CN109672689A - A kind of big data network security monitoring equipment - Google Patents
A kind of big data network security monitoring equipment Download PDFInfo
- Publication number
- CN109672689A CN109672689A CN201910045493.3A CN201910045493A CN109672689A CN 109672689 A CN109672689 A CN 109672689A CN 201910045493 A CN201910045493 A CN 201910045493A CN 109672689 A CN109672689 A CN 109672689A
- Authority
- CN
- China
- Prior art keywords
- module
- data
- big data
- network security
- monitoring equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of big data network security monitoring equipment, are related to technical field of network security, mainly for solving the problems, such as that existing big data network security monitoring equipment safety performance is low;The big data network security monitoring equipment, including large database concept, monitoring system, control system, analysis system, assessment system, processing system and display system, the monitoring system includes data store internal selftest module, information filtering module and tracking of information module, the control system includes power supply module and switch module, the analysis system includes database cloud analysis module and Network Safety Analysis module, the assessment system includes online risk evaluation module and big data risk rating module, the big data risk rating module is used to carry out risk rating to the data in large database concept, the processing system includes hard disk self-destruction module, data encryption module, privilege-escalation module and alarm module, greatly improve the internet security of big data.
Description
Technical field
The present invention relates to a kind of monitoring device, specifically a kind of big data network security monitoring equipment.
Background technique
Network security refers to that the data in the hardware, software and its system of network system are protected, not because accidental or
The reason of person's malice and by destruction, change, leakage, system is continuously reliably normally run, and network service is not interrupted.From net
Network operation and manager's angle are said, it is desirable to the operations such as access, the read-write of local network information are protected and be controlled, avoided out
Existing " trapdoor ", virus, illegal access, refusal services and the threats such as Internet resources are illegally occupied and illegally controlled, prevention and defence
The attack of network hacker.For safe and secret department, they wish to illegal, harmful or be related to the information of state secret
Be filtered with it is anti-blocking, avoid confidential information leakage, avoid to society generate harm, bring about great losses to country.
The event of user information leakage at present is more and more, and the attention of many people is caused for network security this part,
Network security for how to protect database is the emphasis of more and more people's researchs, and existing data bank network is supervised safely
Controlling the monitoring system of equipment, there is many loopholes, so needing a kind of safer large database concept network security monitoring and place
Reason system.
Summary of the invention
The purpose of the present invention is to provide a kind of big data network security monitoring equipment, solve existing big data network peace
The low problem of full monitoring device security performance.
To achieve the above object, the invention provides the following technical scheme:
A kind of big data network security monitoring equipment, including large database concept, monitoring system, control system, analysis system, assessment system
System, processing system and display system, the monitoring system include that data store internal selftest module, information filtering module and information chase after
Track module, the control system include power supply module and switch module, the analysis system include database cloud analysis module and
Network Safety Analysis module, the assessment system include online risk evaluation module and big data risk rating module, it is described
Line risk evaluation module by connection internet assess large database concept risk, the big data risk rating module for pair
Data in large database concept carry out risk rating, and the processing system includes that hard disk self-destruction module, data encryption module, permission mention
Rising mould block and alarm module.
Based on the above technical solution, the present invention also provides following optional technical solutions:
In a kind of optinal plan: the data store internal selftest module is for the self-test inside large database concept, the information mistake
The data being added in large database concept for being filtered by filter module.
In a kind of optinal plan: the power supply module is connect by power supply adaptor with socket.
In a kind of optinal plan: the database cloud analysis module is for connecting large database concept into cloud.
In a kind of optinal plan: the data inside the large database concept are divided into different ranks, data according to importance
Importance be divided into 1 grade, 2 grades, 3 grades and 4 grades from low to high.
In a kind of optinal plan: when data of the hard disk self-destruction module for rank to be 4 grades have stolen risk
Hard disk self-destruction, data of the data encryption module for rank to be 3 grades encrypt data when there is stolen risk, institute
It states and permission is improved to the calling of data and circulation when privilege-escalation module has stolen risk for the data that rank is 2 grades.
In a kind of optinal plan: the display system includes display.
In a kind of optinal plan: analysis system further includes computer vulnerability analysis system.
Compared to the prior art, beneficial effects of the present invention are as follows:
1, by setting information filtering module, for being filtered the data being added in large database concept, when the information of addition
When undesirable, the entrance of data can be refused, guarantee the safety for entering internal information;
2, by setting big data risk rating module, different processing means can be taken according to different stage.
Detailed description of the invention
Fig. 1 is the flow diagram of big data network security monitoring equipment.
Fig. 2 is the flow diagram of monitoring system in big data network security monitoring equipment.
Fig. 3 is the flow diagram of analysis system in big data network security monitoring equipment.
Fig. 4 is the flow diagram of assessment system in big data network security monitoring equipment.
Fig. 5 is the flow diagram of processing system in big data network security monitoring equipment.
Fig. 6 is the flow diagram of control system in big data network security monitoring equipment.
Appended drawing reference annotation: 1- large database concept, 2- monitoring system, 3- control system, 4- analysis system, 5- assessment system,
6- processing system, 7- display system, 21- data store internal selftest module, 22- information filtering module, 23- tracking of information module,
31- power supply module, 32- switch module, 41- database cloud analysis module, 42- Network Safety Analysis module, 43- computer loophole
The online risk evaluation module of analysis module, 51-, 52- big data risk rating module, 61- hard disk self-destruction module, 62- data add
Close module, 63- privilege-escalation module, 64- alarm module.
Specific embodiment
Following embodiment can be described in detail the present invention in conjunction with attached drawing, in attached drawing or explanation, similar or identical part
Using identical label, and in practical applications, shape, thickness or the height of each component can be expanded or shunk.Institute of the present invention
Each embodiment enumerated is only to illustrate the present invention, is not used to limit the scope of the present invention.It is made for the present invention any aobvious
And modification easy to know or change are without departure from spirit and scope of the invention.
Embodiment 1
Please refer to Fig. 1~6, in the embodiment of the present invention, a kind of big data network security monitoring equipment, including large database concept 1, monitoring
System 2, control system 3, analysis system 4, assessment system 5, processing system 6 and display system 7, the large database concept 1 is for depositing
Data are stored up, by adding and delete internal data, the information inside large database concept 1 can be updated, it can by large database concept 1
The convenient management to various data and the information to data store internal are handled, very convenient.
The monitoring system 2 includes data store internal selftest module 21, information filtering module 22 and tracking of information module 23,
The data store internal selftest module 21 for the self-test inside large database concept 1, the data store internal selftest module 21 every
Specific time checks that the data inside large database concept 1, the information filtering module 22 will be for that will be added to large database concept 1
Interior data are filtered, and when the information of addition is undesirable, can refuse the entrance of data, guarantee to enter internal information
Safety prevents flame to be directly entered in large database concept 1, causes the loss of data, and the tracking of information module 23 is used for
The information lost is tracked, the data in large database concept 1 have specific label, can track something lost by tracking of information module 23
It breaks one's promise the position of breath, searches the IP address of theft data personnel, the information of loss can be given for change in time by tracing module, prevented
Because of property loss caused by loss of data.
The control system 3 includes power supply module 31 and switch module 32, and the power supply module 31 passes through power supply adaptor
It is connect with socket, equipment is powered, improve the power demand of equipment, the switch module 32 can open equipment
With the operation of closing, facilitate the use of equipment.
The analysis system 4 includes database cloud analysis module 41 and Network Safety Analysis module 42, the database cloud
Analysis module 41 can carry out security inspection according to the information in cloud, pass through number for connecting large database concept 1 into cloud
It can be improved the safety of large database concept 1 according to library cloud analysis module 41, the Network Safety Analysis module 42 can analyze network
Safety, the main reason for insecurity of network is Missing data, net can be derived that by Network Safety Analysis module 42
The safety of network prevents the data of trojan horse theft user.
The assessment system 5 includes online risk evaluation module 51 and big data risk rating module 52, the online wind
Dangerous evaluation module 51 assesses the risk of large database concept 1 by connection internet, uses different places by the height of risk
Reason means, the big data risk rating module 52 are used to carry out risk rating, the big data to the data in large database concept 1
Data inside library 1 are divided into different ranks according to importance, and the importance of data is divided into 1 grade, 2 grades, 3 grades and 4 from low to high
Grade, rank is different, and processing mode is also different.
The processing system 6 includes hard disk self-destruction module 61, data encryption module 62, privilege-escalation module 63 and alarm mould
Block 64, hard disk self-destruction when data of the hard disk self-destruction module 61 for rank to be 4 grades have stolen risk, prevents data quilt
It steals, serious consequence is generated, to data when data of the data encryption module 62 for rank to be 3 grades have stolen risk
It is encrypted, the calling of data or circulation at this time needs to input password, and the privilege-escalation module 63 is 2 grades for rank
Permission is improved to the calling of data and circulation when data have stolen risk, data of the alarm module 64 for 1 grade exist
It alarms when stolen and loss, for reminding staff's database that there are risks.
The display system 7 includes display, and the display is used to facilitate the management work of large database concept 1.
Embodiment 2
The embodiment of the present invention difference from example 1 is that, the analysis system 4 further includes computer vulnerability analysis system
4, the computer leak analysis module 43 is for checking computer-internal with the presence or absence of high-risk loophole, and there is wood for high-risk loophole
The danger of horse Virus entry, the computer leak analysis module 43 are used to solve the high-risk leakage copper of computer, improve computer
Safety.
The working principle of the invention is: big data risk rating system grades the data in large database concept 1, from low
It is respectively 1~4 grade to height, processing mode of the data of each rank when having stolen is different, and data are equipped in large database concept 1
Library built in self testing module 21, periodically in large database concept 1 data carry out self-test, when occur loss of data or it is stolen when, automatically
It is handled according to rank, the safety of 4 analysis and testing equipment of analysis system in equipment.
The above, the only specific embodiment of the disclosure, but the protection scope of the disclosure is not limited thereto, it is any
Those familiar with the art can easily think of the change or the replacement in the technical scope that the disclosure discloses, and should all contain
It covers within the protection scope of the disclosure.Therefore, the protection scope of the disclosure should be subject to the protection scope in claims.
Claims (8)
1. a kind of big data network security monitoring equipment, including large database concept (1), monitoring system (2), control system (3), analysis
System (4), assessment system (5), processing system (6) and display system (7), which is characterized in that the monitoring system (2) includes number
According to library built in self testing module (21), information filtering module (22) and tracking of information module (23), the control system (3) includes supplying
Electric module (31) and switch module (32), the analysis system (4) include database cloud analysis module (41) and network security point
It analyses module (42), the assessment system (5) includes online risk evaluation module (51) and big data risk rating module (52), institute
Online risk evaluation module (51) are stated by the risk of connection internet assessment large database concept (1), the big data risk is commented
Grade module (52) is used to carry out risk rating to the data in large database concept (1), and the processing system (6) includes hard disk self-destruction mould
Block (61), data encryption module (62), privilege-escalation module (63) and alarm module (64).
2. big data network security monitoring equipment according to claim 1, which is characterized in that the data store internal self-test
Module (21) self-test internal for large database concept (1), the information filtering module (22) will be for that will be added to large database concept (1)
Interior data are filtered.
3. big data network security monitoring equipment according to claim 2, which is characterized in that the power supply module (31) is logical
Power supply adaptor is crossed to connect with socket.
4. big data network security monitoring equipment according to claim 3, which is characterized in that the database cloud analysis mould
Block (41) is for connecting large database concept (1) into cloud.
5. big data network security monitoring equipment according to claim 4, which is characterized in that in the large database concept (1)
The data in portion are divided into different ranks according to importance, and the importance of data is divided into 1 grade, 2 grades, 3 grades and 4 grades from low to high.
6. big data network security monitoring equipment according to claim 5, which is characterized in that the hard disk self-destruction module
(61) hard disk self-destruction when the data for being 4 grades for rank have stolen risk, the data encryption module (62) are used for rank
Data are encrypted when there is stolen risk for 3 grades of data, the privilege-escalation module (63) is 2 grades for rank
Permission is improved to the calling of data and circulation when data have stolen risk.
7. big data network security monitoring equipment according to claim 6, which is characterized in that display system (7) packet
Include display.
8. any big data network security monitoring equipment according to claim 1~7, which is characterized in that the analysis system
System (4) further includes computer vulnerability analysis system (4).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910045493.3A CN109672689A (en) | 2019-01-17 | 2019-01-17 | A kind of big data network security monitoring equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910045493.3A CN109672689A (en) | 2019-01-17 | 2019-01-17 | A kind of big data network security monitoring equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109672689A true CN109672689A (en) | 2019-04-23 |
Family
ID=66150435
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910045493.3A Pending CN109672689A (en) | 2019-01-17 | 2019-01-17 | A kind of big data network security monitoring equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109672689A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111581636A (en) * | 2020-03-26 | 2020-08-25 | 大连交通大学 | Network security monitoring equipment |
CN111683037A (en) * | 2020-04-13 | 2020-09-18 | 安徽公安职业学院 | Intelligent network safety system based on big data analysis |
CN114221887A (en) * | 2021-12-15 | 2022-03-22 | 山西大学 | Network security monitoring system and method |
CN114979194A (en) * | 2022-01-28 | 2022-08-30 | 上海伟之锦网络技术有限公司 | Big data and physiological data-based risk control platform for communication engineering |
CN115021999A (en) * | 2022-05-27 | 2022-09-06 | 武汉云月玲智科技有限公司 | Network information security monitoring system and method based on big data management |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080168135A1 (en) * | 2007-01-05 | 2008-07-10 | Redlich Ron M | Information Infrastructure Management Tools with Extractor, Secure Storage, Content Analysis and Classification and Method Therefor |
CN106209851A (en) * | 2016-07-13 | 2016-12-07 | 安庆师范大学 | A kind of safety protection system and method for Computer information network |
CN107330330A (en) * | 2017-07-12 | 2017-11-07 | 胡文强 | A kind of computer network security supervising device |
CN107819495A (en) * | 2017-12-05 | 2018-03-20 | 成都法线网络科技有限公司 | Big data network security monitoring device |
CN108200067A (en) * | 2018-01-05 | 2018-06-22 | 国网山东省电力公司聊城供电公司 | Big data information network adaptive security guard system based on trust computing |
CN108462712A (en) * | 2018-03-22 | 2018-08-28 | 安徽八六物联科技有限公司 | A kind of data flow management early warning system |
-
2019
- 2019-01-17 CN CN201910045493.3A patent/CN109672689A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080168135A1 (en) * | 2007-01-05 | 2008-07-10 | Redlich Ron M | Information Infrastructure Management Tools with Extractor, Secure Storage, Content Analysis and Classification and Method Therefor |
CN106209851A (en) * | 2016-07-13 | 2016-12-07 | 安庆师范大学 | A kind of safety protection system and method for Computer information network |
CN107330330A (en) * | 2017-07-12 | 2017-11-07 | 胡文强 | A kind of computer network security supervising device |
CN107819495A (en) * | 2017-12-05 | 2018-03-20 | 成都法线网络科技有限公司 | Big data network security monitoring device |
CN108200067A (en) * | 2018-01-05 | 2018-06-22 | 国网山东省电力公司聊城供电公司 | Big data information network adaptive security guard system based on trust computing |
CN108462712A (en) * | 2018-03-22 | 2018-08-28 | 安徽八六物联科技有限公司 | A kind of data flow management early warning system |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111581636A (en) * | 2020-03-26 | 2020-08-25 | 大连交通大学 | Network security monitoring equipment |
CN111683037A (en) * | 2020-04-13 | 2020-09-18 | 安徽公安职业学院 | Intelligent network safety system based on big data analysis |
CN114221887A (en) * | 2021-12-15 | 2022-03-22 | 山西大学 | Network security monitoring system and method |
CN114979194A (en) * | 2022-01-28 | 2022-08-30 | 上海伟之锦网络技术有限公司 | Big data and physiological data-based risk control platform for communication engineering |
CN115021999A (en) * | 2022-05-27 | 2022-09-06 | 武汉云月玲智科技有限公司 | Network information security monitoring system and method based on big data management |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109672689A (en) | A kind of big data network security monitoring equipment | |
CN105337971A (en) | Electric power information system cloud safety guarantee system and implementation method thereof | |
CN103795735B (en) | Safety means, server and server info safety implementation method | |
WO2013052377A2 (en) | Secure integrated cyberspace security and situational awareness system | |
CN102508792A (en) | Method for realizing secure access of data in hard disk | |
CN113596028A (en) | Method and device for handling network abnormal behaviors | |
CN108810035A (en) | A kind of Network Security Device monitored in real time | |
Al-Matari et al. | Cybersecurity tools for IS auditing | |
Khodabakhsh et al. | Cyber-risk identification for a digital substation | |
Xu et al. | Network security | |
Peng | Research on the Technology of Computer Network Security Protection | |
CN103902922A (en) | Method and system for preventing file from being stolen | |
CN111581636A (en) | Network security monitoring equipment | |
Vivekananth | Cybersecurity risks in remote working environment and strategies to mitigate them | |
CN108965253A (en) | A kind of network safety system based on artificial intelligence | |
Mysore | Strategic Integration of Cybersecurity in Power Transmission Systems for Enhanced Grid Resilience | |
CN112000953A (en) | Big data terminal safety protection system | |
CN105912945A (en) | Safety reinforcing device and operation method of operating system | |
Gu et al. | Optimization Strategy of Computer Network Security Technology in Big Data Environment | |
CN106941497B (en) | Safety processing system based on information platform data | |
CN110990900B (en) | Computer network intelligent monitoring system | |
US20230252138A1 (en) | Cybersecurity workflow management using autodetection | |
Kuldashevna | TECHNOLOGIES FOR PROVIDING INFORMATION PROTECTION | |
ENE et al. | Cybersecurity–A Permanent Challenge for the Energy Sector | |
Rayimdjonova et al. | THE PRINCIPLE OF PROVIDING INFORMATION SECURITY IN MULTISERVICE COMMUNICATION NETWORKS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190423 |