| The cloud security operation management system described in this paper is one of the supporting software tools developed by the kexun company for the application of cloud security for small and medium enterprises.It provides users with the management support that covers host security,network security and application security.It has the ability of blocking attack requests,autonomous definition of security operation rules,filtering white list information,at the same time have a good performance price ratio.This paper discusses the design and implementation of the system.The system is developed using IDEA,the system uses B/S architecture for development and design,Webx framework for Web layer implementation,and My SQL for database management.The system is developed based on the user's specific needs and advanced customization features.According to the functional requirements,the entire system can be divided into security function settings,custom rules,white list settings,security reports,cloud synchronization and other modules.The system blocks blocking Web attacks and brute force attacks by sending blocking messages.At the same time,users can customize WebShell,Web attacks,vulnerability recovery,vulnerability scanning rules,and synchronize the latest vulnerabilities and attacks from public clouds.The method supplements the default rules,improves the detection capability of the system,and implements the function of whitelist filtering.It makes the display of the page more consistent with the needs of the user and is more reasonable.Moreover,in order to facilitate users to understand the safety of the entire environment in a timely manner,the environment can be sent to users by mail for the past day,one week,one month's security.After the development and testing of the system has been initially applied,in the actual use of the system,the system provides users with blocking brute force cracking,Web attacks;security information and important intelligence reference;custom operating rules,strengthen system detection capabilities;the network environment The security status is sent to the user to facilitate the user's timely handling of security events and other functions to meet the user's needs.The performance indicators of the system can meet the requirements of the design and are in good condition.They have been put into use by enterprises and governments. |