吉林大学学报(信息科学版) ›› 2023, Vol. 41 ›› Issue (5): 945-951.

• • 上一篇    下一篇

基于活跃-空闲能耗的云主机访问监控算法

李东林   

  1. 首都医科大学附属北京朝阳医院 宣传中心, 北京 100020
  • 收稿日期:2022-07-19 出版日期:2023-10-09 发布日期:2023-10-11
  • 作者简介:李东林(1981— ), 男, 黑龙江青冈人, 首都医科大学助理工程师, 主要从事系统集成、 系统规划、 网络安全、 网络工程 和多媒体应用等研究, (Tel)86-13811595081(E-mail)jytflkm54@ 163. com。
  • 基金资助:
    首都医科大学附属北京朝阳医院全媒体舆情监控基金资助项目(本部-B-宣传中心-2021-32)

Cloud Host Access Monitoring Algorithm Based on Active Idle Energy Consumption

LI Donglin   

  1. Media Service Center, Beijing Chaoyang Hospital, Capital Medical University, Beijing 100020, China
  • Received:2022-07-19 Online:2023-10-09 Published:2023-10-11

摘要: 由于传统云端访问安全监控方法无法识别访问数据的伪显特征, 服务器易受存储空间限制, 导致监控 效果和数据保密性较差。 为了能察觉网络攻击, 及时做出应对方案, 提出了基于活跃能耗与空闲能耗的云主机 访问安全监控算法。 利用离散小波变换方法处理云主机访问页面入侵信息, 得到数据自相关函数, 放大倍数中 雷同性, 分割成不同聚合序列; 通过计算节点能量消耗, 得到活跃与空闲状态能耗, 增加访问路径节点活跃 时隙次数, 均衡网络能量负载, 延长网络使用周期; 以网络访问特点构成云主机网络的多角度分析模型, 明确 其特征功能与处理形式, 获得全部云主机访问有效域数据, 提高处理器应用率, 算出时间平均数, 感知云主机 访问安全状况。 实验结果表明, 所提算法能监控攻击情况, 误报率更低, 检出精准度接近 100% , 优于其他 两种算法, 证明了该方法的有效性。

关键词: 活跃能耗, 空闲能耗, 云主机网络, 访问安全监控, 攻击信息预处理

Abstract:

Traditional cloud access security monitoring methods can not identify the pseudo characteristics of access data, and the server is vulnerable to storage space constraints, resulting in poor monitoring effect and data confidentiality. In order to detect network attacks and make timely response plans, a virtual machine access security monitoring algorithm based on active energy consumption and idle energy consumption is proposed. Using discrete wavelet transform method to process intrusion information of virtual machine access pages, the data autocorrelation function is obtained, and the amplification factor is the same, which is divided into different aggregation sequences. By calculating the energy consumption of nodes, the energy consumption of active and idle states are obtained, increasing the number of active slots of access path nodes, balancing the network energy load, and extending the network life cycle. A multi angle analysis model of virtual machine network is formed based on the characteristics of network access, its characteristic functions and processing forms are clarified. All virtual machine access effective domain data are obtained, the processor application rate is improved, the time average is calculated, and the security status of virtual machine access is perceived. Experimental results show that the proposed algorithm can monitor the attack situation with lower false positive rate and close to 100% detection accuracy, which is superior to the other two algorithms and proves the effectiveness of the proposed method.

Key words: active energy consumption, idle energy consumption, virtual machine network, access security monitoring, attack information preprocessing

中图分类号: 

  • TP309. 2