WO2018073082A1 - Computersystem-architektur sowie computernetz-infrastruktur, umfassend eine mehrzahl von solchen computersystem-architekturen - Google Patents
Computersystem-architektur sowie computernetz-infrastruktur, umfassend eine mehrzahl von solchen computersystem-architekturen Download PDFInfo
- Publication number
- WO2018073082A1 WO2018073082A1 PCT/EP2017/075980 EP2017075980W WO2018073082A1 WO 2018073082 A1 WO2018073082 A1 WO 2018073082A1 EP 2017075980 W EP2017075980 W EP 2017075980W WO 2018073082 A1 WO2018073082 A1 WO 2018073082A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- virtual
- computer system
- physical
- network
- communication
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
- G06F9/5077—Logical partitioning of resources; Management or configuration of virtualized resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45583—Memory management, e.g. access or allocation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45595—Network integration; Enabling network access in virtual machine instances
Definitions
- Computer system architecture and computer network infrastructure comprising a plurality of such computer system architectures
- the invention relates to a computer system architecture comprising a physical computer system on which
- the invention relates to a
- Computer system infrastructure having a plurality of such computer system architectures.
- Computer system architectures or in computer network infrastructures or IT networks comprising a plurality of such computer system architectures.
- Vulnerabilities can exploit attackers from an external network to manipulate a
- Operating system run from running application programs or data that are processed in the operating system or in the running application programs. Furthermore, attackers can error or Vulnerabilities also for unauthorized access to operating systems, application programs or data exploit.
- Operating systems or application programs may be faulty or may be deliberately manipulated or set up or be manipulated by an external attacker that they perform a user unintentional connection to other external systems (referred to in the art as so-called "home calls”) Data or general
- Firewall systems that are ideally switched between all systems and components or their interfaces in a computer network infrastructure to the
- Network traffic of the operating systems or the running application programs and the connections between participating computer systems or other Network components eg routers, switches, etc.
- firewall systems can also provide errors, backdoors or in general
- Vulnerabilities or by users e.g.
- hypervisor by means of a so-called hypervisor, can be controlled.
- Such virtual environments are available
- sandbox For example, to first test certain software packages in a secure environment (so-called sandbox), before appropriate programs within a larger one
- the object of the present invention is therefore a
- Computer system architecture and a computer network infrastructure with a plurality of such computer system architectures that allow increased security of the systems constructed thereby, have an improved robustness to the above-mentioned hazards and still offer the possibility of a flexible and
- the computer system architecture includes a physical one
- the virtual environment has at least one virtual machine and at least one virtual network bridge at least one virtual
- the virtual machine can be a virtualized to operate
- Virtual environment as an abstract from the basic operating system or from the hardware of the physical computer system and possibly isolated environment be understood.
- the virtual machine and the virtual network bridge are controllable by means of the base operating system. Such control advantageously takes place via a hypervisor of the base operating system, which is set up to control the virtual machine and the virtual network bridge.
- the virtual machine is attached to the virtual network bridge and configured to communicate with other virtual machines within the virtual communications subnet or other virtual communications subnets.
- the virtual machine is further configured to establish a connection from the virtual machine to an external physical network outside the physical one
- Basic operating system set up.
- the basic operating system of the physical computer system controls one
- the computer system architecture comprises a plurality of virtual machines, wherein a targeted connection to the outside for one or more
- the network ports of the physical computer system are in the computer system architecture according to the one presented here Concept arranged such that a mediation of communication between the virtual machine and other virtual machines within the virtual
- the network ports of the physical computer system are additionally configured such that one of the virtual
- Communications subnet is prevented from independently connecting from the external physical network from outside the physical computer system to the physical computer system.
- the network ports of the physical computer system are thus set up so that only a mediation of a communication within the virtual or the virtual
- the network ports of the physical computer system therefore only allow a connection to be established via specially set up or enabled services, which only mediate communication within the virtual communication subnet (s). For all other services, the network ports are physical
- Network ports are not running physical services Computer systems that would "listen” to the external network and allow an external connection to the physical computer system, rather, the network ports for such services are locked or unreachable or accessible from the outside.
- the virtual machine is arranged such that a connection from the external physical network from outside the physical
- the virtual machine may e.g. have their own IP address (independent of the physical computer system).
- the virtual machine may further provide one or more services responsive to the external physical network (e.g., a web server service) at one or more dedicated network ports.
- LAN Local Area Network
- Internet World Wide Web
- the physical computer system is configured as a server such that this server within one or more virtual communication subnets by means of one or more virtual machines (in which certain
- Application programs are established) provides predetermined services, but without the physical computer system itself from the virtual
- Network ports are provided to the outside in the physical external network.
- Such a server can certainly provide complex functions and e.g. when
- virtualized web, application or database server or as a combination thereof can be addressed externally from the external physical network, e.g. services specifically provided by these virtual machines (e.g., web server services).
- Other virtual machines are advantageously not connected to the external physical network in this case.
- These virtual machines can only by means of or the virtual
- the basic operating system may be, for example, an open-source operating system in one
- Basic operating system also a source code-level audit possible in order to understand the behavior of the base operating system and its components (such as drivers, service and system programs) transparent. It is also conceivable that the basic OS specifically for the here
- connection setup from the external physical network (as explained above) to the physical computer system is possible, apart from mediated communication within the virtual communication subnet or networks communicated over the external physical network, the protection of the computer system architecture is also significantly increased.
- This protection can be achieved, for example, by targeted port locks the network ports of the physical computer system are achieved, but are completely independent of the behavior of the systems to be operated within the virtual environment. This also contributes to a simplified handling of
- the virtual environment further comprises at least one virtual
- Memory interface by means of the basic operating system is controllable and set up is physical
- the virtual machine is attached to the virtual storage interface and configured to communicate with the virtual storage components.
- physical storage components may be provided as virtual storage components for the virtual machine. That is, the virtual machine sees only virtual
- Storage components can be within the physical
- Computer system or also be configured as external storage components. It is e.g. conceivable, physical
- a storage subnet e.g., a so-called storage area network, SAN
- a provision or logical "translation" of the physical memory components as or into the virtual memory components takes place by means of the virtual memory interface, which is transmitted by means of the basic operating system or by means of the hypervisor
- the network ports of the physical computer system are additionally advantageously configured such that communication with external
- Storage components within a storage subnet beyond the physical computer system beyond the external physical network are the network ports of the physical
- Communication subnet generally prevents independent connection from the external physical network from outside the physical computer system to the physical computer system.
- Memory components can access to store data.
- the virtual memory components become physical through the virtual memory interface
- Measures take place by means of the basic operating system, preferably via a hypervisor in the basic operating system.
- the said measures also provide protection against manipulative access to the physical computer system or the virtual machine for obtaining data that is provided by the virtual machine in corresponding (virtual) memory components of a dedicated computer
- Storage system are stored. An exchange of data between virtual machines and the virtual
- Memory components are controlled exclusively via the virtual memory interface. A transfer of such data to be stored by the virtual machine to unauthorized external systems other than the
- Distinguishing memory components is prevented by virtue of the fact that the virtual machine, as explained above, is set up in such a way that connection establishment into the external physical network, which differs in its configuration from the memory subnet, is prevented.
- the base operating system and the virtual environment are configured to prevent connection from the virtual machine to the base operating system, but to establish a connection from the base operating system to the base operating system
- Application program has no way to make a call to the base OS. That way is the
- connection establishment from the virtual machine to the base operating system is advantageously prevented by the use of special firewall rules in the
- Base operating system are set up and / or the console the virtual machine by means of the hypervisor of the
- the base operating system is configured to encrypt data of the virtual machine that is conveyed outside the physical computer system via the external physical network. This means that any data coming from the virtual machine into the external physical
- Basic operating system is prevented according to the above-described measures in a preferred embodiment, at least not directly determined in the operating system to be operated within the virtual machine that the data is encrypted at all.
- Network can be shipped outside the physical computer system, by setting up a secure
- Base operating system is set up to build one or more so-called virtual private network connections in an external physical network to other physical computer systems or other physical
- VPN virtual private networks
- the physical computer system for connection calls from the external physical network independent of a data communication within a virtual communication subnet and possibly independent of a data communication within a
- the encryption of data may e.g. via a specially created encryption layer or a pseudo-device in the base operating system. For Unix or Linux systems this may e.g. via the so-called "Device Mapper".
- Abusive effects are protected by vulnerabilities in external network components (such as routers, switches, etc.). Even if data about the external physical
- the system is massively more difficult in that the network ports of the physical computer system, apart from connections within a virtual computer
- the computer network infrastructure includes a plurality of such computer system architectures connected via at least one physical network (of the type discussed above).
- Computer network infrastructure is at least a virtual one
- Machine of the respective computer system architectures via at least one virtual communication subnet with at least one virtual machine of at least one other
- the computer network infrastructure is set up so that a
- Such a computer network infrastructure includes the
- Computer systems of the respective computer system architectures are distributed and can communicate with each other within one or more virtual communication subnets.
- virtual networks can be complex with
- a major advantage of such a computer network infrastructure consists in the fact that despite complex functionality, complex and complex security rules or firewall rules are eliminated. In such a
- Computer system architectures are controlled via the corresponding base operating systems in the physical computer systems. This control prevents a corresponding connection of the virtual machines in the external physical network. In this way, a very simple and yet effective safety control of
- Communications subnets independently connect from the external physical network to their respective ones
- a complex functionality can be realized via such a computer network infrastructure, which, however, is protected or encapsulated both from the inside outward and from the outside inward against manipulations or attacks.
- Computer network infrastructure is simply not accessible from the outside via the physical external network.
- Such a computer network infrastructure is easy to administrate from a security point of view and still allows a significantly higher level of security compared to conventionally constructed infrastructures.
- the illustrated computer network infrastructure comprises physical storage components for storing data of the virtual machines of the computer system architectures.
- the storage components are virtual
- the storage components outside of the physical computer systems are configured as physical storage components (eg, within a so-called storage area network, SAN) and accessible via one or more storage subnets.
- SAN storage area network
- Such a computer network infrastructure also integrates storage of data that originates from the virtual machines and is to be stored. For example, this may be application-specific data,
- Storage components are visible and responsive, is a data storage within the illustrated
- the encryption is advantageously set up such that participating virtual machines have no access to the encryption.
- the encryption is advantageously set up independently of the virtual machines in such a way that operating systems or applications within the virtual machines do not even have information that an encryption takes place outside the virtual machines at the base operating system level.
- the virtual machines can address the virtual memory components, where technically at the level of basic operating systems, eg. B. by means of a hypervisor or furnished for this purpose
- This switch is set up so that all the data about the
- Computer network infrastructure also very robust against any manipulation of security devices of the physical storage components. Even with a manipulation of
- Memory components for example, by intrusion of an external attacker in a suitably established
- the entire computer network infrastructure is set up such that a communication within the at least one virtual communication subnet (and also
- VPN Virtual Private Networks
- Computer systems at least a first and a second
- Virtual private network for mediating the at least one virtual communication subnet (and possibly for mediating the at least one memory subnet)
- an addressable VPN service of the first virtual private network is set up on the one physical computer system and an addressable VPN service the second virtual private network on the other
- the computer network infrastructure has several separate virtual ones
- Each separate virtual communications subnet may have its own IP address space with predetermined private IP addresses of the participating virtual machines. In this way, within the computer network infrastructure several separate subnets are set up, wherein within the
- Subnets communicate the virtual machines.
- the communication can be application specific by security rules, e.g. For example, firewall rules.
- the security rules are e.g. controlled via the base operating system.
- a plurality of separate communication subnets is that security rules can be defined for each communication subnet independently of the other communication subnets.
- security rules can be used to define and create the virtual components
- the computer network infrastructure further includes, in addition to the illustrated components, an administration computer system and a switching computer system coupled to the at least one physical computer system
- Networks are connected to the administration of one or
- the network ports of the administrative computer system are closed to at least one physical network, so that a
- the switch computer system has at least one open network port towards the at least one physical network and is configured such that both the
- Computer systems of the computer system architectures to be administered can access the switching computer system via the at least one physical network.
- Administration computer system and the switching computer system serve for the administration of one or
- Computer network infrastructure adapted. As explained several times before, the network ports are the physical ones Computer systems of the corresponding computer system architectures are set up in such a way that a connection from the physical network outside the physical network, independent from the virtual communications subnet or, if appropriate, from the memory subnet, is established
- the administration computer system and the switching computer system are provided.
- Administration computer systems are closed, similar to the network ports of the physical computer systems of the computer system architectures within the computer network infrastructure, to prevent connection from the physical network to the administration computer system.
- the switching computer system has at least one open network port, via which a connection setup from the physical network to the switching computer system is established.
- the administration computer system or to the physical one are closed, similar to the network ports of the physical computer systems of the computer system architectures within the computer network infrastructure, to prevent connection from the physical network to the administration computer system.
- the switching computer system has at least one open network port, via which a connection setup from the physical network to the switching computer system is established.
- the administration computer system or to the physical one In contrast to the administration computer system or to the physical one
- Computer systems of the respective computer system architectures can access the switching computer system and data from the switching computer system
- Administration computer system itself or the computer system architecture physical computer systems have ongoing services on one or more network ports (so-called listening ports), which offer a threat or vulnerability to attacks via the external network.
- Switching computer system established connection to the switching computer system and stored there. Thereupon, a process can be started in which one or more physical computer systems of the
- Control data or data packets are executed. In this way, administrative indirect access to the corresponding computer system architectures is possible.
- Figure 1 is a schematic representation of a particular
- FIG. 2 is a schematic representation of another
- Figure 3A is a schematic representation of a
- FIG. 3B shows an equivalent circuit diagram of the functionality according to FIG.
- Figure 3A is a schematic representation of another functionality of a computer system architecture within a computer network infrastructure
- Figure 4 is a schematic overview of various
- Figure 5A is a schematic representation of another
- Embodiment of a computer network infrastructure in a first configuration Embodiment of a computer network infrastructure in a first configuration
- FIG. 5B shows the embodiment according to FIG. 5A in a second embodiment
- FIG. 6A shows another embodiment of a computer network infrastructure
- FIG. 6B shows an equivalent circuit diagram of the functionality according to FIG. 6B
- FIG. 7A shows a simplified representation of the embodiment according to FIG. 6A
- FIG. 7B shows another embodiment of a computer network infrastructure
- Figure 7C is a schematic representation of hedged
- FIG. 8 shows a further embodiment of a computer network infrastructure.
- Figure 1 shows a schematic representation of a
- Computer network infrastructure comprising a physical
- physical computer system 2 includes a virtual environment that is controllable via a base operating system on the physical computer system 2.
- base operating system for example, conceivable in the base operating system
- Hypervisor that hosts the virtual machine VMl
- the virtual machine VM1 comprises, for example, an operating system to be operated and, if appropriate, an application program running on it.
- the application program can provide application-specific functionality.
- the physical computer system 2 has one or more
- Network ports 4 which are shown schematically connected to an external physical network N.
- the physical network N is thus set up outside the physical computer system 2 and includes a local area network
- Network N may also extend to the public World Wide Web (Internet).
- Internet World Wide Web
- the physical computer system 2 in the external physical network N is possible, but a connection from the external physical network N to the physical computer system 2 is not possible.
- a corresponding connection setup to the physical computer system 2 is prevented or blocked, for example, by blocked network ports 4 (eg by means of a firewall and / or a packet filter) or connection attempts are rejected.
- the physical computer system 2 optionally has no running
- the computer system architecture 1 in addition to the virtual machine VM1, also comprises a so-called virtual bridge br of a virtual communication subnet 3.
- the virtual bridge br is schematized as a functionality and can be used, for example, via the Basic operating system within the virtual environment
- the virtual bridge br works as a virtual network connection (interface) for connecting the virtual machine VM1 to the virtual communication subnet 3.
- the virtual bridge br for example, within a protocol stack according to the so-called OSI layer model as a virtual hardware bridge with a functionality be set up according to layer 2 (link layer).
- Communications subnet 3 set up for communication with other virtual machines. Otherwise, the
- Computer system 2 configured basic operating system
- Machine VM1 perform communication (i.e., call calls or switch acceptances) only via the virtual bridge br within the communications subnet 3.
- the virtual machine VM1 is set up or controlled by the basic operating system and / or the hypervisor such that a call of the
- virtual machine VM1 in the basic operating system of the physical computer system 2 is not allowed or not possible or is suppressed. This is For example, implemented by appropriate firewall rules in the base operating system. Alternatively or additionally, z. B. the hypervisor of the base operating system in
- a running in the virtual machine VM1 operating system or an expiring application program which may generally have errors and / or vulnerabilities and are therefore considered potentially insecure, can not establish a data connection to the outside of the physical computer system 2 via the network N, because such functionality by the basic operating system running on the physical computer system 2 (which ideally should be considered safe from
- Computer system architecture 1 is a security barrier against errors or security vulnerabilities of a program that runs within the virtual machine VM1.
- the virtual machine VM1 is connected via the virtual network bridge br to the communication subnet 3 and can be used with other virtual machines for the realization and
- virtual machine VM1 can (temporarily) use the
- Network N connects to an external system
- Network N directly connects to the virtual machine VM1.
- an external connection to the physical computer system 2 is prevented by the appropriately configured network ports 4, as explained above.
- the physical computer system 2 is protected against unauthorized connection calls to the physical computer system 2 over the network N due to the outwardly closed network ports 4. This is the physical
- Computer system 2 accordingly robust against attacks from the network N, because on the physical computer system 2, as explained, no running services are set up at the network ports 4, which would offer a conventional attack possibility.
- FIG. 2 shows an embodiment of a computer system architecture 1, wherein another functionality
- the computer system architecture 1 according to
- FIG. 2 can in principle be constructed in accordance with the explanations of a computer system architecture 1 according to FIG. In a slight modification according to Figure 2, the
- Machines VM1 and VM2 which are set up in a corresponding virtual environment on the physical computer system 2 and a base operating system
- Figure 2 illustrates a mechanism for storing data to be stored from the virtual machines VM1 and VM2 on storage components.
- VM2 can access these virtual memory components that are physical over a storage subnet 5
- Memory components LI or L2 are connected.
- the storage subnet 5 is controlled via the base operating system or the hypervisor.
- the virtual machines VM1 and VM2 can only address virtual memory components (not shown) that are visible to them.
- the virtual memory components may be adapted to particular functionalities or applications within the virtual machines VM1 or VM2.
- the latter can be created, for example, in a Linux system via the Device Mapper.
- the virtual machines VM1 or VM2 address the virtual memory components and can then transfer data to the virtual memory components and store them there (store).
- the virtual memory components become physical
- Base operating system on a corresponding connection via the memory subnet 5 to the memory components LI and L2 and can then store the data to the Send memory components LI and L2, so that the data is stored there.
- Such data storage via the base operating system of the physical computer system 2 becomes out of physical
- Memory components outside of the physical computer system 2 set up are part of a memory system, eg. As a so-called storage area network (SAN).
- SAN storage area network
- Memory components are e.g. as a disk array via LUN (Logical Unit Number) addressing in one
- LUN Logical Unit Number
- the memory components LI and L2 can, for. B. redundant hard disk storage, distributed data storage, etc. be.
- the memory components LI and L2 can also be set up as physical memory components within the physical computer system 2. In this case, an exchange takes place via the basic operating system
- the encryption may be implemented by a specially-adapted
- Encryption layer or a dedicated interface e.g. a pseudo-device (see above)
- the virtual machines VM1 or VM2 have no influence or no access to this encryption.
- the virtual machines VM1 or VM2 are set up in this way or are used via the
- Base operating system controlled such that the virtual machines VMl or VM2 receive no information that is encrypted at the level of the basic operating system.
- data from the virtual machines VM1 and VM2 are communicated over the physical network N (or a dedicated storage network) to the outside of the physical computer system 2 only in encrypted form.
- the data can be stored in the physical memory components or in the
- Memory subnet 5 additionally encrypted. An access to unencrypted data from the virtual
- machines VM1 and VM2 are not possible outside the physical computer system 2. Due to the fact that a connection from the physical network N to the physical computer system 2 by means of the network ports 4 is not allowed, an attack on existing within the physical computer system 2 Klaroire (before encryption) is very difficult to achieve. As such, the likelihood of a successful attack on information within the physical computer system 2 is greatly reduced. In addition, a communication of data from the virtual machines VM1 or VM2 via the base operating system
- Communications subnet 3 (see Figure 1) is allowed. Consequently becomes an operating system or a
- Figure 3A shows a schematic representation of a
- Computer network infrastructure comprising two computer system architectures la and lb, each one physical
- Computer system 2a and 2b include. Within a virtual environment of the physical computer system 2a run two virtual machines VM1 and VM2. Within a virtual environment of the physical computer system 2b, two virtual machines VM3 and VM4 are running. The physical
- Computer systems 2a and 2b are physically external via respective network ports 4a and 4b
- the physical computer systems 2a and 2b are set up in particular according to the explanations for FIGS. 1 and 2.
- the virtual machines VM1, VM2, VM3 and VM4 are physical in the respective virtual environments
- Computer systems 2a and 2b via various virtual network bridges br to two communication subnets 3a and 3b
- FIG. 3A shows such a topology as an equivalent circuit diagram
- the virtual machines VM1 and VM2 communicate via the virtual communications subnet 3a only within the physical computer system 2a, except for any use of protocols such as broadcast, multicast, or protocols with similar behavior.
- mediation of communication between the virtual machines takes place by means of the external physical network N.
- VPN connections between the physical computer systems 2a and 2b established (see lock symbols of the schematized connections of the communication subnets 3a and 3b between the physical computer systems 2a and 2b).
- data is transmitted between the physical computer systems 2a and 2b in encrypted form over the network N and mediates communication between the virtual machines. More specifically, communication between the virtual machines within the virtual communication subnets 3a and 3b by means of the base operating systems or their hypervisors on the physical computer systems 2a and 2b is translated into physical transport within the VPN connections along the network N. In this way, the virtual
- Machines VM1 to VM4 within appropriately structured communication subnets 3a and 3b communicate with each other.
- the network ports 4a and 4b are the
- a computer network infrastructure is set up between the physical computer systems 2a and 2b, with virtual machines VM1 through VM4 having two virtual machines
- Markings LAN1 and LAN2 in Figure 3B can communicate. All virtual machines VM1 to VM4 are encapsulated in terms of safety according to the
- machines VM1 to VM4 have no interface into the external physical network N.
- VPN connections are via the respective base operating systems or their
- Hypervisor controlled An impact of a system failure or vulnerability within one or more virtual machines VM1 through VM4 is limited only to the virtual communications subnets 3a and 3b and is effectively encased within the communications subnets 3a and 3b. In that sense it is the virtual one
- Machines VM1 to VM4 are not able to read data in a readable form via unwanted network connections to one unauthorized third-party computer system over the network N to transfer. In addition, is over appropriately configured
- Network ports 4a and 4b of the physical computer systems 2a and 2b extremely difficult to attack from the network N to the physical computer systems 2a and 2b.
- FIG. 3C shows a schematic representation of FIG
- Computer network infrastructure according to Figure 3C shows a
- Computer system architecture 1 comprising a physical
- the physical computer system 2 is connected to an external physical network N.
- an administration computer system 7 and a switching computer system 8 are connected to the network N.
- Both the network ports 4 of the physical computer system 2 and the network ports 14 of the administration computer system 7 are set up such that a connection setup from the network N to the physical computer system 2 or the administration computer system 7 is prevented. It is therefore not readily possible to have an external one
- firewall rules of the base operating system or by controlling the consoles it by means of a hypervisor of the Base operating system suppressed.
- hypervisor of the Base operating system suppressed.
- the following process can be carried out.
- connection to the switching computer system 8 are constructed.
- the switching computer system 8 in contrast to the administration computer system 7
- Computer system 2 via the network N connect to the switching computer system 8 to the there
- control data can be transferred to the physical computer system 2 without actively establishing a connection from outside via the network N to the physical computer system 2, which would conventionally be a typical external attack opportunity.
- Transferred data packets may be further processed in the base operating system of the physical computer system 2.
- a specific task may be performed so that the base operating system is based on the transmitted
- Data packets provide controlled access to the virtual environment, more specifically to the virtual machines VM1 Operating state VM2, performs. This is through a
- Base operating system to connect to the console it or other interface used for this purpose a virtual machine VM1 and VM2, with a corresponding control of the virtual machines VM1 and VM2 via
- Control data can be performed. However, it is also conceivable for control data, scripts or programs corresponding to a virtual machine VM1 and VM2 to be imported into the virtual machine VM1 or VM2, so that an operating system running in the virtual machine VM1 or VM2 contains the corresponding control data, scripts or execute programs, so that virtually a remote control of the virtual machines VM1 and VM2 is achieved. In this way, a secured administrative access is indirect from the administration computer system 7 to the physical via the switching computer system 8
- Computer system 2 or in the virtual environment on the physical computer system 2 allows. All processes can be done via corresponding signatures within the
- Computer system 2 are hedged.
- communication takes place via the network N exclusively in encrypted form.
- Control data to enable access to the virtual machines VM1 or VM2 by means of the base operating system could access the virtual machines VM1 or VM2 in a controlled manner in this way, that, for example, a port forwarding or a tunnel in the base operating system to the desired virtual machine VM1 or VM2 are enabled. This turns off one
- a virtual machine VM1 or VM2 provides a selectively open network port to the outside in the network N, so that a selective access to the virtual machine VM1 or VM2 is possible.
- this should be done by special security mechanisms, such. B. temporary unlock, Check accordingly
- Authentication packages, checking a match of authentication mechanisms, source ports, destination ports, etc. be secured. It is also conceivable in this context to provide a multi-eye principle of security personnel.
- Figure 4 shows a schematic representation of a
- Networks N1 and N2. These can be separate networks, but also alternatively parts of an overall network or an entire network per se.
- Figure 4 illustrates the complexity of implementing a corresponding computer network infrastructure. A major advantage of such infrastructure in the
- Machines VM1 to VM4 can not establish a connection to the external networks N1 and N2.
- the physical computer systems 2a and 2b are secured by their network ports 4a and 4b against attack from the networks N1 and N2.
- FIG. 5A shows a computer network infrastructure which is constructed analogously to that of FIG. 4, with the difference that in the computer network infrastructure according to FIG. 5A only three virtual machines are used. Two virtual ones
- Machines VM1 and VM2 are set up on the physical computer system 2a with a virtual machine VM4 set up on the physical computer system 2b.
- Figure 5A shows a first configuration of the computer network infrastructure.
- the virtual machine VM2 on the physical computer system 2a is now to be moved to the physical computer system 2b.
- a move can be done via the measures an administrative access to the virtual machines, for example, by means of the administration computer system 7 and a switching computer system 8 as explained above in particular to Figure 3C.
- the administration computer system 7 and a switching computer system 8 as explained above in particular to Figure 3C.
- OS or it can be a live migration of the VM2 be performed. All necessary steps can be controlled via control data initiated by means of the administration computer system 7 and by means of the switching computer system 8 to the physical computer system 2a or the physical computer system 2b (or in their basic operating systems).
- Computer system 2b and in the virtual machine VM2 can be processed.
- Such control data inter alia encryption at the level of
- Storage subnet 5 in turn to be able to connect to memory components.
- a connection to a corresponding communication subnetwork 3a or 3b must also be set up on the physical computer system 2b.
- a virtual network bridge br is required for the connection of the virtual machine VM2 after its transfer into the virtual environment of the physical computer system 2b.
- the communication subnetwork 3a or 3b to which the virtual machine VM2 on the physical Computer system 2b to be connected either can be assigned dynamically (on demand) or already preconfigured static in the virtual environment on the physical computer system 2b.
- a corresponding communication of a communication from the virtual environment of the physical computer system 2b via the basic operating system into a physical external network is likewise to be correspondingly adapted via the basic operating system of the physical computer system 2b.
- the data transfer for a live migration can either be realized via existing encrypted connections (eg VPN connections between the participating physical computer systems 2 a and 2 b) or, alternatively, within exclusive dedicated ones
- connection set up specifically for a live migration is depicted in Figure 5A as an additional bridged network connection between the two physical computer systems 2a and 2b (see Figs.
- Network ports 4a and 4b can be temporarily enabled for a dedicated live migration connection.
- Computer system 2b made available and via a
- a response of the virtual machine VM2 is carried out before the move by corresponding control data or data packets that a controlled call from the
- the data packets are transferred from the administration ⁇ computer system 7 to the switching computer system. 8 Subsequently, a connection from
- physical computer system 2a is constructed on the switching computer system 8 so that the data packets can be transferred to the physical computer system 2a.
- the routing information can be processed in the data packets and the virtual machine VM2 can be addressed via its console interface.
- VM-IP IP address
- VMlphys IP address
- the virtual machine VM2 can after
- FIG. 5A shows the topology according to FIG. 5A by live migration.
- FIG. 5B shows the corresponding configuration of the computer network infrastructure after a move of the computer network
- the virtual machine VM2 in the physical computer system 2b.
- the virtual machine VM2 is over several virtual machines
- Network bridges br are connected to both the communications subnet 3a and the communications subnet 3b. Encryption of data from the virtual machine VM2 into the storage subnet 5 on storage components L2 is established via the base operating system.
- an encryption of other data from the virtual machine VM2 realized by the basic operating system of the physical computer system 2b, which are exchanged within the virtual communication subnets 3a and 3b to other virtual machines and on
- Such encryption of data may be via the basic operating system of the physical
- Computer system 2a take place.
- a response of the virtual machine VM2 after moving to the physical computer system 2b also takes place via data packets containing routing information.
- data packets can, as explained above, on the
- corresponding routing information can address the virtual machine VM2.
- the virtual machine VM2 In order for the virtual machine VM2 to be reachable also on the physical computer system 2b by routing from the administration computer system 7, it must be possible according to a
- Virtual machine VM2 be replaced in the physical computer system 2b, if the network identity (VM2phys) of the virtual machine VM2 has changed in the new virtual environment on the physical computer system 2b.
- VM2phys network identity
- Another, more convenient option is to set up a responsiveness of the physical computer systems 2a and 2b or the virtual machine VM2 via a so-called IP aliasing.
- IP aliasing One or more alias IP addresses can then be used in a routing, which are transferred from the physical computer system 2 a to the physical computer system 2 b during the movement of the virtual machine VM 2, where they are assigned to the network interface or interfaces accordingly.
- the advantage of this is that routing from the administration computer system 7 does not have to be changed, but alias IP addresses can still be considered as the destination, with an assignment of the alias IP addresses to the actual end points (physical computer system 2b or virtual machine VM2 in the physical
- Computer system 2b takes place. In this way, it is easily and conveniently possible to migrate virtual machines between physical computer systems within the indicated computer network infrastructure.
- FIG. 6A shows a further embodiment of a
- the networks N1 and N2 may be separate networks or components of a network.
- the computer network infrastructure corresponds to
- the virtual machines are specifically web servers, application servers
- the two virtualized web servers webl and web2 can communicate via a communication subnet 3c in accordance with the measures explained above.
- the two web servers webl and web2 can be externally directly (directly) accessible from the external network, eg from the network N2, eg via IP addresses independent of the physical computer systems 2a and 2b. In this way, these provide externally accessible virtual web server. Nevertheless, a connection from the external network (N1 or N2) to the physical computer systems 2a and 2b is via the network ports 4a and 4b blocked, as already explained above to Figure 1.
- two virtualized application servers appl and app2 are installed on the physical computer systems 2a and 2b, respectively, with each other or with the
- Web servers webl and web2 via a second
- Communication subnet 3b communicate.
- two virtualized database servers dbl and db2 are also installed on the physical computer system 2a and the physical computer system 2b, respectively, with each other and with the application servers appl and app2 via a third one
- Communication subnet 3a communicate.
- neither the application servers appl and app2 nor the database servers dbl and db2 are connected to the external network (N1 or N2).
- N1 or N2 the external network
- Computer systems 2a and 2b act as a kind of host server for providing the illustrated network services, which, however, apart from any external access to the web servers webl and web2 - as explained above - can communicate fully encapsulated via separate communication subnets 3a to 3c.
- security rules can be specifically defined at the level of the basic operating system or hypervisor for the individual virtual machines.
- H. Firewall rules are assigned to FW. In this way, a fine granularity of security settings is possible between the different applications.
- separate security rules can be set for each communication subnet, which are advantageously independent of others
- Safety rules can be. In particular, it is not necessary to specifically protect the virtualized applications externally via firewalls.
- a security barrier in the networks N1 and N2 is given by the virtualization, whereby the hypervisors on the host servers 2a and 2b block connection setup from the virtual machines into the networks N1 and N2, respectively.
- the computer network infrastructure according to FIG. 6A is very structured and flexible in implementation and
- FIG. 6B An equivalent circuit diagram of the topology according to FIG. 6A is shown in FIG. 6B. Here are the individual
- FIG. 7A shows the topology according to FIG. 6A in one
- FIG. 7B shows an extended embodiment of a computer network infrastructure of the type described. There are three physical host servers 2a, 2b and 2c set up, corresponding ones
- Computer system architectures la with different virtual structures include.
- a first virtual structure VM-Struct.l is established on the physical host servers 2a and 2b and communicates over one or more
- a second VM-Struct.2 virtual structure is established on the physical host servers 2b and 2c and communicates over one or more
- a third structure VM-Struct.3 is established on the three physical host servers 2a, 2b and 2c and communicates over one or more virtual communication subnets 33.
- the computer network infrastructure of Figure 7B illustrates flexible extensibility of virtualized subnetworks into the explained computer system architectures, so that very complex application scenarios are feasible despite a very high security of the computer network infrastructure.
- Figure 7C shows a topology of VPN connections between the individual physical host servers 2a, 2b and 2c, which may be established according to the infrastructure of Figure 7B.
- the VPN connections serve to mediate the communications along the individual communication subnetworks (compare Figures 31, 32 and 33 of Figure 7B).
- a first VPN connection 13a and a second VPN connection 13b are set up between in each case two host servers.
- the physical host server 2a provides a VPN service 12a on the first VPN connection to the physical host server 2b.
- the physical host server 2b on the second VPN connection 13b towards the physical host server 2a provides a VPN service 12b.
- 12a and 12b can
- VPN daemons for example, so-called VPN daemons.
- the two VPN connections 13a and 13b can be established between the two physical host servers 2a and 2b.
- An analog topology is between each of the two physical host servers 2a and 2c
- Each of the physical host servers provides a VPN service that can be accessed from outside to establish a VPN connection. In this way are two
- All VPN connections between each physical system can be set up as bonded, aggregated connections. In this way, a highly available VPN connection between each physical host server of a computer network infrastructure of the type described
- FIG. 8 shows a further embodiment of a
- Zone 1 Safety zones Zone 1 and Zone 2. Each zone contains computer system architectures
- zone 1 three physical host servers 2a, 2b and 2c are set up, with a first virtual structure VM-Struct.l being implemented on the physical host servers 2a and 2b and communicating via virtual communication subnets 31. Further, in zone 1, a virtual structure VM-Struct.2 implemented on the three physical host servers 2a, 2b and 2c is established, and virtual
- Communication subnets 32 is connected.
- three physical host servers 2d, 2e and 2f are also set up with two virtual structures VM struct 3 between the physical host servers 2e and 2f and VM struct 4 between all three physical host servers 2d, 2e and 2f.
- the virtual structure VM-Struct.3 communicates over virtual communication subnets 33, while the
- Intranet is a forwarding 11 (possibly with IP address translation, so-called network address translation, AT) or a routing to the intersections (eg web server, see Figure 6A) of the individual communication subnets 31, 32, 33 and 34 set up.
- the forwarding 11 may be established via one or more virtualized routers within the virtual environments of the physical host servers 2a to 2f. It is also conceivable to realize a corresponding forwarding via one or more basic operating systems of the physical host servers 2a to 2f. Another possibility would be forwarding via an external physical router.
- An intermediation of the forwarding 11 to the communications subnets 31, 32, 33, and 34 may be via one or both of two external networks NI and NU. Again, as are the others
- Embodiments already explained several times, advantageous to provide VPN connections, so that data is exchanged over the external networks NI and NU only encrypted.
- Security zones or even as a connection between two structures within a security zone is a
- Relay system 10 ("zone connect") is set up to virtual virtual bridges
- the relay system 10 may be a bridge or a router, possibly in
- the relay system 10 is connected, for example, to the virtual bridges br of the virtual communication subnets 32 in zone 1 and 33 in zone 2. That way, the two can
- Communication subnets 32 and 33 are virtually connected to a virtual communication subnet. In this way it is very easy to transfer information between individual virtual machines of individual virtual structures bridged network connections by means of the relay system 10 exchange. On a virtual level, individual virtual machines of different virtual structures can thus be addressed in a simple manner. For example, as shown in FIG. 8, virtual machines from the virtual structure VM-Struct.2 in zone 1 may be virtual immediately
- Switching the connection between the two security zones Zone 1 and Zone 2 via the relay system 10 can take place by means of one or both of the external networks NI and NU.
- connection structure differs from a pure communication between the virtual machines of different physical computer systems.
- Computer systems as physical host servers, provide virtualized application-specific functionalities that are very complex across virtualized communication subnets
- Illustrated embodiments are exemplary only. In embodiments not shown, it would also be conceivable to house virtual machines (VM guest) in host virtual machines (VM host), the measures of the kind explained being used in conjunction with physical ones
- VM guest in the host virtual machines (VM Host) or for the host virtual machines (VM Host) themselves.
- VM Host host virtual machines
- VM Host host virtual machines
- Encapsulation of virtual machines within virtual communication subnets of the type described will be applied to host virtual machines (VM Host) as well as to hosted virtual machines (VM Guest).
- VM Host host virtual machines
- VM Guest hosted virtual machines
- Communications subnet is prevented from independently connecting from an external physical network from outside a physical computer system to the physical computer system.
- the physical benefits become advantageous
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/098,286 US20190250938A1 (en) | 2016-10-18 | 2017-10-11 | Computer system architecture and computer network infrastructure including a plurality of such computer system architectures |
GB1817379.9A GB2565458A (en) | 2016-10-18 | 2017-10-11 | Computer system architecture and computer network infrastructure comprising a plurality of said type of computer system architectures |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102016119802.1 | 2016-10-18 | ||
DE102016119802 | 2016-10-18 | ||
DE102016124383.3 | 2016-12-14 | ||
DE102016124383.3A DE102016124383B4 (de) | 2016-10-18 | 2016-12-14 | Computersystem-Architektur sowie Computernetz-Infrastruktur, umfassend eine Mehrzahl von solchen Computersystem-Architekturen |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018073082A1 true WO2018073082A1 (de) | 2018-04-26 |
Family
ID=76741478
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2017/075980 WO2018073082A1 (de) | 2016-10-18 | 2017-10-11 | Computersystem-architektur sowie computernetz-infrastruktur, umfassend eine mehrzahl von solchen computersystem-architekturen |
Country Status (4)
Country | Link |
---|---|
US (1) | US20190250938A1 (de) |
DE (1) | DE102016124383B4 (de) |
GB (1) | GB2565458A (de) |
WO (1) | WO2018073082A1 (de) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IL238690B (en) | 2015-05-07 | 2019-07-31 | Mellanox Technologies Ltd | Network-based computational accelerator |
US11502948B2 (en) | 2017-10-16 | 2022-11-15 | Mellanox Technologies, Ltd. | Computational accelerator for storage operations |
US11005771B2 (en) | 2017-10-16 | 2021-05-11 | Mellanox Technologies, Ltd. | Computational accelerator for packet payload operations |
US10841243B2 (en) | 2017-11-08 | 2020-11-17 | Mellanox Technologies, Ltd. | NIC with programmable pipeline |
US10938784B2 (en) * | 2017-12-05 | 2021-03-02 | Assured Information Security, Inc. | Dedicating hardware devices to virtual machines in a computer system |
US10708240B2 (en) * | 2017-12-14 | 2020-07-07 | Mellanox Technologies, Ltd. | Offloading communication security operations to a network interface controller |
US10855587B2 (en) * | 2018-10-19 | 2020-12-01 | Oracle International Corporation | Client connection failover |
CN109522760B (zh) * | 2018-10-29 | 2020-08-14 | 北京博衍思创信息科技有限公司 | 一种基于硬件控制逻辑的数据转发控制方法及系统 |
US10824469B2 (en) | 2018-11-28 | 2020-11-03 | Mellanox Technologies, Ltd. | Reordering avoidance for flows during transition between slow-path handling and fast-path handling |
CN114095153A (zh) | 2020-08-05 | 2022-02-25 | 迈络思科技有限公司 | 密码数据通信装置 |
IL276538B2 (en) | 2020-08-05 | 2023-08-01 | Mellanox Technologies Ltd | A cryptographic device for data communication |
US11934658B2 (en) | 2021-03-25 | 2024-03-19 | Mellanox Technologies, Ltd. | Enhanced storage protocol emulation in a peripheral device |
US12117948B2 (en) | 2022-10-31 | 2024-10-15 | Mellanox Technologies, Ltd. | Data processing unit with transparent root complex |
US12007921B2 (en) | 2022-11-02 | 2024-06-11 | Mellanox Technologies, Ltd. | Programmable user-defined peripheral-bus device implementation using data-plane accelerator (DPA) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130018765A1 (en) * | 2011-07-15 | 2013-01-17 | International Business Machines Corporation | Securing applications on public facing systems |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160072787A1 (en) * | 2002-08-19 | 2016-03-10 | Igor V. Balabine | Method for creating secure subnetworks on a general purpose network |
US8578076B2 (en) * | 2009-05-01 | 2013-11-05 | Citrix Systems, Inc. | Systems and methods for establishing a cloud bridge between virtual storage resources |
US7953865B1 (en) * | 2009-12-28 | 2011-05-31 | Amazon Technologies, Inc. | Using virtual networking devices to manage routing communications between connected computer networks |
US7991859B1 (en) * | 2009-12-28 | 2011-08-02 | Amazon Technologies, Inc. | Using virtual networking devices to connect managed computer networks |
US20140007189A1 (en) * | 2012-06-28 | 2014-01-02 | International Business Machines Corporation | Secure access to shared storage resources |
US9525564B2 (en) * | 2013-02-26 | 2016-12-20 | Zentera Systems, Inc. | Secure virtual network platform for enterprise hybrid cloud computing environments |
US9699034B2 (en) * | 2013-02-26 | 2017-07-04 | Zentera Systems, Inc. | Secure cloud fabric to connect subnets in different network domains |
US10348767B1 (en) * | 2013-02-26 | 2019-07-09 | Zentera Systems, Inc. | Cloud over IP session layer network |
US9407519B2 (en) * | 2013-03-15 | 2016-08-02 | Vmware, Inc. | Virtual network flow monitoring |
US9535728B2 (en) * | 2013-03-18 | 2017-01-03 | International Business Machines Corporation | Scalable policy management in an edge virtual bridging (EVB) environment |
US10263870B2 (en) * | 2016-07-07 | 2019-04-16 | International Business Machines Corporation | Suspending and resuming virtual machines in a network |
-
2016
- 2016-12-14 DE DE102016124383.3A patent/DE102016124383B4/de not_active Expired - Fee Related
-
2017
- 2017-10-11 GB GB1817379.9A patent/GB2565458A/en not_active Withdrawn
- 2017-10-11 US US16/098,286 patent/US20190250938A1/en not_active Abandoned
- 2017-10-11 WO PCT/EP2017/075980 patent/WO2018073082A1/de active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130018765A1 (en) * | 2011-07-15 | 2013-01-17 | International Business Machines Corporation | Securing applications on public facing systems |
Also Published As
Publication number | Publication date |
---|---|
GB2565458A (en) | 2019-02-13 |
GB2565458A9 (en) | 2021-07-07 |
GB201817379D0 (en) | 2018-12-12 |
US20190250938A1 (en) | 2019-08-15 |
DE102016124383B4 (de) | 2018-05-09 |
DE102016124383A1 (de) | 2018-04-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE102016124383B4 (de) | Computersystem-Architektur sowie Computernetz-Infrastruktur, umfassend eine Mehrzahl von solchen Computersystem-Architekturen | |
DE69836271T2 (de) | Mehrstufiges firewall-system | |
DE60216218T2 (de) | Persönlicher Firewall mit Platzabhängiger Funktionalität | |
DE60315521T2 (de) | Kreuzungen von virtuellen privaten Netzwerken basierend auf Zertifikaten | |
US9503324B2 (en) | Systems and methods for enterprise mission management of a computer network | |
DE10052312B4 (de) | Automatische Sperre gegen unberechtigten Zugriff im Internet (Snoop Avoider) für virtuelle private Netze | |
DE112013004828T5 (de) | Bereitstellen von Diensten für virtuellen Overlay-Netzwerkverkehr | |
US8898782B2 (en) | Systems and methods for spontaneously configuring a computer network | |
DE19741239C2 (de) | Verallgemeinertes Sicherheitspolitik-Management-System und Verfahren | |
WO2016180181A1 (zh) | 业务功能的部署方法及装置 | |
EP3192226B1 (de) | Vorrichtung und verfahren zur steuerung eines kommunikationsnetzwerks | |
EP3479532B1 (de) | Einheit zur weiterleitung von datenpaketen in softwaredefinierten netzwerken | |
EP1417820B1 (de) | Verfahren und computersystem zur sicherung der kommunikation in netzwerken | |
WO2023227312A1 (de) | Verfahren zur gesicherten übermittlung zeitkritischer daten innerhalb eines kommunikationssystems und kommunikationssystem | |
EP3318033A1 (de) | Verfahren zum freischalten externer computersysteme in einer computernetz-infrastruktur, verteiltes rechnernetz mit einer solchen computernetz-infrastruktur sowie computerprogramm-produkt | |
WO2015185507A1 (de) | Verfahren zur kommunikation zwischen abgesicherten computersystemen, computernetz-infrastruktur sowie computerprogramm-produkt | |
DE60127187T2 (de) | System und verfahren zur bereitstellung von diensten in virtuellen privatnetzen | |
DE102015107071B3 (de) | Vorrichtung und Verfahren zur Steuerung eines Kommunikationsnetzwerks | |
WO2016008889A1 (de) | Verfahren zum freischalten externer computersysteme in einer computernetz-infrastruktur, verteiltes rechnernetz mit einer solchen computernetz-infrastruktur sowie computerprogramm-produkt | |
DE102018124235A1 (de) | Poisoning-schutz für prozessleit-switches | |
DE102022107431B3 (de) | Verfahren zum Nachrüsten einer Socks-Kompatibilität für zumindest eine Anwendung in einem Kraftfahrzeug sowie entsprechend eingerichtetes Kraftfahrzeug | |
DE10234562B4 (de) | Sichere Netzwerkarchitektur | |
WO2020065476A1 (de) | System und verfahren für einen zugriff auf daten in einem internen bereich | |
EP1903464A1 (de) | Verfahren und Steuerungsprogramm zur Verwaltung von Benutzerzugriffsrechten in einem Kommunikationsnetzwerk | |
DE102021127234A1 (de) | Authentifizierungsverkettung bei der bereitstellung von mikrofilialen |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ENP | Entry into the national phase |
Ref document number: 201817379 Country of ref document: GB Kind code of ref document: A Free format text: PCT FILING DATE = 20171011 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1817379.9 Country of ref document: GB |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17791607 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17791607 Country of ref document: EP Kind code of ref document: A1 |