Background
Cloud computing, as a new IT operating mode, is crucial to ensure reliable quality of service (QoS). The QoS guarantee of cloud computing is the key for improving the service satisfaction degree of cloud users, the utilization rate of cloud resources, the benefits of cloud service providers, the market competitiveness of cloud service providers and the continuous development. Due to the diversity of cloud service modes, virtualization of resources, and dynamic changes in user requirements, QoS implementation for cloud computing is more complex than traditional telecommunication services, web services, and grid services.
Currently, cloud service QoS guarantee is implemented by SLA (service level agreement). The SLA supported by AmazonEC2 provides an "availability" service guarantee, referred to as "percent annual run time," not less than 99.95%. Service "availability" metrics of GoGrid include server uptime, availability of storage, and availability of primary DNS services, and provide some monitoring metrics related to network performance, such as latency, packet loss rate, etc. However, the research on other QoS performance guarantee statements by cloud computing manufacturers is less, so that the deep research on SLA violation monitoring and processing in cloud computing and improvement of cloud service QoS guarantee are a challenge faced by the current cloud computing technology.
At present, some researchers have proposed solutions to different SLA violation monitoring, and the SLA violation detector uses statistical methods, such as statistical hypothesis testing and bayesian inference, and the SLAs-LoM2HiS framework effectively monitors cloud infrastructure, defines a general SLA violation handling template for the monitored SLA violations, and proposes an SLA violation handling flow on the basis of the template, giving application examples. However, these technical methods are all based on a single SLA violation, and are not considered for the situations of multiple SLA violations.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides an SLA violation monitoring method, which is used for further optimizing the matching rules of the conventional SLA violation monitoring and can extract the characteristics of suspicious behaviors from SLA non-violation data, so that a rule database is dynamically updated to cope with the increasingly complex network information interaction process.
The technical scheme of the invention is as follows:
an SLA violation monitoring method comprising:
acquiring a network data packet from a resource layer in real time, analyzing the network data packet and acquiring SLA parameters;
establishing a rule database for matching the SLA parameters, adopting the rule database to match the SLA parameters, obtaining SLA violation data and SLA non-violation data, giving an alarm to the SLA violation data, extracting suspicious characteristics of the SLA non-violation data, establishing suspicious rules according to the suspicious characteristics, and storing the suspicious rules to the rule database.
Further, the analyzing the network data packet and obtaining the SLA parameter includes:
obtaining the SLA parameters from the network data packets using a resource metric mapping, the resource metric mapping comprising a single mapping or a functional mapping.
Further, the single mapping comprises: and establishing SLA parameter indexes which are in one-to-one correspondence with the attributes of the resource layer, wherein all the SLA parameter indexes jointly form SLA parameters.
Further, the function mapping includes: according to the attribute of the resource layer, establishing a function taking the attribute as an independent variable, taking the dependent variable of the function as an SLA parameter index, and forming an SLA parameter by all the SLA parameter indexes.
Further, the extracting the suspicious features of the SLA non-violation data at least comprises: memory access speed, hard disk read speed, network latency, network bandwidth, or service availability.
Further, optimizing the rule database includes: and setting precision for the threshold value in the rule database, and changing the threshold value of the rule database in real time according to the data after receiving a plurality of real-time data.
Furthermore, the SLA non-violation data is firstly formatted for composing the service capability parameter of the underlying resource into a parameterized description of a high-level service level, and then suspicious features of the SLA non-violation data are extracted on the basis of the formatting.
Further, the formatting operation includes: definitional description or basic data computation.
The invention also relates to a storage device storing a plurality of instructions, said instructions being loaded by a processor and performing the following:
acquiring a network data packet from a resource layer in real time, analyzing the network data packet and acquiring SLA parameters;
establishing a rule database for matching the SLA parameters, adopting the rule database to match the SLA parameters, obtaining SLA violation data and SLA non-violation data, giving an alarm to the SLA violation data, extracting suspicious characteristics of the SLA non-violation data, establishing suspicious rules according to the suspicious characteristics, and storing the suspicious rules to the rule database.
The invention also provides an SLA violation monitoring system, which comprises a processor and a processor, wherein the processor is used for realizing each instruction; and storage means for storing a plurality of instructions, the instructions being loaded by the processor and performing the following:
acquiring a network data packet from a resource layer in real time, analyzing the network data packet and acquiring SLA parameters;
establishing a rule database for matching the SLA parameters, adopting the rule database to match the SLA parameters, obtaining SLA violation data and SLA non-violation data, giving an alarm to the SLA violation data, extracting suspicious characteristics of the SLA non-violation data, establishing suspicious rules according to the suspicious characteristics, and storing the suspicious rules to the rule database.
The invention has the beneficial effects that:
the invention further optimizes the matching rules of the prior SLA violation monitoring, not only can match SLA violation information in a historical SLA violation library, but also can extract the characteristics of suspicious behaviors in SLA non-violation data, thereby dynamically updating the rule database to deal with the increasingly complex network information interaction process.
The specific implementation mode is as follows:
the invention will be further illustrated with reference to the following examples and drawings:
it should be noted that the following detailed description is exemplary and is intended to provide further explanation of the disclosure. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments according to the present application. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, and it should be understood that when the terms "comprises" and/or "comprising" are used in this specification, they specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof, unless the context clearly indicates otherwise.
As mentioned in the background art, the current SLA violation usually adopts a general SLA violation handling template, and an SLA violation handling process is proposed on the template, but the method is directed to specific SLA violations, and if multiple different SLA violations are targeted, the template method will generate missed judgment and erroneous judgment. The pattern matching detection technology is mainly used for detecting known illegal behaviors. In a large-scale network, the detection time interval left for the detection system between massive parameter data packets is very short, and is calculated in microseconds, so that very high memory space is consumed, and therefore, a pattern matching algorithm is required to be simple and high-speed.
An exemplary embodiment of the present invention is a method for monitoring SLA violations, including: acquiring a network data packet from a resource layer in real time, analyzing the network data packet and acquiring SLA parameters; establishing a rule database for matching SLA parameters, adopting the rule database to match the SLA parameters, obtaining SLA violation data and SLA non-violation data, giving an alarm to the SLA violation data, extracting suspicious characteristics of the SLA non-violation data, establishing suspicious rules according to the suspicious characteristics, and simultaneously storing the suspicious rules into the rule database.
As shown in fig. 1, the first step of this embodiment is to obtain a network data packet from a resource layer in real time, analyze the network data packet, and obtain an SLA parameter, where a Snort system is adopted and optimized in this embodiment.
We use this framework to support mapping from underlying resource layer metrics to SLA parameter metrics. The service requester and the service responder agree on the resources used by the service and the QoS attributes through negotiation, and subscribe to the SLA. And stored in the SLA repository through the SLA executor. In the QoS repository, there are two types of static and dynamic storage, which are mainly used to store the service QoS attribute information of information. The SLA executor calculates real-time SLA parameter values by mapping the resource metrics to the SLA parameter metrics at intervals. Both the SLA repository and the QoS repository are stored in a rule base.
The resource metric mapping may be a single mapping or a functional mapping, but is not limited to other mapping modes in which SLA parameter information may be obtained.
The single mapping includes establishing SLA parameter indexes corresponding to the attributes of the resource layer, and all the SLA parameter indexes constitute SLA parameters. For example, one of the attributes of the resource layer is "disk space", which corresponds to the "storage" SLA parameter index of the SLA parameter index.
The function mapping includes: according to the attribute of the resource layer, establishing a function taking the attribute as an independent variable, taking the dependent variable of the function as an SLA parameter index, and forming an SLA parameter by all the SLA parameter indexes. For example, the resource layer has two attributes of normal operation time and downtime, and the two attributes can be used as independent variables to calculate the dependent variable of availability.
Next, we use SLA parameter information to monitor violations, specifically, we use Snort-based system to monitor violations, as shown in FIG. 2.
Snort is a lightweight violation detection system, which comprises a data packet acquisition module, a data packet decoder, a detection engine, a preprocessing module, an output module (a log and alarm subsystem) and the like. Capturing a network data packet by using a Snort system, then preprocessing the network data packet, matching the preprocessed network data packet in a known rule database to obtain SLA violation data and SLA non-violation data, alarming the SLA violation data, extracting suspicious characteristics of the SLA non-violation data, establishing suspicious rules according to the suspicious characteristics, and storing the suspicious rules into the rule database, as shown in figure 3.
The rule database stores the characteristics of normal data filtered by Snort, the optimization processing module is responsible for optimizing the rule database according to a certain rule, setting the precision of a threshold value in the rule database, changing the threshold value of the rule database in real time according to data after receiving certain real-time data, extracting the characteristics of suspicious behaviors from the characteristic database, and adding the memory access speed, the hard disk reading speed, the network delay, the network bandwidth and the service availability in the characteristic data of the suspicious behaviors into the abnormal characteristic database of the Snort. The outflow data processing module is responsible for formatting normal data filtered by Snort, and the formatted data accords with a high-level service level and is no longer simple low-level resource service capability. Therefore, when a network violation monitoring module based on rule matching is constructed, a rule matching algorithm and rule establishment in a monitoring engine are mainly considered.
In terms of the configuration of the matching rule, the description is made according to the Snort rule construction method. Based on the currently obtained component database, a relevant rule base is established, and the rule base basically comprises all types of the current violations.
And log output and alarm are carried out on SLA violation data, and response is mainly taken to the determined violation behaviors. The system comprises a log/alarm module, a rule-based monitoring module and a rule-based monitoring module, wherein the log/alarm module is mainly started by two detection engines, and can immediately give an alarm once illegal behaviors are found.
The invention also relates to a storage device storing a plurality of instructions, said instructions being loaded by a processor and performing the following:
acquiring a network data packet from a resource layer in real time, analyzing the network data packet and acquiring SLA parameters;
establishing a rule database for matching the SLA parameters, adopting the rule database to match the SLA parameters, obtaining SLA violation data and SLA non-violation data, giving an alarm to the SLA violation data, extracting suspicious characteristics of the SLA non-violation data, establishing suspicious rules according to the suspicious characteristics, and storing the suspicious rules to the rule database.
The invention also provides an SLA violation monitoring system, which comprises a processor and a processor, wherein the processor is used for realizing each instruction; and storage means for storing a plurality of instructions, the instructions being loaded by the processor and performing the following:
acquiring a network data packet from a resource layer in real time, analyzing the network data packet and acquiring SLA parameters;
establishing a rule database for matching the SLA parameters, adopting the rule database to match the SLA parameters, obtaining SLA violation data and SLA non-violation data, giving an alarm to the SLA violation data, extracting suspicious characteristics of the SLA non-violation data, establishing suspicious rules according to the suspicious characteristics, and storing the suspicious rules to the rule database.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.