CN108881298A - A kind of network safety system and implementation method based on big data platform - Google Patents

A kind of network safety system and implementation method based on big data platform Download PDF

Info

Publication number
CN108881298A
CN108881298A CN201810852764.1A CN201810852764A CN108881298A CN 108881298 A CN108881298 A CN 108881298A CN 201810852764 A CN201810852764 A CN 201810852764A CN 108881298 A CN108881298 A CN 108881298A
Authority
CN
China
Prior art keywords
module
data
information
electrically connected
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810852764.1A
Other languages
Chinese (zh)
Inventor
汪海波
程乐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaian Vocational College of Information Technology
Original Assignee
Huaian Vocational College of Information Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaian Vocational College of Information Technology filed Critical Huaian Vocational College of Information Technology
Priority to CN201810852764.1A priority Critical patent/CN108881298A/en
Publication of CN108881298A publication Critical patent/CN108881298A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a kind of network safety system and implementation method based on big data platform, the network safety system includes logging in identification module, security module and server, the login identification module includes information acquisition module, information analysis module, the first memory module and data transmission module, the security module includes network monitoring module, alarm modules and emergency processing module, and the server includes data reception module, management module and the second memory module.The present invention devises a kind of network safety system and implementation method based on big data platform, the detection of voltage, temperature is carried out by temperature detecting module and voltage detection module, the monitoring of program is carried out by program monitoring module, the safety of big data platform is controlled in real time, user is logged in simultaneously and is limited, the case where effectively enhancing the confidentiality of information, reducing leaking data, safely and effectively.

Description

A kind of network safety system and implementation method based on big data platform
Technical field
The present invention relates to big data processing technology field, specifically a kind of network safety system based on big data platform and Implementation method.
Background technique
With social progress and development, network world is also more and more flourishing, and popularizing for mobile Internet is brought to us Great convenience, various data informations are just showing fulminant growing trend, and big data occupies us gradually Life.
Nowadays, many fields can see the figure of big data, and the safety about big data platform also gradually at For our focus of attention, and the understanding with people to big data platform, layer goes out phenomena such as information leakage, criminal's attack Not poor, this brings great unstability for our life.
For above situation, it would be desirable to a kind of network safety system and implementation method based on big data platform is designed, Limit user log-on message, reinforce user information detection, while also need to prevent information from distorting, information theft the case where, This is our problem urgently to be resolved.
Summary of the invention
The purpose of the present invention is to provide a kind of network safety system and implementation method based on big data platform, to solve The problems of the prior art.
To achieve the above object, the present invention provides the following technical solutions:A kind of network security system based on big data platform System, the network safety system include logging in identification module, security module and server, and the login identification module includes information Acquisition module, information analysis module, the first memory module and data transmission module, the information acquisition module are deposited with first respectively Module, information analysis module electrical connection are stored up, the information analysis module is electrically connected with the first memory module, the information analysis mould Block is electrically connected with data transmission module;The security module includes network monitoring module, alarm modules and emergency processing module, institute Network monitoring module, emergency processing module and alarm modules are stated to be sequentially connected electrically;The server includes data reception module, pipe Reason module and the second memory module, the data transmission module, alarm modules are electrically connected with data reception module respectively, the number It is sequentially connected electrically according to receiving module, management module and the second memory module.
A kind of network safety system is devised in the present invention, including logging in identification module, server and security module, The account of user can be identified by logging in identification module, confirm user identity;Security module can monitor big data in real time The security performance of platform can detecte the information such as temperature, the voltage of hardware, can be with first when temperature, voltage etc. change Preset fluctuation information compares in confirmation module, and carries out carry out subsequent processing, while security module according to comparing result Virus can be monitored according to the data cases of program, and carries out cleaning crushing operation when finding virus;Server can connect Access application is received, and the first memory space is logged according to the account of user and carries out queried access operation, it is convenient and practical.
Further, the information acquisition module includes account acquisition module and authentication module, the information analysis Module includes account receiving module and encrypting module, first memory module include first database, data analysis module and Instruction module, the data analysis module include data identification module and data contrast module;The account acquisition module, account Receiving module, data identification module and data contrast module are sequentially connected electrically, and the database is electrically connected with data comparison module, The data comparison module is electrically connected with encrypting module, instruction module respectively, and described instruction module is electrically connected with authentication module It connects, the authentication module is electrically connected with encrypting module, first database respectively, the encrypting module and data transmission module Electrical connection.
The present invention logs in identification module and devises encrypting module, first memory module etc., and wherein account number acquisition module can The account of user's input is acquired, first database can carry out account saving the operation such as inquiry, while data point Analysis module can be compared according to collected account with the historical information of storage, and whether detection user is to step on for the first time Record then needs to carry out authentication if first login, can just continue to operate in next step after carrying out authentication, if Had log in history, then can directly carry out cryptographic operation, encrypting module can the account to user carry out at encryption Situations such as managing, avoiding the occurrence of leaking data reduces risk.
Further, the network monitoring module include temperature detecting module, voltage detection module, program monitoring module, Anti-viral detection module and validation of information module, the validation of information module include first information confirmation module and the second validation of information Module;The temperature detecting module, voltage detection module are electrically connected with first information confirmation module respectively, and described program monitors mould Block, anti-viral detection module and the second validation of information module are sequentially connected electrically;The emergency processing module includes immediate memory module With virus sweep module, the first information confirmation module is electrically connected with immediate memory module, the second validation of information module It is electrically connected with virus sweep module, the immediate memory module, virus sweep module are electrically connected with alarm modules respectively, the police Report module is electrically connected with data reception module.
Temperature detecting module, voltage detection module etc. are devised in the present invention, wherein temperature detecting module and voltage detecting Module can detecte the temperature of hardware, voltage change situation, and determine to operate in next step by the first confirmation module, if warm When mutation occurs for degree, voltage, immediate memory module can carry out short-term memory to data information;Program monitoring module can be real-time The data variation of program is detected, and viral diagnosis is carried out to program by anti-viral detection module by data run situation, and pass through If the second confirmation module is reaffirmed appearance virus, virus sweep module carries out self to adventitious viruses and removes;Alarm Module can sound an alarm server according to the disposition of emergency processing module.
Further, the management module includes deciphering module, access request module and alert request module, the data Receiving module is electrically connected with deciphering module, alert request module respectively, and the deciphering module is electrically connected with access request module;Institute Stating the second memory module includes the first protection module, the second protection module, the first memory space, the second memory space and data powder Broken module, the access request module are electrically connected with the first protection module, and the alert request module protects mould with first respectively Block, the electrical connection of the second protection module;First protection module, the first memory space, the second protection module, the second memory module It is sequentially connected electrically, first protection module is electrically connected with data crushing module, and the data crushing module and the first storage are empty Between be electrically connected;Second memory module further includes self-locking module, and second protection module and self-locking module are sequentially connected electrically, The self-locking module is electrically connected with the second memory space.
Operation, effective protection transmission letter the encrypted ciphertext of encrypting module can be decrypted in deciphering module in the present invention The case where ceasing, greatly reducing information leakage;Two memory spaces have also been devised in the present invention, wherein the first memory space can be for User such as inquires, accesses at the operation, and the second memory space is not opened to the outside world, while the information of the first memory space can pass through It saves after filtration treatment to the second memory space;First protection module and the second protection module are that server increases twice protection Barrier can effectively forbid the access application not allowed access into and external program;Data crushing module can be deposited promptly by first The useful information for storing up space carries out pulverization process, while self-locking module can allow the progress of the second memory space self-locking, effectively forbid External malicious access program, increases the confidentiality of information, realizes the function of effective protection.
A kind of implementation method of the network safety system based on big data platform, includes the following steps:
1) when user needs to access big data platform, account acquisition module acquires user and logs in used account number, and will It logs in account and is sent to account number receiving module, while security module is opened, and carries out safety to entire big data platform in real time Monitoring;
2) account number receiving module receives account, and account is sent to data identification module, is identified by data Module carries out identification verifying, when identification display is correct, directly arrives step 3);When identification display mistake, direct end operation;
3) account is transmitted to data comparison module by data identification module, and data comparison module receives account simultaneously It extracts the historical correlation data stored in first database to compare, if comparison is unsuccessful, directly arrives step 4);If comparison at Function, then data comparison module sends a command to encrypting module, directly arrives step 5);
4) instruction module receives the comparison feedback information of data comparison module transfer, and sends instructions to authentication mould Block is carried out identity information record by authentication module and is stored identity information to first database, sends a command to simultaneously Encrypting module;
5) encrypting module receives account information, carries out cryptographic operation, and encrypted ciphertext is transmitted to data transmission Module is transmitted to the data reception module of server by data transmission module;
6) data reception module receives ciphertext and ciphertext is transmitted to deciphering module, and behaviour is decrypted by deciphering module Make, while extracting access request from the information after decryption, received by access request module and Shen is sent to the first protection module It please order;
7) the first protection module receives order, and the first memory space is open, and user can enter the first memory space, freely visits Ask the information data in the first memory space of inquiry, the second memory space is in close state at this time, and user cannot be introduced into second Memory space is operated;Information meeting real-time Transmission to the second memory space of the first memory space is stored simultaneously.
Further, the implementation method of the security module includes the following steps:
1) temperature detecting module, the temperature of voltage detection module acquisition hardware, voltage condition, and collected data are passed The first confirmation module is transported to, and is compared with preset temperature, the fluctuation situation of voltage in the first confirmation module, if comparing knot Fruit shows that normally then collected data store to the first confirmation module and continue to detect;If comparison result shows mistake, Directly arrive step 3);
2) program monitoring module monitoring programme operation process, if program issues data perturbation situation, then program monitors mould Block interception disorder data are simultaneously transmitted to anti-viral detection module, and anti-viral detection module carries out viral diagnosis, and will test result transmission Confirmed to the second confirmation module, if safety, program continue to run as the result is shown for confirmation;If confirmation is dangerous as the result is shown, Directly arrive step 3);
3) immediate memory module receives the feedback information of the first confirmation module, and is temporarily saved to data, sends out simultaneously Send instruction to alarm modules;Virus sweep module receives the feedback information of the second confirmation module, and carries out to the virus detected Primary remove crushes, if removing successfully, program is continued to run, if removing failure, virus sweep module sends a command to police Report module;Alarm modules receive immediate memory module respectively, virus eliminates the command information of module transfer, and result is delivered to The data reception module of server;
4) data reception module receives data, and is protected warning information Distributed Transmission to first by alert request module Module, the second protection module;First protection module receives alarm and opening protection function, while sending a command to data crushing module, The storing data of the first memory space is crushed by data crushing module;Second protection module receives alarm and opens anti- Shield, while self-locking module is sent a command to, the second memory space realizes self-locking function, forbids the external access of malice.
Encrypting module of the present invention encrypts information using RSA cryptographic algorithms.
Compared with prior art, the beneficial effects of the invention are as follows:When the present invention is implemented, account number is carried out by account number acquisition module Account number receiving module is acquired and is transmitted to, account number receiving module, which receives and passes through data identification module, knows account Not, whether the account number that confirmation user uses has the qualification of access big data platform, if this account number is not eligible for, register Failure, if this account number is qualified, is compared by data comparison module and the history access information in first database, right Than it is successful when show that account number had log in history, then account number is encrypted in encrypting module;Show to use when comparing unsuccessful Family is first login, then needs to send instructions to authentication module by instruction module, carries out body by authentication module Part verifying, and captured identity data are stored to first database, then the corresponding account of secondary identity information is carried out encryption behaviour Make;Ciphertext is transmitted to after encrypting module encryption information by data transmission module the data reception module of server.
After data reception module receives ciphertext, operation is decrypted to ciphertext by deciphering module, and by the information after decryption In access application information extract, received by access request module and be sent to the first protection module, the first protection module User can carry out the first memory space and carry out the operation such as query search after verifying is correct, and the second memory space, which is in, at this time closes State, user cannot be introduced into the second memory module and operate.
Security module can real-time detecting system safety, temperature detecting module and voltage detection module can be with temperature collections, electricity The situation of change of pressure is compared with preset fluctuation information in the first confirmation module, can be by i.e. if variation is larger When memory module carry out short-term memory, and send alarm to server by alarm modules;Program monitoring module can detecte program Middle data run situation, and viral diagnosis is carried out to disorder data, if detect virus, carried out by virus sweep module primary It removes, if removing successfully, program is continued to run, if removing is unsuccessful, sends alarm to server by alarm modules.
Server is received after receiving alarm by alarm receiver module, and sends a command to the first protection module and the second protection Module, the first protection module, the second protection module are in open state at this time, while the valid data of the first memory space are logical It crosses crushing module and carries out pulverization process, the second memory space carries out self-locking operation by self-locking module.
The present invention devises a kind of network safety system and implementation method based on big data platform, passes through temperature detection mould Block and voltage detection module carry out the detection of voltage, temperature, and the monitoring of program is carried out by program monitoring module, control in real time big The safety of data platform, while user is logged in and is limited, the confidentiality of information is effectively enhanced, leaking data is reduced Situation, safely and effectively.
Detailed description of the invention
In order that the present invention can be more clearly and readily understood, right below according to specific embodiment and in conjunction with attached drawing The present invention is described in further detail.
Fig. 1 is a kind of integral module signal of network safety system and implementation method based on big data platform of the present invention Figure;
Fig. 2 is a kind of login identification module of network safety system and implementation method based on big data platform of the present invention Module diagram;
Fig. 3 is a kind of module of the security module of network safety system and implementation method based on big data platform of the present invention Schematic diagram;
Fig. 4 is that a kind of module of the server of network safety system and implementation method based on big data platform of the present invention is shown It is intended to;
Fig. 5 is a kind of login identification module stream of network safety system and implementation method based on big data platform of the present invention Journey schematic diagram;
Fig. 6 is a kind of part of the security module of network safety system and implementation method based on big data platform of the present invention Flow diagram;
Fig. 7 is a kind of program monitoring module stream of network safety system and implementation method based on big data platform of the present invention Journey schematic diagram.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
As shown in Figure 1, a kind of network safety system based on big data platform, the network safety system includes logging in know Other module, security module and server, the login identification module include information acquisition module, information analysis module, first deposit Storage module and data transmission module, the information acquisition module are electrically connected with the first memory module, information analysis module respectively, institute It states information analysis module to be electrically connected with the first memory module, the information analysis module is electrically connected with data transmission module;It is described Security module includes network monitoring module, alarm modules and emergency processing module, the network monitoring module, emergency processing module It is sequentially connected electrically with alarm modules;The server includes data reception module, management module and the second memory module, the number It is electrically connected respectively with data reception module according to transmission module, alarm modules, the data reception module, management module and second are deposited Storage module is sequentially connected electrically.
A kind of network safety system is devised in the present invention, including logging in identification module, server and security module, The account of user can be identified by logging in identification module, confirm user identity;Security module can monitor big data in real time The security performance of platform can detecte the information such as temperature, the voltage of hardware, can be with history when temperature, voltage etc. change The change information of storage compares, and carries out carry out subsequent processing according to comparing result, while security module can be according to journey The data cases of sequence carry out cleaning crushing operation when finding virus to monitor virus;Server can receive access Shen Please, and the first memory space is logged according to the account of user and carries out queried access operation, it is convenient and practical.
As shown in Fig. 2, the information acquisition module includes account acquisition module and authentication module, the information analysis Module includes account receiving module and encrypting module, first memory module include first database, data analysis module and Instruction module, the data analysis module include data identification module and data contrast module;The account acquisition module, account Receiving module, data identification module and data contrast module are sequentially connected electrically, and the database is electrically connected with data comparison module, The data comparison module is electrically connected with encrypting module, instruction module respectively, and described instruction module is electrically connected with authentication module It connects, the authentication module is electrically connected with encrypting module, first database respectively, the encrypting module and data transmission module Electrical connection.
The present invention logs in identification module and devises encrypting module, first memory module etc., and wherein account number acquisition module can The account of user's input is acquired, first database can carry out account saving the operation such as inquiry, while data point Analysis module can be compared according to collected account with the historical information of storage, and whether detection user is to step on for the first time Record then needs to carry out authentication if first login, can just continue to operate in next step after carrying out authentication, if Had log in history, then can directly carry out cryptographic operation, encrypting module can the account to user carry out at encryption Situations such as managing, avoiding the occurrence of leaking data reduces risk.
As shown in figure 3, the network monitoring module include temperature detecting module, voltage detection module, program monitoring module, Anti-viral detection module and validation of information module, the validation of information module include first information confirmation module and the second validation of information Module;The temperature detecting module, voltage detection module are electrically connected with first information confirmation module respectively, and described program monitors mould Block, anti-viral detection module and the second validation of information module are sequentially connected electrically;The emergency processing module includes immediate memory module With virus sweep module, the first information confirmation module is electrically connected with immediate memory module, the second validation of information module It is electrically connected with virus sweep module, the immediate memory module, virus sweep module are electrically connected with alarm modules respectively, the police Report module is electrically connected with data reception module.
Temperature detecting module, voltage detection module etc. are devised in the present invention, wherein temperature detecting module and voltage detecting Module can detecte the temperature of hardware, voltage change situation, and determine to operate in next step by the first confirmation module, if warm When mutation occurs for degree, voltage, immediate memory module can carry out short-term memory to data information;Program monitoring module can be real-time The data variation of program is detected, and viral diagnosis is carried out to program by anti-viral detection module by data run situation, and pass through If the second confirmation module is reaffirmed appearance virus, virus sweep module carries out self to adventitious viruses and removes;Alarm Module can sound an alarm server according to the disposition of emergency processing module.
As shown in figure 4, the management module includes deciphering module, access request module and alert request module, the number It is electrically connected respectively with deciphering module, alert request module according to receiving module, the deciphering module is electrically connected with access request module; Second memory module includes the first protection module, the second protection module, the first memory space, the second memory space and data Module is crushed, the access request module is electrically connected with the first protection module, and the alert request module is protected with first respectively Module, the electrical connection of the second protection module;First protection module, the first memory space, the second protection module, the second storage mould Block is sequentially connected electrically, and first protection module is electrically connected with data crushing module, the data crushing module and the first storage Space electrical connection;Second memory module further includes self-locking module, and second protection module and self-locking module are successively electrically connected It connects, the self-locking module is electrically connected with the second memory space.
Operation, effective protection transmission letter the encrypted ciphertext of encrypting module can be decrypted in deciphering module in the present invention The case where ceasing, greatly reducing information leakage;Two memory spaces have also been devised in the present invention, wherein the first memory space can be for User such as inquires, accesses at the operation, and the second memory space is not opened to the outside world, while the information of the first memory space can pass through It saves after filtration treatment to the second memory space;First protection module and the second protection module are that server increases twice protection Barrier can effectively forbid the access application not allowed access into and external program;Data crushing module can be deposited promptly by first The useful information for storing up space carries out pulverization process, while self-locking module can allow the progress of the second memory space self-locking, effectively forbid External malicious access program, increases the confidentiality of information, realizes the function of effective protection.
As shown in Fig. 5, Fig. 6, Fig. 7, a kind of implementation method of the network safety system based on big data platform, including it is following Step:
1) when user needs to access big data platform, account acquisition module acquires user and logs in used account number, and will It logs in account and is sent to account number receiving module, while security module is opened, and carries out safety to entire big data platform in real time Monitoring;
2) account number receiving module receives account, and account is sent to data identification module, is identified by data Module carries out identification verifying, when identification display is correct, directly arrives step 3);When identification display mistake, direct end operation;
3) account is transmitted to data comparison module by data identification module, and data comparison module receives account simultaneously It extracts the historical correlation data stored in first database to compare, if comparison is unsuccessful, directly arrives step 4);If comparison at Function, then data comparison module sends a command to encrypting module, directly arrives step 5);
4) instruction module receives the comparison feedback information of data comparison module transfer, and sends instructions to authentication mould Block is carried out identity information record by authentication module and is stored identity information to first database, sends a command to simultaneously Encrypting module;
5) encrypting module receives account information, carries out cryptographic operation, and encrypted ciphertext is transmitted to data transmission Module is transmitted to the data reception module of server by data transmission module;
6) data reception module receives ciphertext and ciphertext is transmitted to deciphering module, and behaviour is decrypted by deciphering module Make, while extracting access request from the information after decryption, received by access request module and Shen is sent to the first protection module It please order;
7) the first protection module receives order, and the first memory space is open, and user can enter the first memory space, freely visits Ask the information data in the first memory space of inquiry, the second memory space is in close state at this time, and user cannot be introduced into second Memory space is operated;Information meeting real-time Transmission to the second memory space of the first memory space is stored simultaneously.
The implementation method of the security module includes the following steps:
1) temperature detecting module, the temperature of voltage detection module acquisition hardware, voltage condition, and collected data are passed The first confirmation module is transported to, and is compared with the fluctuation situation of the preset temperature, voltage that are stored in the first confirmation module, if Comparison result shows that normally then collected data store to the first confirmation module and continue to detect;If comparison result is aobvious Show mistake, directly arrives step 3);
2) program monitoring module monitoring programme operation process, if program issues data perturbation situation, then program monitors mould Block interception disorder data are simultaneously transmitted to anti-viral detection module, and anti-viral detection module carries out viral diagnosis, and will test result transmission Confirmed to the second confirmation module, if safety, program continue to run as the result is shown for confirmation;If confirmation is dangerous as the result is shown, Directly arrive step 3);
3) immediate memory module receives the feedback information of the first confirmation module, and is temporarily saved to data, sends out simultaneously Send instruction to alarm modules;Virus sweep module receives the feedback information of the second confirmation module, and carries out to the virus detected Primary remove crushes, if removing successfully, program is continued to run, if removing failure, virus sweep module sends a command to police Report module;Alarm modules receive immediate memory module respectively, virus eliminates the command information of module transfer, and result is delivered to The data reception module of server;
4) data reception module receives data, and is protected warning information Distributed Transmission to first by alert request module Module, the second protection module;First protection module receives alarm and opening protection function, while sending a command to data crushing module, The storing data of the first memory space is crushed by data crushing module;Second protection module receives alarm and opens anti- Shield, while self-locking module is sent a command to, the second memory space realizes self-locking function, forbids the external access of malice.
Encrypting module of the present invention encrypts information using RSA cryptographic algorithms.
When the present invention is implemented, account number acquisition is carried out by account number acquisition module and is transmitted to account number receiving module, account number receives Module receives and passes through data identification module and identifies to account, and whether the account number that confirmation user uses has access big The qualification of data platform, if this account number is not eligible for, register failure if this account number is qualified, passes through data comparison Module is compared with the history access information in first database, shows that account number had log in history when comparing successfully, then plus Account number is encrypted in close module;Show that user is first login when comparing unsuccessful, then needs to send out by instruction module It send instruction to authentication module, authentication is carried out by authentication module, and captured identity data are stored to the first number Cryptographic operation is carried out according to library, then by the corresponding account of secondary identity information;Mould is transmitted by data after encrypting module encryption information Ciphertext is transmitted to the data reception module of server by block.
After data reception module receives ciphertext, operation is decrypted to ciphertext by deciphering module, and by the information after decryption In access application information extract, received by access request module and be sent to the first protection module, the first protection module User can carry out the first memory space and carry out the operation such as query search after verifying is correct, and the second memory space, which is in, at this time closes State, user cannot be introduced into the second memory module and operate.
Security module can real-time detecting system safety, temperature detecting module and voltage detection module can be with temperature collections, electricity The situation of change of pressure carries out confirmation comparison, if variation is larger, meeting by the presupposed information stored by the first confirmation module Short-term memory is carried out by immediate memory module, and sends alarm to server by alarm modules;Program monitoring module can be examined Data run situation in ranging sequence, and to disorder data carry out viral diagnosis, if detect virus, by virus sweep module into Row is primary to be removed, if removing successfully, program is continued to run, if removing is unsuccessful, is sent alarm by alarm modules and is extremely serviced Device.
Server is received after receiving alarm by alarm receiver module, and sends a command to the first protection module and the second protection Module, the first protection module, the second protection module are in open state at this time, while the valid data of the first memory space are logical It crosses crushing module and carries out pulverization process, the second memory space carries out self-locking operation by self-locking module.
The present invention devises a kind of network safety system and implementation method based on big data platform, passes through temperature detection mould Block and voltage detection module carry out the detection of voltage, temperature, and the monitoring of program is carried out by program monitoring module, control in real time big The safety of data platform, while user is logged in and is limited, the confidentiality of information is effectively enhanced, leaking data is reduced Situation, safely and effectively.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included within the present invention.Any reference signs in the claims should not be construed as limiting the involved claims.

Claims (6)

1. a kind of network safety system based on big data platform, it is characterised in that:The network safety system includes logging in know Other module, security module and server, the login identification module include information acquisition module, information analysis module, first deposit Storage module and data transmission module, the information acquisition module are electrically connected with the first memory module, information analysis module respectively, institute It states information analysis module to be electrically connected with the first memory module, the information analysis module is electrically connected with data transmission module;It is described Security module includes network monitoring module, alarm modules and emergency processing module, the network monitoring module, emergency processing module It is sequentially connected electrically with alarm modules;The server includes data reception module, management module and the second memory module, the number It is electrically connected respectively with data reception module according to transmission module, alarm modules, the data reception module, management module and second are deposited Storage module is sequentially connected electrically.
2. a kind of network safety system based on big data platform according to claim 1, it is characterised in that:The information Acquisition module includes account acquisition module and authentication module, and the information analysis module includes account receiving module and encryption Module, first memory module include first database, data analysis module and instruction module, the data analysis module packet Include data identification module and data contrast module;The account acquisition module, account receiving module, data identification module and data Contrast module is sequentially connected electrically, and the database is electrically connected with data comparison module, the data comparison module respectively with encryption Module, instruction module electrical connection, described instruction module is electrically connected with authentication module, the authentication module respectively with add Close module, first database electrical connection, the encrypting module are electrically connected with data transmission module.
3. a kind of network safety system based on big data platform according to claim 2, it is characterised in that:The network Monitoring module includes temperature detecting module, voltage detection module, program monitoring module, anti-viral detection module and validation of information mould Block, the validation of information module include first information confirmation module and the second validation of information module;The temperature detecting module, electricity Pressure detection module is electrically connected with first information confirmation module respectively, described program monitoring module, anti-viral detection module and the second letter Breath confirmation module is sequentially connected electrically;The emergency processing module includes immediate memory module and virus sweep module, and described first Validation of information module is electrically connected with immediate memory module, and the second validation of information module is electrically connected with virus sweep module, institute State immediate memory module, virus sweep module is electrically connected with alarm modules respectively, the alarm modules and data reception module electricity Connection.
4. a kind of network safety system based on big data platform according to claim 3, it is characterised in that:The management Module includes deciphering module, access request module and alert request module, the data reception module respectively with deciphering module, police Request module electrical connection is reported, the deciphering module is electrically connected with access request module;Second memory module includes first anti- Protect module, the second protection module, the first memory space, the second memory space and data crushing module, the access request module It is electrically connected with the first protection module, the alert request module is electrically connected with the first protection module, the second protection module respectively;Institute It states the first protection module, the first memory space, the second protection module, the second memory module to be sequentially connected electrically, first protection Module is electrically connected with data crushing module, and the data crushing module is electrically connected with the first memory space;The second storage mould Block further includes self-locking module, and second protection module and self-locking module are sequentially connected electrically, the self-locking module and the second storage Space electrical connection.
5. a kind of implementation method of the network safety system based on big data platform, which is characterized in that include the following steps:
1) when user needs to access big data platform, account acquisition module acquires user and logs in used account number, and will log in Account is sent to account number receiving module, while security module is opened, and carries out security monitoring to entire big data platform in real time;
2) account number receiving module receives account, and account is sent to data identification module, by data identification module Identification verifying is carried out, when identification display is correct, directly arrives step 3);When identification display mistake, direct end operation;
3) account is transmitted to data comparison module by data identification module, and data comparison module receives account and extracts The historical correlation data stored in first database compares, if comparison is unsuccessful, directly arrives step 4);If comparing successfully, Then data comparison module sends a command to encrypting module, directly arrives step 5);
4) instruction module receives the comparison feedback information of data comparison module transfer, and sends instructions to authentication module, by Authentication module carries out identity information record and stores identity information to first database, while sending a command to encryption mould Block;
5) encrypting module receives account information, carries out cryptographic operation, and encrypted ciphertext is transmitted to data transmission module, The data reception module of server is transmitted to by data transmission module;
6) data reception module receives ciphertext and ciphertext is transmitted to deciphering module, operation is decrypted by deciphering module, together When extract access request from the information after decryption, received by access request module and to the first protection module send application life It enables;
7) the first protection module receives order, and the first memory space is open, and user can enter the first memory space, and free access is looked into The information data in the first memory space is ask, the second memory space is in close state at this time, and user cannot be introduced into the second storage Space is operated;Information meeting real-time Transmission to the second memory space of the first memory space is stored simultaneously.
6. a kind of implementation method of network safety system based on big data platform according to claim 5, feature exist In:The implementation method of the security module includes the following steps:
1) temperature detecting module, the temperature of voltage detection module acquisition hardware, voltage condition, and collected data are transmitted to First confirmation module, and be compared with preset temperature, the fluctuation situation of voltage in the first confirmation module, if comparison result is aobvious Show that normally then collected data store to the first confirmation module and continue to detect;If comparison result shows mistake, directly To step 3);
2) program monitoring module monitoring programme operation process, if program issues data perturbation situation, then program monitoring module is cut It takes disorder data and is transmitted to anti-viral detection module, anti-viral detection module carries out viral diagnosis, and will test result and be transmitted to the Two confirmation modules are confirmed, if safety, program continue to run as the result is shown for confirmation;If confirmation is dangerous as the result is shown, directly To step 3);
3) immediate memory module receives the feedback information of the first confirmation module, and is temporarily saved to data, while sending and referring to It enables to alarm modules;Virus sweep module receives the feedback information of the second confirmation module, and carries out to the virus detected primary It removes and crushes, if removing successfully, program is continued to run, if removing failure, virus sweep module sends a command to alarm mould Block;Alarm modules receive immediate memory module respectively, virus eliminates the command information of module transfer, and result is delivered to service The data reception module of device;
4) data reception module receives data, and warning information Distributed Transmission to first is protected mould by alert request module Block, the second protection module;First protection module receives alarm and opening protection function, while sending a command to data crushing module, by Data crushing module crushes the storing data of the first memory space;Second protection module receives alarm and opening protection function, Self-locking module is sent a command to simultaneously, and the second memory space realizes self-locking function, forbids the external access of malice.
CN201810852764.1A 2018-07-30 2018-07-30 A kind of network safety system and implementation method based on big data platform Pending CN108881298A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810852764.1A CN108881298A (en) 2018-07-30 2018-07-30 A kind of network safety system and implementation method based on big data platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810852764.1A CN108881298A (en) 2018-07-30 2018-07-30 A kind of network safety system and implementation method based on big data platform

Publications (1)

Publication Number Publication Date
CN108881298A true CN108881298A (en) 2018-11-23

Family

ID=64306423

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810852764.1A Pending CN108881298A (en) 2018-07-30 2018-07-30 A kind of network safety system and implementation method based on big data platform

Country Status (1)

Country Link
CN (1) CN108881298A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109709268A (en) * 2018-12-20 2019-05-03 深汕特别合作区智慧城市研究院有限公司 It is a kind of with wisdom bar be 5G micro-base station carrier wisdom pipe network data Transmission system
CN109753592A (en) * 2018-12-22 2019-05-14 汤新红 A kind of information flow storage system and its storage method based on big data
CN109977661A (en) * 2019-04-09 2019-07-05 福建奇点时空数字科技有限公司 A kind of network safety protection method and system based on big data platform
CN110084052A (en) * 2019-05-05 2019-08-02 黑龙江亿林网络股份有限公司 A kind of data multiport ciphering type acquisition system
CN111625822A (en) * 2020-04-07 2020-09-04 重庆云君教育科技有限公司 Cloud resource storage management device and method
CN112327034A (en) * 2020-09-29 2021-02-05 国网山东省电力公司冠县供电公司 Voltage stability monitoring method
CN112769746A (en) * 2020-11-05 2021-05-07 陕西弈聪软件信息技术股份有限公司 Information safety system based on social surface monitoring
CN114491484A (en) * 2022-01-17 2022-05-13 北京国信网联科技有限公司 Big data-based information security defense system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140297826A1 (en) * 2013-04-01 2014-10-02 Electronics And Telecommunications Research Institute System and method for big data aggregation in sensor network
CN205880867U (en) * 2016-06-30 2017-01-11 北京慧普康生物科技有限公司 Multifrequency section automatic identification equipment based on among blood acquisition and storage
CN106407072A (en) * 2016-09-09 2017-02-15 北京高地信息技术有限公司 Monitoring system of big data platform
CN106603517A (en) * 2016-12-03 2017-04-26 新乡学院 Computer network information security monitoring system
CN107147627A (en) * 2017-04-25 2017-09-08 广东青年职业学院 A kind of network safety protection method and system based on big data platform
CN108092999A (en) * 2018-02-08 2018-05-29 王振辉 A kind of Computer Data Security shared platform
CN108256321A (en) * 2018-01-16 2018-07-06 吉林财经大学 A kind of big data safety precaution supervision and aware platform

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140297826A1 (en) * 2013-04-01 2014-10-02 Electronics And Telecommunications Research Institute System and method for big data aggregation in sensor network
CN205880867U (en) * 2016-06-30 2017-01-11 北京慧普康生物科技有限公司 Multifrequency section automatic identification equipment based on among blood acquisition and storage
CN106407072A (en) * 2016-09-09 2017-02-15 北京高地信息技术有限公司 Monitoring system of big data platform
CN106603517A (en) * 2016-12-03 2017-04-26 新乡学院 Computer network information security monitoring system
CN107147627A (en) * 2017-04-25 2017-09-08 广东青年职业学院 A kind of network safety protection method and system based on big data platform
CN108256321A (en) * 2018-01-16 2018-07-06 吉林财经大学 A kind of big data safety precaution supervision and aware platform
CN108092999A (en) * 2018-02-08 2018-05-29 王振辉 A kind of Computer Data Security shared platform

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109709268A (en) * 2018-12-20 2019-05-03 深汕特别合作区智慧城市研究院有限公司 It is a kind of with wisdom bar be 5G micro-base station carrier wisdom pipe network data Transmission system
CN109709268B (en) * 2018-12-20 2021-06-25 深汕特别合作区智慧城市研究院有限公司 Use wisdom pipe network data transmission system of wisdom pole as little basic station carrier of 5G
CN109753592A (en) * 2018-12-22 2019-05-14 汤新红 A kind of information flow storage system and its storage method based on big data
CN109977661A (en) * 2019-04-09 2019-07-05 福建奇点时空数字科技有限公司 A kind of network safety protection method and system based on big data platform
CN110084052A (en) * 2019-05-05 2019-08-02 黑龙江亿林网络股份有限公司 A kind of data multiport ciphering type acquisition system
CN110084052B (en) * 2019-05-05 2021-02-09 黑龙江亿林网络股份有限公司 Multiport encryption type acquisition system for data
CN111625822A (en) * 2020-04-07 2020-09-04 重庆云君教育科技有限公司 Cloud resource storage management device and method
CN112327034A (en) * 2020-09-29 2021-02-05 国网山东省电力公司冠县供电公司 Voltage stability monitoring method
CN112769746A (en) * 2020-11-05 2021-05-07 陕西弈聪软件信息技术股份有限公司 Information safety system based on social surface monitoring
CN114491484A (en) * 2022-01-17 2022-05-13 北京国信网联科技有限公司 Big data-based information security defense system

Similar Documents

Publication Publication Date Title
CN108881298A (en) A kind of network safety system and implementation method based on big data platform
CN106789015B (en) Intelligent power distribution network communication safety system
KR100351306B1 (en) Intrusion Detection System using the Multi-Intrusion Detection Model and Method thereof
KR101294280B1 (en) System and Method capable of Preventing Individual Information Leakage by Monitoring Encrypted HTTPS-based Communication Data via Network Packet Mirroring
CN109063476A (en) A kind of computer system to ensure information security
CN103391216A (en) Alarm and blocking method for illegal external connections
CN110460459B (en) Network security situation sensing method for power monitoring system
CN115102791B (en) Password service monitoring system and method based on mimicry defense
CN111865974A (en) Network security defense system and method
CN104883364B (en) A kind of method and device for judging user access server exception
CN106685775A (en) Self-inspection type invasion prevention method and system for intelligent household electrical appliance
CN103607389A (en) Remote wireless identity authentication system
CN105320865A (en) Authentication method, collection device, authentication device and system, equipment cabinet and unlocking method
CN114826880A (en) Method and system for online monitoring of data safe operation
CN116132989A (en) Industrial Internet security situation awareness system and method
CN112637172A (en) Novel data security and confidentiality method
CN112367315A (en) Endogenous safe WAF honeypot deployment method
CN107277070A (en) A kind of computer network instrument system of defense and intrusion prevention method
CN107968777B (en) Network security monitoring system
CN115952477A (en) User data protection system of safety computer
CN114928486A (en) Industrial control protocol safety ferrying method, device and system based on digital certificate and storage medium
CN115442088A (en) Encryption system based on voice information data transmission
CN107094079B (en) Method, device and equipment for opening terminal function
Li et al. Research on security issues of military Internet of Things
CN114398642A (en) Enterprise economic management information safety system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181123