CN108881298A - A kind of network safety system and implementation method based on big data platform - Google Patents
A kind of network safety system and implementation method based on big data platform Download PDFInfo
- Publication number
- CN108881298A CN108881298A CN201810852764.1A CN201810852764A CN108881298A CN 108881298 A CN108881298 A CN 108881298A CN 201810852764 A CN201810852764 A CN 201810852764A CN 108881298 A CN108881298 A CN 108881298A
- Authority
- CN
- China
- Prior art keywords
- module
- data
- information
- electrically connected
- account
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses a kind of network safety system and implementation method based on big data platform, the network safety system includes logging in identification module, security module and server, the login identification module includes information acquisition module, information analysis module, the first memory module and data transmission module, the security module includes network monitoring module, alarm modules and emergency processing module, and the server includes data reception module, management module and the second memory module.The present invention devises a kind of network safety system and implementation method based on big data platform, the detection of voltage, temperature is carried out by temperature detecting module and voltage detection module, the monitoring of program is carried out by program monitoring module, the safety of big data platform is controlled in real time, user is logged in simultaneously and is limited, the case where effectively enhancing the confidentiality of information, reducing leaking data, safely and effectively.
Description
Technical field
The present invention relates to big data processing technology field, specifically a kind of network safety system based on big data platform and
Implementation method.
Background technique
With social progress and development, network world is also more and more flourishing, and popularizing for mobile Internet is brought to us
Great convenience, various data informations are just showing fulminant growing trend, and big data occupies us gradually
Life.
Nowadays, many fields can see the figure of big data, and the safety about big data platform also gradually at
For our focus of attention, and the understanding with people to big data platform, layer goes out phenomena such as information leakage, criminal's attack
Not poor, this brings great unstability for our life.
For above situation, it would be desirable to a kind of network safety system and implementation method based on big data platform is designed,
Limit user log-on message, reinforce user information detection, while also need to prevent information from distorting, information theft the case where,
This is our problem urgently to be resolved.
Summary of the invention
The purpose of the present invention is to provide a kind of network safety system and implementation method based on big data platform, to solve
The problems of the prior art.
To achieve the above object, the present invention provides the following technical solutions:A kind of network security system based on big data platform
System, the network safety system include logging in identification module, security module and server, and the login identification module includes information
Acquisition module, information analysis module, the first memory module and data transmission module, the information acquisition module are deposited with first respectively
Module, information analysis module electrical connection are stored up, the information analysis module is electrically connected with the first memory module, the information analysis mould
Block is electrically connected with data transmission module;The security module includes network monitoring module, alarm modules and emergency processing module, institute
Network monitoring module, emergency processing module and alarm modules are stated to be sequentially connected electrically;The server includes data reception module, pipe
Reason module and the second memory module, the data transmission module, alarm modules are electrically connected with data reception module respectively, the number
It is sequentially connected electrically according to receiving module, management module and the second memory module.
A kind of network safety system is devised in the present invention, including logging in identification module, server and security module,
The account of user can be identified by logging in identification module, confirm user identity;Security module can monitor big data in real time
The security performance of platform can detecte the information such as temperature, the voltage of hardware, can be with first when temperature, voltage etc. change
Preset fluctuation information compares in confirmation module, and carries out carry out subsequent processing, while security module according to comparing result
Virus can be monitored according to the data cases of program, and carries out cleaning crushing operation when finding virus;Server can connect
Access application is received, and the first memory space is logged according to the account of user and carries out queried access operation, it is convenient and practical.
Further, the information acquisition module includes account acquisition module and authentication module, the information analysis
Module includes account receiving module and encrypting module, first memory module include first database, data analysis module and
Instruction module, the data analysis module include data identification module and data contrast module;The account acquisition module, account
Receiving module, data identification module and data contrast module are sequentially connected electrically, and the database is electrically connected with data comparison module,
The data comparison module is electrically connected with encrypting module, instruction module respectively, and described instruction module is electrically connected with authentication module
It connects, the authentication module is electrically connected with encrypting module, first database respectively, the encrypting module and data transmission module
Electrical connection.
The present invention logs in identification module and devises encrypting module, first memory module etc., and wherein account number acquisition module can
The account of user's input is acquired, first database can carry out account saving the operation such as inquiry, while data point
Analysis module can be compared according to collected account with the historical information of storage, and whether detection user is to step on for the first time
Record then needs to carry out authentication if first login, can just continue to operate in next step after carrying out authentication, if
Had log in history, then can directly carry out cryptographic operation, encrypting module can the account to user carry out at encryption
Situations such as managing, avoiding the occurrence of leaking data reduces risk.
Further, the network monitoring module include temperature detecting module, voltage detection module, program monitoring module,
Anti-viral detection module and validation of information module, the validation of information module include first information confirmation module and the second validation of information
Module;The temperature detecting module, voltage detection module are electrically connected with first information confirmation module respectively, and described program monitors mould
Block, anti-viral detection module and the second validation of information module are sequentially connected electrically;The emergency processing module includes immediate memory module
With virus sweep module, the first information confirmation module is electrically connected with immediate memory module, the second validation of information module
It is electrically connected with virus sweep module, the immediate memory module, virus sweep module are electrically connected with alarm modules respectively, the police
Report module is electrically connected with data reception module.
Temperature detecting module, voltage detection module etc. are devised in the present invention, wherein temperature detecting module and voltage detecting
Module can detecte the temperature of hardware, voltage change situation, and determine to operate in next step by the first confirmation module, if warm
When mutation occurs for degree, voltage, immediate memory module can carry out short-term memory to data information;Program monitoring module can be real-time
The data variation of program is detected, and viral diagnosis is carried out to program by anti-viral detection module by data run situation, and pass through
If the second confirmation module is reaffirmed appearance virus, virus sweep module carries out self to adventitious viruses and removes;Alarm
Module can sound an alarm server according to the disposition of emergency processing module.
Further, the management module includes deciphering module, access request module and alert request module, the data
Receiving module is electrically connected with deciphering module, alert request module respectively, and the deciphering module is electrically connected with access request module;Institute
Stating the second memory module includes the first protection module, the second protection module, the first memory space, the second memory space and data powder
Broken module, the access request module are electrically connected with the first protection module, and the alert request module protects mould with first respectively
Block, the electrical connection of the second protection module;First protection module, the first memory space, the second protection module, the second memory module
It is sequentially connected electrically, first protection module is electrically connected with data crushing module, and the data crushing module and the first storage are empty
Between be electrically connected;Second memory module further includes self-locking module, and second protection module and self-locking module are sequentially connected electrically,
The self-locking module is electrically connected with the second memory space.
Operation, effective protection transmission letter the encrypted ciphertext of encrypting module can be decrypted in deciphering module in the present invention
The case where ceasing, greatly reducing information leakage;Two memory spaces have also been devised in the present invention, wherein the first memory space can be for
User such as inquires, accesses at the operation, and the second memory space is not opened to the outside world, while the information of the first memory space can pass through
It saves after filtration treatment to the second memory space;First protection module and the second protection module are that server increases twice protection
Barrier can effectively forbid the access application not allowed access into and external program;Data crushing module can be deposited promptly by first
The useful information for storing up space carries out pulverization process, while self-locking module can allow the progress of the second memory space self-locking, effectively forbid
External malicious access program, increases the confidentiality of information, realizes the function of effective protection.
A kind of implementation method of the network safety system based on big data platform, includes the following steps:
1) when user needs to access big data platform, account acquisition module acquires user and logs in used account number, and will
It logs in account and is sent to account number receiving module, while security module is opened, and carries out safety to entire big data platform in real time
Monitoring;
2) account number receiving module receives account, and account is sent to data identification module, is identified by data
Module carries out identification verifying, when identification display is correct, directly arrives step 3);When identification display mistake, direct end operation;
3) account is transmitted to data comparison module by data identification module, and data comparison module receives account simultaneously
It extracts the historical correlation data stored in first database to compare, if comparison is unsuccessful, directly arrives step 4);If comparison at
Function, then data comparison module sends a command to encrypting module, directly arrives step 5);
4) instruction module receives the comparison feedback information of data comparison module transfer, and sends instructions to authentication mould
Block is carried out identity information record by authentication module and is stored identity information to first database, sends a command to simultaneously
Encrypting module;
5) encrypting module receives account information, carries out cryptographic operation, and encrypted ciphertext is transmitted to data transmission
Module is transmitted to the data reception module of server by data transmission module;
6) data reception module receives ciphertext and ciphertext is transmitted to deciphering module, and behaviour is decrypted by deciphering module
Make, while extracting access request from the information after decryption, received by access request module and Shen is sent to the first protection module
It please order;
7) the first protection module receives order, and the first memory space is open, and user can enter the first memory space, freely visits
Ask the information data in the first memory space of inquiry, the second memory space is in close state at this time, and user cannot be introduced into second
Memory space is operated;Information meeting real-time Transmission to the second memory space of the first memory space is stored simultaneously.
Further, the implementation method of the security module includes the following steps:
1) temperature detecting module, the temperature of voltage detection module acquisition hardware, voltage condition, and collected data are passed
The first confirmation module is transported to, and is compared with preset temperature, the fluctuation situation of voltage in the first confirmation module, if comparing knot
Fruit shows that normally then collected data store to the first confirmation module and continue to detect;If comparison result shows mistake,
Directly arrive step 3);
2) program monitoring module monitoring programme operation process, if program issues data perturbation situation, then program monitors mould
Block interception disorder data are simultaneously transmitted to anti-viral detection module, and anti-viral detection module carries out viral diagnosis, and will test result transmission
Confirmed to the second confirmation module, if safety, program continue to run as the result is shown for confirmation;If confirmation is dangerous as the result is shown,
Directly arrive step 3);
3) immediate memory module receives the feedback information of the first confirmation module, and is temporarily saved to data, sends out simultaneously
Send instruction to alarm modules;Virus sweep module receives the feedback information of the second confirmation module, and carries out to the virus detected
Primary remove crushes, if removing successfully, program is continued to run, if removing failure, virus sweep module sends a command to police
Report module;Alarm modules receive immediate memory module respectively, virus eliminates the command information of module transfer, and result is delivered to
The data reception module of server;
4) data reception module receives data, and is protected warning information Distributed Transmission to first by alert request module
Module, the second protection module;First protection module receives alarm and opening protection function, while sending a command to data crushing module,
The storing data of the first memory space is crushed by data crushing module;Second protection module receives alarm and opens anti-
Shield, while self-locking module is sent a command to, the second memory space realizes self-locking function, forbids the external access of malice.
Encrypting module of the present invention encrypts information using RSA cryptographic algorithms.
Compared with prior art, the beneficial effects of the invention are as follows:When the present invention is implemented, account number is carried out by account number acquisition module
Account number receiving module is acquired and is transmitted to, account number receiving module, which receives and passes through data identification module, knows account
Not, whether the account number that confirmation user uses has the qualification of access big data platform, if this account number is not eligible for, register
Failure, if this account number is qualified, is compared by data comparison module and the history access information in first database, right
Than it is successful when show that account number had log in history, then account number is encrypted in encrypting module;Show to use when comparing unsuccessful
Family is first login, then needs to send instructions to authentication module by instruction module, carries out body by authentication module
Part verifying, and captured identity data are stored to first database, then the corresponding account of secondary identity information is carried out encryption behaviour
Make;Ciphertext is transmitted to after encrypting module encryption information by data transmission module the data reception module of server.
After data reception module receives ciphertext, operation is decrypted to ciphertext by deciphering module, and by the information after decryption
In access application information extract, received by access request module and be sent to the first protection module, the first protection module
User can carry out the first memory space and carry out the operation such as query search after verifying is correct, and the second memory space, which is in, at this time closes
State, user cannot be introduced into the second memory module and operate.
Security module can real-time detecting system safety, temperature detecting module and voltage detection module can be with temperature collections, electricity
The situation of change of pressure is compared with preset fluctuation information in the first confirmation module, can be by i.e. if variation is larger
When memory module carry out short-term memory, and send alarm to server by alarm modules;Program monitoring module can detecte program
Middle data run situation, and viral diagnosis is carried out to disorder data, if detect virus, carried out by virus sweep module primary
It removes, if removing successfully, program is continued to run, if removing is unsuccessful, sends alarm to server by alarm modules.
Server is received after receiving alarm by alarm receiver module, and sends a command to the first protection module and the second protection
Module, the first protection module, the second protection module are in open state at this time, while the valid data of the first memory space are logical
It crosses crushing module and carries out pulverization process, the second memory space carries out self-locking operation by self-locking module.
The present invention devises a kind of network safety system and implementation method based on big data platform, passes through temperature detection mould
Block and voltage detection module carry out the detection of voltage, temperature, and the monitoring of program is carried out by program monitoring module, control in real time big
The safety of data platform, while user is logged in and is limited, the confidentiality of information is effectively enhanced, leaking data is reduced
Situation, safely and effectively.
Detailed description of the invention
In order that the present invention can be more clearly and readily understood, right below according to specific embodiment and in conjunction with attached drawing
The present invention is described in further detail.
Fig. 1 is a kind of integral module signal of network safety system and implementation method based on big data platform of the present invention
Figure;
Fig. 2 is a kind of login identification module of network safety system and implementation method based on big data platform of the present invention
Module diagram;
Fig. 3 is a kind of module of the security module of network safety system and implementation method based on big data platform of the present invention
Schematic diagram;
Fig. 4 is that a kind of module of the server of network safety system and implementation method based on big data platform of the present invention is shown
It is intended to;
Fig. 5 is a kind of login identification module stream of network safety system and implementation method based on big data platform of the present invention
Journey schematic diagram;
Fig. 6 is a kind of part of the security module of network safety system and implementation method based on big data platform of the present invention
Flow diagram;
Fig. 7 is a kind of program monitoring module stream of network safety system and implementation method based on big data platform of the present invention
Journey schematic diagram.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
As shown in Figure 1, a kind of network safety system based on big data platform, the network safety system includes logging in know
Other module, security module and server, the login identification module include information acquisition module, information analysis module, first deposit
Storage module and data transmission module, the information acquisition module are electrically connected with the first memory module, information analysis module respectively, institute
It states information analysis module to be electrically connected with the first memory module, the information analysis module is electrically connected with data transmission module;It is described
Security module includes network monitoring module, alarm modules and emergency processing module, the network monitoring module, emergency processing module
It is sequentially connected electrically with alarm modules;The server includes data reception module, management module and the second memory module, the number
It is electrically connected respectively with data reception module according to transmission module, alarm modules, the data reception module, management module and second are deposited
Storage module is sequentially connected electrically.
A kind of network safety system is devised in the present invention, including logging in identification module, server and security module,
The account of user can be identified by logging in identification module, confirm user identity;Security module can monitor big data in real time
The security performance of platform can detecte the information such as temperature, the voltage of hardware, can be with history when temperature, voltage etc. change
The change information of storage compares, and carries out carry out subsequent processing according to comparing result, while security module can be according to journey
The data cases of sequence carry out cleaning crushing operation when finding virus to monitor virus;Server can receive access Shen
Please, and the first memory space is logged according to the account of user and carries out queried access operation, it is convenient and practical.
As shown in Fig. 2, the information acquisition module includes account acquisition module and authentication module, the information analysis
Module includes account receiving module and encrypting module, first memory module include first database, data analysis module and
Instruction module, the data analysis module include data identification module and data contrast module;The account acquisition module, account
Receiving module, data identification module and data contrast module are sequentially connected electrically, and the database is electrically connected with data comparison module,
The data comparison module is electrically connected with encrypting module, instruction module respectively, and described instruction module is electrically connected with authentication module
It connects, the authentication module is electrically connected with encrypting module, first database respectively, the encrypting module and data transmission module
Electrical connection.
The present invention logs in identification module and devises encrypting module, first memory module etc., and wherein account number acquisition module can
The account of user's input is acquired, first database can carry out account saving the operation such as inquiry, while data point
Analysis module can be compared according to collected account with the historical information of storage, and whether detection user is to step on for the first time
Record then needs to carry out authentication if first login, can just continue to operate in next step after carrying out authentication, if
Had log in history, then can directly carry out cryptographic operation, encrypting module can the account to user carry out at encryption
Situations such as managing, avoiding the occurrence of leaking data reduces risk.
As shown in figure 3, the network monitoring module include temperature detecting module, voltage detection module, program monitoring module,
Anti-viral detection module and validation of information module, the validation of information module include first information confirmation module and the second validation of information
Module;The temperature detecting module, voltage detection module are electrically connected with first information confirmation module respectively, and described program monitors mould
Block, anti-viral detection module and the second validation of information module are sequentially connected electrically;The emergency processing module includes immediate memory module
With virus sweep module, the first information confirmation module is electrically connected with immediate memory module, the second validation of information module
It is electrically connected with virus sweep module, the immediate memory module, virus sweep module are electrically connected with alarm modules respectively, the police
Report module is electrically connected with data reception module.
Temperature detecting module, voltage detection module etc. are devised in the present invention, wherein temperature detecting module and voltage detecting
Module can detecte the temperature of hardware, voltage change situation, and determine to operate in next step by the first confirmation module, if warm
When mutation occurs for degree, voltage, immediate memory module can carry out short-term memory to data information;Program monitoring module can be real-time
The data variation of program is detected, and viral diagnosis is carried out to program by anti-viral detection module by data run situation, and pass through
If the second confirmation module is reaffirmed appearance virus, virus sweep module carries out self to adventitious viruses and removes;Alarm
Module can sound an alarm server according to the disposition of emergency processing module.
As shown in figure 4, the management module includes deciphering module, access request module and alert request module, the number
It is electrically connected respectively with deciphering module, alert request module according to receiving module, the deciphering module is electrically connected with access request module;
Second memory module includes the first protection module, the second protection module, the first memory space, the second memory space and data
Module is crushed, the access request module is electrically connected with the first protection module, and the alert request module is protected with first respectively
Module, the electrical connection of the second protection module;First protection module, the first memory space, the second protection module, the second storage mould
Block is sequentially connected electrically, and first protection module is electrically connected with data crushing module, the data crushing module and the first storage
Space electrical connection;Second memory module further includes self-locking module, and second protection module and self-locking module are successively electrically connected
It connects, the self-locking module is electrically connected with the second memory space.
Operation, effective protection transmission letter the encrypted ciphertext of encrypting module can be decrypted in deciphering module in the present invention
The case where ceasing, greatly reducing information leakage;Two memory spaces have also been devised in the present invention, wherein the first memory space can be for
User such as inquires, accesses at the operation, and the second memory space is not opened to the outside world, while the information of the first memory space can pass through
It saves after filtration treatment to the second memory space;First protection module and the second protection module are that server increases twice protection
Barrier can effectively forbid the access application not allowed access into and external program;Data crushing module can be deposited promptly by first
The useful information for storing up space carries out pulverization process, while self-locking module can allow the progress of the second memory space self-locking, effectively forbid
External malicious access program, increases the confidentiality of information, realizes the function of effective protection.
As shown in Fig. 5, Fig. 6, Fig. 7, a kind of implementation method of the network safety system based on big data platform, including it is following
Step:
1) when user needs to access big data platform, account acquisition module acquires user and logs in used account number, and will
It logs in account and is sent to account number receiving module, while security module is opened, and carries out safety to entire big data platform in real time
Monitoring;
2) account number receiving module receives account, and account is sent to data identification module, is identified by data
Module carries out identification verifying, when identification display is correct, directly arrives step 3);When identification display mistake, direct end operation;
3) account is transmitted to data comparison module by data identification module, and data comparison module receives account simultaneously
It extracts the historical correlation data stored in first database to compare, if comparison is unsuccessful, directly arrives step 4);If comparison at
Function, then data comparison module sends a command to encrypting module, directly arrives step 5);
4) instruction module receives the comparison feedback information of data comparison module transfer, and sends instructions to authentication mould
Block is carried out identity information record by authentication module and is stored identity information to first database, sends a command to simultaneously
Encrypting module;
5) encrypting module receives account information, carries out cryptographic operation, and encrypted ciphertext is transmitted to data transmission
Module is transmitted to the data reception module of server by data transmission module;
6) data reception module receives ciphertext and ciphertext is transmitted to deciphering module, and behaviour is decrypted by deciphering module
Make, while extracting access request from the information after decryption, received by access request module and Shen is sent to the first protection module
It please order;
7) the first protection module receives order, and the first memory space is open, and user can enter the first memory space, freely visits
Ask the information data in the first memory space of inquiry, the second memory space is in close state at this time, and user cannot be introduced into second
Memory space is operated;Information meeting real-time Transmission to the second memory space of the first memory space is stored simultaneously.
The implementation method of the security module includes the following steps:
1) temperature detecting module, the temperature of voltage detection module acquisition hardware, voltage condition, and collected data are passed
The first confirmation module is transported to, and is compared with the fluctuation situation of the preset temperature, voltage that are stored in the first confirmation module, if
Comparison result shows that normally then collected data store to the first confirmation module and continue to detect;If comparison result is aobvious
Show mistake, directly arrives step 3);
2) program monitoring module monitoring programme operation process, if program issues data perturbation situation, then program monitors mould
Block interception disorder data are simultaneously transmitted to anti-viral detection module, and anti-viral detection module carries out viral diagnosis, and will test result transmission
Confirmed to the second confirmation module, if safety, program continue to run as the result is shown for confirmation;If confirmation is dangerous as the result is shown,
Directly arrive step 3);
3) immediate memory module receives the feedback information of the first confirmation module, and is temporarily saved to data, sends out simultaneously
Send instruction to alarm modules;Virus sweep module receives the feedback information of the second confirmation module, and carries out to the virus detected
Primary remove crushes, if removing successfully, program is continued to run, if removing failure, virus sweep module sends a command to police
Report module;Alarm modules receive immediate memory module respectively, virus eliminates the command information of module transfer, and result is delivered to
The data reception module of server;
4) data reception module receives data, and is protected warning information Distributed Transmission to first by alert request module
Module, the second protection module;First protection module receives alarm and opening protection function, while sending a command to data crushing module,
The storing data of the first memory space is crushed by data crushing module;Second protection module receives alarm and opens anti-
Shield, while self-locking module is sent a command to, the second memory space realizes self-locking function, forbids the external access of malice.
Encrypting module of the present invention encrypts information using RSA cryptographic algorithms.
When the present invention is implemented, account number acquisition is carried out by account number acquisition module and is transmitted to account number receiving module, account number receives
Module receives and passes through data identification module and identifies to account, and whether the account number that confirmation user uses has access big
The qualification of data platform, if this account number is not eligible for, register failure if this account number is qualified, passes through data comparison
Module is compared with the history access information in first database, shows that account number had log in history when comparing successfully, then plus
Account number is encrypted in close module;Show that user is first login when comparing unsuccessful, then needs to send out by instruction module
It send instruction to authentication module, authentication is carried out by authentication module, and captured identity data are stored to the first number
Cryptographic operation is carried out according to library, then by the corresponding account of secondary identity information;Mould is transmitted by data after encrypting module encryption information
Ciphertext is transmitted to the data reception module of server by block.
After data reception module receives ciphertext, operation is decrypted to ciphertext by deciphering module, and by the information after decryption
In access application information extract, received by access request module and be sent to the first protection module, the first protection module
User can carry out the first memory space and carry out the operation such as query search after verifying is correct, and the second memory space, which is in, at this time closes
State, user cannot be introduced into the second memory module and operate.
Security module can real-time detecting system safety, temperature detecting module and voltage detection module can be with temperature collections, electricity
The situation of change of pressure carries out confirmation comparison, if variation is larger, meeting by the presupposed information stored by the first confirmation module
Short-term memory is carried out by immediate memory module, and sends alarm to server by alarm modules;Program monitoring module can be examined
Data run situation in ranging sequence, and to disorder data carry out viral diagnosis, if detect virus, by virus sweep module into
Row is primary to be removed, if removing successfully, program is continued to run, if removing is unsuccessful, is sent alarm by alarm modules and is extremely serviced
Device.
Server is received after receiving alarm by alarm receiver module, and sends a command to the first protection module and the second protection
Module, the first protection module, the second protection module are in open state at this time, while the valid data of the first memory space are logical
It crosses crushing module and carries out pulverization process, the second memory space carries out self-locking operation by self-locking module.
The present invention devises a kind of network safety system and implementation method based on big data platform, passes through temperature detection mould
Block and voltage detection module carry out the detection of voltage, temperature, and the monitoring of program is carried out by program monitoring module, control in real time big
The safety of data platform, while user is logged in and is limited, the confidentiality of information is effectively enhanced, leaking data is reduced
Situation, safely and effectively.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie
In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter
From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power
Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims
Variation is included within the present invention.Any reference signs in the claims should not be construed as limiting the involved claims.
Claims (6)
1. a kind of network safety system based on big data platform, it is characterised in that:The network safety system includes logging in know
Other module, security module and server, the login identification module include information acquisition module, information analysis module, first deposit
Storage module and data transmission module, the information acquisition module are electrically connected with the first memory module, information analysis module respectively, institute
It states information analysis module to be electrically connected with the first memory module, the information analysis module is electrically connected with data transmission module;It is described
Security module includes network monitoring module, alarm modules and emergency processing module, the network monitoring module, emergency processing module
It is sequentially connected electrically with alarm modules;The server includes data reception module, management module and the second memory module, the number
It is electrically connected respectively with data reception module according to transmission module, alarm modules, the data reception module, management module and second are deposited
Storage module is sequentially connected electrically.
2. a kind of network safety system based on big data platform according to claim 1, it is characterised in that:The information
Acquisition module includes account acquisition module and authentication module, and the information analysis module includes account receiving module and encryption
Module, first memory module include first database, data analysis module and instruction module, the data analysis module packet
Include data identification module and data contrast module;The account acquisition module, account receiving module, data identification module and data
Contrast module is sequentially connected electrically, and the database is electrically connected with data comparison module, the data comparison module respectively with encryption
Module, instruction module electrical connection, described instruction module is electrically connected with authentication module, the authentication module respectively with add
Close module, first database electrical connection, the encrypting module are electrically connected with data transmission module.
3. a kind of network safety system based on big data platform according to claim 2, it is characterised in that:The network
Monitoring module includes temperature detecting module, voltage detection module, program monitoring module, anti-viral detection module and validation of information mould
Block, the validation of information module include first information confirmation module and the second validation of information module;The temperature detecting module, electricity
Pressure detection module is electrically connected with first information confirmation module respectively, described program monitoring module, anti-viral detection module and the second letter
Breath confirmation module is sequentially connected electrically;The emergency processing module includes immediate memory module and virus sweep module, and described first
Validation of information module is electrically connected with immediate memory module, and the second validation of information module is electrically connected with virus sweep module, institute
State immediate memory module, virus sweep module is electrically connected with alarm modules respectively, the alarm modules and data reception module electricity
Connection.
4. a kind of network safety system based on big data platform according to claim 3, it is characterised in that:The management
Module includes deciphering module, access request module and alert request module, the data reception module respectively with deciphering module, police
Request module electrical connection is reported, the deciphering module is electrically connected with access request module;Second memory module includes first anti-
Protect module, the second protection module, the first memory space, the second memory space and data crushing module, the access request module
It is electrically connected with the first protection module, the alert request module is electrically connected with the first protection module, the second protection module respectively;Institute
It states the first protection module, the first memory space, the second protection module, the second memory module to be sequentially connected electrically, first protection
Module is electrically connected with data crushing module, and the data crushing module is electrically connected with the first memory space;The second storage mould
Block further includes self-locking module, and second protection module and self-locking module are sequentially connected electrically, the self-locking module and the second storage
Space electrical connection.
5. a kind of implementation method of the network safety system based on big data platform, which is characterized in that include the following steps:
1) when user needs to access big data platform, account acquisition module acquires user and logs in used account number, and will log in
Account is sent to account number receiving module, while security module is opened, and carries out security monitoring to entire big data platform in real time;
2) account number receiving module receives account, and account is sent to data identification module, by data identification module
Identification verifying is carried out, when identification display is correct, directly arrives step 3);When identification display mistake, direct end operation;
3) account is transmitted to data comparison module by data identification module, and data comparison module receives account and extracts
The historical correlation data stored in first database compares, if comparison is unsuccessful, directly arrives step 4);If comparing successfully,
Then data comparison module sends a command to encrypting module, directly arrives step 5);
4) instruction module receives the comparison feedback information of data comparison module transfer, and sends instructions to authentication module, by
Authentication module carries out identity information record and stores identity information to first database, while sending a command to encryption mould
Block;
5) encrypting module receives account information, carries out cryptographic operation, and encrypted ciphertext is transmitted to data transmission module,
The data reception module of server is transmitted to by data transmission module;
6) data reception module receives ciphertext and ciphertext is transmitted to deciphering module, operation is decrypted by deciphering module, together
When extract access request from the information after decryption, received by access request module and to the first protection module send application life
It enables;
7) the first protection module receives order, and the first memory space is open, and user can enter the first memory space, and free access is looked into
The information data in the first memory space is ask, the second memory space is in close state at this time, and user cannot be introduced into the second storage
Space is operated;Information meeting real-time Transmission to the second memory space of the first memory space is stored simultaneously.
6. a kind of implementation method of network safety system based on big data platform according to claim 5, feature exist
In:The implementation method of the security module includes the following steps:
1) temperature detecting module, the temperature of voltage detection module acquisition hardware, voltage condition, and collected data are transmitted to
First confirmation module, and be compared with preset temperature, the fluctuation situation of voltage in the first confirmation module, if comparison result is aobvious
Show that normally then collected data store to the first confirmation module and continue to detect;If comparison result shows mistake, directly
To step 3);
2) program monitoring module monitoring programme operation process, if program issues data perturbation situation, then program monitoring module is cut
It takes disorder data and is transmitted to anti-viral detection module, anti-viral detection module carries out viral diagnosis, and will test result and be transmitted to the
Two confirmation modules are confirmed, if safety, program continue to run as the result is shown for confirmation;If confirmation is dangerous as the result is shown, directly
To step 3);
3) immediate memory module receives the feedback information of the first confirmation module, and is temporarily saved to data, while sending and referring to
It enables to alarm modules;Virus sweep module receives the feedback information of the second confirmation module, and carries out to the virus detected primary
It removes and crushes, if removing successfully, program is continued to run, if removing failure, virus sweep module sends a command to alarm mould
Block;Alarm modules receive immediate memory module respectively, virus eliminates the command information of module transfer, and result is delivered to service
The data reception module of device;
4) data reception module receives data, and warning information Distributed Transmission to first is protected mould by alert request module
Block, the second protection module;First protection module receives alarm and opening protection function, while sending a command to data crushing module, by
Data crushing module crushes the storing data of the first memory space;Second protection module receives alarm and opening protection function,
Self-locking module is sent a command to simultaneously, and the second memory space realizes self-locking function, forbids the external access of malice.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810852764.1A CN108881298A (en) | 2018-07-30 | 2018-07-30 | A kind of network safety system and implementation method based on big data platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810852764.1A CN108881298A (en) | 2018-07-30 | 2018-07-30 | A kind of network safety system and implementation method based on big data platform |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108881298A true CN108881298A (en) | 2018-11-23 |
Family
ID=64306423
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810852764.1A Pending CN108881298A (en) | 2018-07-30 | 2018-07-30 | A kind of network safety system and implementation method based on big data platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108881298A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109709268A (en) * | 2018-12-20 | 2019-05-03 | 深汕特别合作区智慧城市研究院有限公司 | It is a kind of with wisdom bar be 5G micro-base station carrier wisdom pipe network data Transmission system |
CN109753592A (en) * | 2018-12-22 | 2019-05-14 | 汤新红 | A kind of information flow storage system and its storage method based on big data |
CN109977661A (en) * | 2019-04-09 | 2019-07-05 | 福建奇点时空数字科技有限公司 | A kind of network safety protection method and system based on big data platform |
CN110084052A (en) * | 2019-05-05 | 2019-08-02 | 黑龙江亿林网络股份有限公司 | A kind of data multiport ciphering type acquisition system |
CN111625822A (en) * | 2020-04-07 | 2020-09-04 | 重庆云君教育科技有限公司 | Cloud resource storage management device and method |
CN112327034A (en) * | 2020-09-29 | 2021-02-05 | 国网山东省电力公司冠县供电公司 | Voltage stability monitoring method |
CN112769746A (en) * | 2020-11-05 | 2021-05-07 | 陕西弈聪软件信息技术股份有限公司 | Information safety system based on social surface monitoring |
CN114491484A (en) * | 2022-01-17 | 2022-05-13 | 北京国信网联科技有限公司 | Big data-based information security defense system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140297826A1 (en) * | 2013-04-01 | 2014-10-02 | Electronics And Telecommunications Research Institute | System and method for big data aggregation in sensor network |
CN205880867U (en) * | 2016-06-30 | 2017-01-11 | 北京慧普康生物科技有限公司 | Multifrequency section automatic identification equipment based on among blood acquisition and storage |
CN106407072A (en) * | 2016-09-09 | 2017-02-15 | 北京高地信息技术有限公司 | Monitoring system of big data platform |
CN106603517A (en) * | 2016-12-03 | 2017-04-26 | 新乡学院 | Computer network information security monitoring system |
CN107147627A (en) * | 2017-04-25 | 2017-09-08 | 广东青年职业学院 | A kind of network safety protection method and system based on big data platform |
CN108092999A (en) * | 2018-02-08 | 2018-05-29 | 王振辉 | A kind of Computer Data Security shared platform |
CN108256321A (en) * | 2018-01-16 | 2018-07-06 | 吉林财经大学 | A kind of big data safety precaution supervision and aware platform |
-
2018
- 2018-07-30 CN CN201810852764.1A patent/CN108881298A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140297826A1 (en) * | 2013-04-01 | 2014-10-02 | Electronics And Telecommunications Research Institute | System and method for big data aggregation in sensor network |
CN205880867U (en) * | 2016-06-30 | 2017-01-11 | 北京慧普康生物科技有限公司 | Multifrequency section automatic identification equipment based on among blood acquisition and storage |
CN106407072A (en) * | 2016-09-09 | 2017-02-15 | 北京高地信息技术有限公司 | Monitoring system of big data platform |
CN106603517A (en) * | 2016-12-03 | 2017-04-26 | 新乡学院 | Computer network information security monitoring system |
CN107147627A (en) * | 2017-04-25 | 2017-09-08 | 广东青年职业学院 | A kind of network safety protection method and system based on big data platform |
CN108256321A (en) * | 2018-01-16 | 2018-07-06 | 吉林财经大学 | A kind of big data safety precaution supervision and aware platform |
CN108092999A (en) * | 2018-02-08 | 2018-05-29 | 王振辉 | A kind of Computer Data Security shared platform |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109709268A (en) * | 2018-12-20 | 2019-05-03 | 深汕特别合作区智慧城市研究院有限公司 | It is a kind of with wisdom bar be 5G micro-base station carrier wisdom pipe network data Transmission system |
CN109709268B (en) * | 2018-12-20 | 2021-06-25 | 深汕特别合作区智慧城市研究院有限公司 | Use wisdom pipe network data transmission system of wisdom pole as little basic station carrier of 5G |
CN109753592A (en) * | 2018-12-22 | 2019-05-14 | 汤新红 | A kind of information flow storage system and its storage method based on big data |
CN109977661A (en) * | 2019-04-09 | 2019-07-05 | 福建奇点时空数字科技有限公司 | A kind of network safety protection method and system based on big data platform |
CN110084052A (en) * | 2019-05-05 | 2019-08-02 | 黑龙江亿林网络股份有限公司 | A kind of data multiport ciphering type acquisition system |
CN110084052B (en) * | 2019-05-05 | 2021-02-09 | 黑龙江亿林网络股份有限公司 | Multiport encryption type acquisition system for data |
CN111625822A (en) * | 2020-04-07 | 2020-09-04 | 重庆云君教育科技有限公司 | Cloud resource storage management device and method |
CN112327034A (en) * | 2020-09-29 | 2021-02-05 | 国网山东省电力公司冠县供电公司 | Voltage stability monitoring method |
CN112769746A (en) * | 2020-11-05 | 2021-05-07 | 陕西弈聪软件信息技术股份有限公司 | Information safety system based on social surface monitoring |
CN114491484A (en) * | 2022-01-17 | 2022-05-13 | 北京国信网联科技有限公司 | Big data-based information security defense system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108881298A (en) | A kind of network safety system and implementation method based on big data platform | |
CN106789015B (en) | Intelligent power distribution network communication safety system | |
KR100351306B1 (en) | Intrusion Detection System using the Multi-Intrusion Detection Model and Method thereof | |
KR101294280B1 (en) | System and Method capable of Preventing Individual Information Leakage by Monitoring Encrypted HTTPS-based Communication Data via Network Packet Mirroring | |
CN109063476A (en) | A kind of computer system to ensure information security | |
CN103391216A (en) | Alarm and blocking method for illegal external connections | |
CN110460459B (en) | Network security situation sensing method for power monitoring system | |
CN115102791B (en) | Password service monitoring system and method based on mimicry defense | |
CN111865974A (en) | Network security defense system and method | |
CN104883364B (en) | A kind of method and device for judging user access server exception | |
CN106685775A (en) | Self-inspection type invasion prevention method and system for intelligent household electrical appliance | |
CN103607389A (en) | Remote wireless identity authentication system | |
CN105320865A (en) | Authentication method, collection device, authentication device and system, equipment cabinet and unlocking method | |
CN114826880A (en) | Method and system for online monitoring of data safe operation | |
CN116132989A (en) | Industrial Internet security situation awareness system and method | |
CN112637172A (en) | Novel data security and confidentiality method | |
CN112367315A (en) | Endogenous safe WAF honeypot deployment method | |
CN107277070A (en) | A kind of computer network instrument system of defense and intrusion prevention method | |
CN107968777B (en) | Network security monitoring system | |
CN115952477A (en) | User data protection system of safety computer | |
CN114928486A (en) | Industrial control protocol safety ferrying method, device and system based on digital certificate and storage medium | |
CN115442088A (en) | Encryption system based on voice information data transmission | |
CN107094079B (en) | Method, device and equipment for opening terminal function | |
Li et al. | Research on security issues of military Internet of Things | |
CN114398642A (en) | Enterprise economic management information safety system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181123 |