0.000 claims abstract description 228
- 230000004913 activation Effects 0.000 claims description 4
- 230000006855 networking Effects 0.000 abstract description 2
- 238000001514 detection method Methods 0.000 description 3
- 238000006467 substitution reaction Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000002955 isolation Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
- 238000004880 explosion Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Debugging And Monitoring (AREA)
Abstract
The invention provides a virtual machine health check method and system based on openstack, which comprises the following steps: creating a virus library on an openstack platform; binding the virus library to the firewall rules; and (5) virus searching and killing is carried out on the virtual machine on the openstack platform. The system comprises a virus library creating module, a virus library binding module and a virus searching and killing module. The virus searching and killing method and the virus searching and killing device can be used for searching and killing the virus of the virtual machine without logging in the virtual machine on the openstack platform, so that the normal use of a user is not influenced, meanwhile, the virus is found and processed in time, and the efficiency is improved; according to different network requirements, the invention utilizes the virus library template to generate different virus library examples, thereby realizing different networking processing of virus characteristics; the invention improves the safety of the virtual machine in the cloud environment.
Description
Technical Field
The invention belongs to the field of virtual machine health detection, and particularly relates to a virtual machine health check method and system based on openstack.
Background
The OpenStack is an open-source cloud computing management platform project, and is formed by combining several main components to complete specific work. OpenStack supports almost all types of cloud environments, and the project aims to provide a cloud computing management platform which is simple to implement, can be expanded in a large scale, is rich and has a unified standard.
A Virtual Machine (Virtual Machine) refers to a complete computer system with complete hardware system functionality, operating in a completely isolated environment, simulated by software.
The virtual system has the same functions as a real windows system by generating a brand new virtual mirror image of the existing operating system, all operations are carried out in the brand new independent virtual system after the virtual system is accessed, running software can be independently installed, data can be stored, an independent desktop is owned, any influence on the real system cannot be caused, and the operating system has the operating system capable of flexibly switching between the existing system and the virtual mirror image. The Virtual system and the traditional Virtual machine (Parallels Desktop, Vmware, Virtual box, Virtual pc) are different in that: the virtual system does not reduce the performance of the computer, the virtual system is started without consuming time like starting a windows system, and the program is operated more conveniently and quickly; the virtual system can only simulate the same environment as the existing operating system, and the virtual machine can simulate other operating systems; moreover, virtual machines need to emulate underlying hardware instructions, and are therefore much slower in application execution speed than virtual systems.
With the increase of information explosion, the cloud platform gets more and more attention, and OpenStack is favored by many companies as a source cloud computing management platform, but in the aspect of virus detection of virtual machines, there is no systematic method, and if a virtual machine is poisoned due to misoperation of a user during the use of the virtual machine, the virtual machine is easily disabled and viruses are infected to other virtual machines.
Therefore, it is very necessary to provide a virtual machine health check method and system based on openstack to solve the above-mentioned drawbacks in the prior art.
Disclosure of Invention
Aiming at the aspect of virus detection of the virtual machine in the prior art, the virtual machine health check method and system based on openstack are provided to solve the technical problems that in the using process of the virtual machine, if the virtual machine is poisoned due to misoperation of a user, the virtual machine cannot be used and the virus is infected to other virtual machines.
In a first aspect, the invention provides a virtual machine health check method based on openstack, which includes the following steps:
s1, creating a virus library on an openstack platform;
s2, binding the virus library to a firewall rule;
and S3, virus searching and killing are carried out on the virtual machine on the openstack platform. The virus searching and killing method and the virus searching and killing device can search and kill the viruses of the virtual machine through the openstack platform without logging in the virtual machine, and the normal use of the virtual machine is not influenced.
Further, the step S1 specifically includes the following steps:
s11, creating a virus library on an openstack platform;
s12, setting a characteristic item for each virus in a virus library;
and S13, updating the virus library regularly. The latest virus is obtained by updating the virus library regularly, thereby providing timeliness of virus killing and preventing lag.
Further, the virus characteristic item includes whether to activate and an operation state. Virus library characteristic items include, but are not limited to, the items described above.
Further, the step S2 specifically includes the following steps:
s21, creating a virus library template;
s22, generating a virus library example by adopting a virus library template according to the safety requirements of different network segments, and setting a characteristic item of each virus in the virus library example;
s23, applying all virus library examples to a firewall;
and S24, setting a firewall strategy, and performing virus checking and killing on the virtual machine by the firewall according to the network segment where the virtual machine is located by adopting the corresponding virus library example. When the virus library instance is generated, the characteristics of the viruses in the virus library template can be modified according to requirements, and the virus library diversity requirements of different networks are met.
Further, the step S3 specifically includes the following steps:
s31, setting a virus searching and killing period;
s32, starting virus searching and killing on the virtual machine on an openstack platform according to a set virus searching and killing period;
s33, sequentially obtaining a network segment where each virtual machine is located;
and S34, the firewall performs virus checking and killing on the virtual machine by adopting a corresponding virus library example according to the network segment where the virtual machine is located. The virus searching and killing is carried out on the virtual machines at regular time on the openstack platform, and meanwhile, the virtual machines in different network segments adopt different virus searching and killing standards and are set in advance according to requirements.
Further, step S32 is preceded by:
s32', selecting a network segment and creating a virtual machine. When the virtual machine is created, the network segment where the virtual machine is located is selected firstly, so that the virus searching and killing standard of the virtual machine is indirectly selected.
In a second aspect, the present invention provides an openstack-based virtual machine health check system, including:
the virus library creating module is used for creating a virus library on the openstack platform;
the virus library binding module is used for binding the virus library to the firewall rules;
and the virus searching and killing module is used for searching and killing viruses in the virtual machine on the openstack platform.
Further, the virus library creation module comprises:
the virus library creating unit is used for creating a virus library on the openstack platform;
the characteristic item setting unit is used for setting a characteristic item for each virus in the virus library;
and the virus library updating unit is used for updating the virus library at regular time.
Further, the virus library binding module comprises:
the virus library template creating unit is used for creating a virus library template;
the virus library instance generating unit is used for generating a virus library instance by adopting a virus library template according to the safety requirements of different network segments and setting the characteristic item of each virus in the virus library instance;
the virus library instance application unit is used for applying all virus library instances to the firewall;
and the firewall strategy setting unit is used for setting a firewall strategy, and the firewall adopts a corresponding virus library example according to the network segment where the virtual machine is located to check and kill the virus of the virtual machine.
Further, the virus searching and killing module comprises:
a searching and killing period setting unit for setting a virus searching and killing period;
the virus searching and killing starting unit is used for starting virus searching and killing on the virtual machine on the openstack platform according to the set virus searching and killing period;
the virtual machine network segment acquisition unit is used for sequentially acquiring the network segment where each virtual machine is located;
and the virus searching and killing unit is used for configuring the firewall to search and kill the viruses of the virtual machine by adopting the corresponding virus library example according to the network segment where the virtual machine is positioned.
The beneficial effect of the invention is that,
the virus searching and killing method and the virus searching and killing device can be used for searching and killing the virus of the virtual machine without logging in the virtual machine on the openstack platform, so that the normal use of a user is not influenced, meanwhile, the virus is found and processed in time, and the efficiency is improved; according to different network requirements, the invention utilizes the virus library template to generate different virus library examples, thereby realizing different networking processing of virus characteristics; the invention improves the safety of the virtual machine in the cloud environment.
In addition, the invention has reliable design principle, simple structure and very wide application prospect.
Therefore, compared with the prior art, the invention has prominent substantive features and remarkable progress, and the beneficial effects of the implementation are also obvious.
Drawings
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present invention, the drawings used in the description of the embodiments or prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
FIG. 1 is a first flowchart of a method of the present invention;
FIG. 2 is a flow chart of the method of the present invention;
FIG. 3 is a schematic diagram of the system of the present invention;
in the figure, 1-virus library creation module; 1.1-virus library creation unit; 1.2-feature item setting unit; 1.3-virus library updating unit; 2-virus library binding module; 2.1-virus library template creating unit; 2.2-virus library instance generation unit; 2.3-virus library instance application unit; 2.4-firewall policy setting unit; 3-virus searching and killing module; 3.1-a killing period setting unit; 3.2-a searching and killing starting unit; 3.3-a virtual machine network segment acquisition unit; 3.4-virus killing unit.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the drawings in the embodiment of the present invention, and it is obvious that the described embodiment is only a part of the embodiment of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1:
as shown in fig. 1, the present invention provides a health check method for a virtual machine based on openstack, which includes the following steps:
s1, creating a virus library on an openstack platform; the platform is provided with a port, a tester can set the update time and the virus characteristic items of a virus library through the port, and the virus library comprises a network type virus characteristic code;
s2, binding the virus library to a firewall rule; performing primary isolation and primary early warning on activated viruses in the firewall rules, and performing secondary isolation and secondary early warning on inactivated viruses; the operation state of the virus comprises isolating files containing the virus and deleting files containing the virus, and a tester sets the operation state in a certain virus characteristic item through a port;
s3, virus checking and killing are carried out on the virtual machine on the openstack platform; and scanning the virtual machine on an openstack platform, comparing the network type virus feature codes in the virus library with the virtual machine data, and checking and killing the viruses after the viruses are determined. The virus searching and killing method and the virus searching and killing device can search and kill the viruses of the virtual machine through the openstack platform without logging in the virtual machine, and the normal use of the virtual machine is not influenced.
Example 2:
as shown in fig. 1 and fig. 2, the present invention provides a health check method for a virtual machine based on openstack, which includes the following steps:
s1, creating a virus library on an openstack platform; the method comprises the following specific steps:
s11, creating a virus library on an openstack platform;
s12, setting a characteristic item for each virus in a virus library; the virus characteristic item comprises activation or non-activation and operation state;
s13, updating the virus database at regular time;
s2, binding the virus library to a firewall rule; the method comprises the following specific steps:
s21, creating a virus library template;
s22, generating a virus library example by adopting a virus library template according to the safety requirements of different network segments, and setting a characteristic item of each virus in the virus library example;
s23, applying all virus library examples to a firewall;
s24, setting a firewall strategy, and performing virus checking and killing on the virtual machine by the firewall according to the network segment where the virtual machine is located by adopting a corresponding virus library example;
s3, virus checking and killing are carried out on the virtual machine on the openstack platform; the method comprises the following specific steps:
s31, setting a virus searching and killing period;
s32', selecting a network segment, and creating a virtual machine;
s32, starting virus searching and killing on the virtual machine on an openstack platform according to a set virus searching and killing period;
s33, sequentially obtaining a network segment where each virtual machine is located;
and S34, the firewall performs virus checking and killing on the virtual machine by adopting a corresponding virus library example according to the network segment where the virtual machine is located.
The latest virus is obtained by updating the virus library regularly, so that the timeliness of virus searching and killing is provided, and hysteresis is prevented; when a virtual machine is created, firstly, a network segment where the virtual machine is located is selected, so that the virus searching and killing standard of the virtual machine is indirectly selected; when the virus library instance is generated, the characteristics of the viruses in the virus library template can be modified according to requirements, so that the virus library diversity requirements of different networks are met; the virus searching and killing is carried out on the virtual machines at regular time on the openstack platform, and meanwhile, the virtual machines in different network segments adopt different virus searching and killing standards and are set in advance according to requirements.
Example 3:
as shown in fig. 3, the present invention provides an openstack-based virtual machine health check system, including:
the virus library creating module 1 is used for creating a virus library on an openstack platform; the virus library creation module 1 includes:
the virus library creating unit 1.1 is used for creating a virus library on an openstack platform;
a characteristic item setting unit 1.2, which is used for setting a characteristic item for each virus in the virus library;
the virus library updating unit 1.3 is used for updating the virus library at regular time;
the virus library binding module 2 is used for binding the virus library to the firewall rules; the virus library binding module 2 comprises:
the virus library template creating unit 2.1 is used for creating a virus library template;
a virus library example generating unit 2.2, configured to generate a virus library example by using a virus library template according to security requirements of different network segments, and set a feature item of each virus in the virus library example;
a virus library instance application unit 2.3 for applying all virus library instances to the firewall;
the firewall policy setting unit 2.4 is used for setting a firewall policy, and the firewall performs virus checking and killing on the virtual machine by adopting a corresponding virus library example according to the network segment where the virtual machine is located;
the virus searching and killing module 3 is used for searching and killing viruses in the virtual machine on the openstack platform; the virus searching and killing module 3 comprises:
a searching and killing period setting unit 3.1 for setting a virus searching and killing period;
the searching and killing starting unit 3.2 is used for starting virus searching and killing on the virtual machine on the openstack platform according to the set virus searching and killing period;
a virtual machine network segment obtaining unit 3.3, configured to sequentially obtain a network segment where each virtual machine is located;
and the virus searching and killing unit 3.4 is used for configuring the firewall to search and kill the viruses of the virtual machine by adopting the corresponding virus library example according to the network segment where the virtual machine is positioned.
Although the present invention has been described in detail by referring to the drawings in connection with the preferred embodiments, the present invention is not limited thereto. Various equivalent modifications or substitutions can be made on the embodiments of the present invention by those skilled in the art without departing from the spirit and scope of the present invention, and these modifications or substitutions are within the scope of the present invention/any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (2)
1. A virtual machine health check method based on openstack is characterized by comprising the following steps:
s1, creating a virus library on an openstack platform; the method comprises the following specific steps:
s11, creating a virus library on an openstack platform;
s12, setting a characteristic item for each virus in a virus library; the virus characteristic item comprises activation or non-activation and operation state;
s13, updating the virus database at regular time;
s2, binding the virus library to a firewall rule; the method comprises the following specific steps:
s21, creating a virus library template;
s22, generating a virus library example by adopting a virus library template according to the safety requirements of different network segments, and setting a characteristic item of each virus in the virus library example;
s23, applying all virus library examples to a firewall;
s24, setting a firewall strategy, and performing virus checking and killing on the virtual machine by the firewall according to the network segment where the virtual machine is located by adopting a corresponding virus library example;
s3, virus checking and killing are carried out on the virtual machine on the openstack platform; the method comprises the following specific steps:
s31, setting a virus searching and killing period;
s32', selecting a network segment, and creating a virtual machine;
s32, starting virus searching and killing on the virtual machine on an openstack platform according to a set virus searching and killing period;
s33, sequentially obtaining a network segment where each virtual machine is located;
and S34, the firewall performs virus checking and killing on the virtual machine by adopting a corresponding virus library example according to the network segment where the virtual machine is located.
2. An openstack-based virtual machine health check system, comprising:
the virus library creating module (1) is used for creating a virus library on an openstack platform; the virus library creation module (1) includes:
the virus library creating unit (1.1) is used for creating a virus library on an openstack platform;
a characteristic item setting unit (1.2) for setting a characteristic item for each virus in the virus library;
a virus library updating unit (1.3) for updating the virus library at regular time;
the virus library binding module (2) is used for binding the virus library to the firewall rules; the virus library binding module (2) comprises:
a virus library template creating unit (2.1) for creating a virus library template;
the virus library instance generating unit (2.2) is used for generating a virus library instance by adopting a virus library template according to the security requirements of different network segments and setting the characteristic item of each virus in the virus library instance;
a virus library instance application unit (2.3) for applying all virus library instances to the firewall;
the firewall policy setting unit (2.4) is used for setting a firewall policy, and the firewall adopts a corresponding virus library example according to the network segment where the virtual machine is located to check and kill viruses for the virtual machine;
the virus searching and killing module (3) is used for searching and killing viruses of the virtual machine on the openstack platform; the virus searching and killing module (3) comprises:
a searching and killing period setting unit (3.1) for setting a virus searching and killing period;
the searching and killing starting unit (3.2) is used for starting virus searching and killing on the virtual machine on the openstack platform according to the set virus searching and killing period;
the virtual machine network segment acquisition unit (3.3) is used for sequentially acquiring the network segment where each virtual machine is located;
and the virus searching and killing unit (3.4) is used for configuring the firewall to search and kill the viruses of the virtual machine by adopting the corresponding virus library example according to the network segment where the virtual machine is positioned.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910168782.2A CN109918173B (en) | 2019-03-06 | 2019-03-06 | Openstack-based virtual machine health check method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910168782.2A CN109918173B (en) | 2019-03-06 | 2019-03-06 | Openstack-based virtual machine health check method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109918173A CN109918173A (en) | 2019-06-21 |
CN109918173B true CN109918173B (en) | 2021-11-19 |
Family
ID=66963463
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910168782.2A Active CN109918173B (en) | 2019-03-06 | 2019-03-06 | Openstack-based virtual machine health check method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109918173B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102082802A (en) * | 2011-03-01 | 2011-06-01 | 陈彪 | Behavior-based mobile terminal security protection system and method |
CN102195987A (en) * | 2011-05-31 | 2011-09-21 | 成都七巧软件有限责任公司 | Distributed credibility authentication method and system thereof based on software product library |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10411975B2 (en) * | 2013-03-15 | 2019-09-10 | Csc Agility Platform, Inc. | System and method for a cloud computing abstraction with multi-tier deployment policy |
CN103067380B (en) * | 2012-12-26 | 2015-11-18 | 北京启明星辰信息技术股份有限公司 | A kind of deployment configuration method and system of virtual secure equipment |
US9088541B2 (en) * | 2013-05-31 | 2015-07-21 | Catbird Networks, Inc. | Systems and methods for dynamic network security control and configuration |
US9769174B2 (en) * | 2013-06-14 | 2017-09-19 | Catbird Networks, Inc. | Systems and methods for creating and modifying access control lists |
CN104732148A (en) * | 2015-04-14 | 2015-06-24 | 北京汉柏科技有限公司 | Distributed searching and killing method and system |
CN106203102B (en) * | 2015-05-06 | 2019-10-11 | 北京金山安全管理系统技术有限公司 | A kind of checking and killing virus method and device of the whole network terminal |
CN105407078A (en) * | 2015-10-20 | 2016-03-16 | 国网四川省电力公司信息通信公司 | Data transmission method and data transmission system in electric power communication system |
CN106302466B (en) * | 2016-08-17 | 2019-04-26 | 东软集团股份有限公司 | A kind of management method and system of firewall |
CN106612225B (en) * | 2016-12-12 | 2020-01-14 | 武汉烽火信息集成技术有限公司 | Openstack-based agent deployment system and method |
-
2019
- 2019-03-06 CN CN201910168782.2A patent/CN109918173B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102082802A (en) * | 2011-03-01 | 2011-06-01 | 陈彪 | Behavior-based mobile terminal security protection system and method |
CN102195987A (en) * | 2011-05-31 | 2011-09-21 | 成都七巧软件有限责任公司 | Distributed credibility authentication method and system thereof based on software product library |
Non-Patent Citations (2)
Title |
---|
Performance of Network Virtualization in cloud computing infrastructures: The OpenStack case;Franco Callegati等;《2014 IEEE 3rd International Conference on Cloud Networking(CloudNet)》;20141201;第132-137页 * |
云计算系统网络安全管理与技术防护;徐绕山等;《信息化研究》;20180420;第1-8页 * |
Also Published As
Publication number | Publication date |
---|---|
CN109918173A (en) | 2019-06-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106649084B (en) | The acquisition methods and device of function call information, test equipment | |
US8959513B1 (en) | Controlling virtualization resource utilization based on network state | |
WO2017165018A1 (en) | Automated event id field analysis on heterogeneous logs | |
US8271416B2 (en) | Method for dynamically determining a predetermined previous condition of a rule-based system | |
RU2013136976A (en) | SYSTEM AND METHOD FOR TEMPORARY PROTECTION OF OPERATING SYSTEM OF SOFTWARE AND HARDWARE DEVICES FROM APPLICATIONS CONTAINING VULNERABILITY | |
CN110826058B (en) | Device, method and medium for malware detection based on user interaction | |
EP3640826A1 (en) | Utilizing heuristic and machine learning models to generate a mandatory access control policy for an application | |
US20240264804A1 (en) | Cloud code development system, method, apparatus, device and storage medium | |
CN104636251A (en) | Testing method and system for compatibility of multiple browsers | |
US8788884B2 (en) | Automatic correction of program logic | |
Kim et al. | Dual execution for on the fly fine grained execution comparison | |
CN106598825B (en) | Electronic equipment, canonical log code output method and device | |
KR20210045122A (en) | Apparatus and method for generating test input a software using symbolic execution | |
WO2018025258A1 (en) | Method and system for detecting movement of malware and other potential threats | |
US7480651B1 (en) | System and method for notification of group membership changes in a directory service | |
CN110795105A (en) | Automatic compiling and deploying method and system for power distribution automation master station system | |
CN109918173B (en) | Openstack-based virtual machine health check method and system | |
US11418570B2 (en) | Robust computing device identification framework | |
US10768901B2 (en) | Converting code of a first code type on a mainframe device in phases to code of a second code type | |
Cao et al. | An attack graph generation method based on parallel computing | |
EP4102361A2 (en) | Method and apparatus for managing functions of a query engine | |
CN108363919B (en) | Method and system for generating virus-killing tool | |
CN114221971B (en) | Data synchronization method, device, server, storage medium and product | |
US20160070564A1 (en) | Dynamically schematized log messages for software applications | |
US11625462B2 (en) | Protection of data from malicious user in computing device from pre-boot state |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |