CN109672689A - A kind of big data network security monitoring equipment - Google Patents

A kind of big data network security monitoring equipment Download PDF

Info

Publication number
CN109672689A
CN109672689A CN201910045493.3A CN201910045493A CN109672689A CN 109672689 A CN109672689 A CN 109672689A CN 201910045493 A CN201910045493 A CN 201910045493A CN 109672689 A CN109672689 A CN 109672689A
Authority
CN
China
Prior art keywords
module
data
big data
network security
monitoring equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910045493.3A
Other languages
Chinese (zh)
Inventor
郭长友
高秀莲
尹秀玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dezhou University
Original Assignee
Dezhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dezhou University filed Critical Dezhou University
Priority to CN201910045493.3A priority Critical patent/CN109672689A/en
Publication of CN109672689A publication Critical patent/CN109672689A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of big data network security monitoring equipment, are related to technical field of network security, mainly for solving the problems, such as that existing big data network security monitoring equipment safety performance is low;The big data network security monitoring equipment, including large database concept, monitoring system, control system, analysis system, assessment system, processing system and display system, the monitoring system includes data store internal selftest module, information filtering module and tracking of information module, the control system includes power supply module and switch module, the analysis system includes database cloud analysis module and Network Safety Analysis module, the assessment system includes online risk evaluation module and big data risk rating module, the big data risk rating module is used to carry out risk rating to the data in large database concept, the processing system includes hard disk self-destruction module, data encryption module, privilege-escalation module and alarm module, greatly improve the internet security of big data.

Description

A kind of big data network security monitoring equipment
Technical field
The present invention relates to a kind of monitoring device, specifically a kind of big data network security monitoring equipment.
Background technique
Network security refers to that the data in the hardware, software and its system of network system are protected, not because accidental or The reason of person's malice and by destruction, change, leakage, system is continuously reliably normally run, and network service is not interrupted.From net Network operation and manager's angle are said, it is desirable to the operations such as access, the read-write of local network information are protected and be controlled, avoided out Existing " trapdoor ", virus, illegal access, refusal services and the threats such as Internet resources are illegally occupied and illegally controlled, prevention and defence The attack of network hacker.For safe and secret department, they wish to illegal, harmful or be related to the information of state secret Be filtered with it is anti-blocking, avoid confidential information leakage, avoid to society generate harm, bring about great losses to country.
The event of user information leakage at present is more and more, and the attention of many people is caused for network security this part, Network security for how to protect database is the emphasis of more and more people's researchs, and existing data bank network is supervised safely Controlling the monitoring system of equipment, there is many loopholes, so needing a kind of safer large database concept network security monitoring and place Reason system.
Summary of the invention
The purpose of the present invention is to provide a kind of big data network security monitoring equipment, solve existing big data network peace The low problem of full monitoring device security performance.
To achieve the above object, the invention provides the following technical scheme:
A kind of big data network security monitoring equipment, including large database concept, monitoring system, control system, analysis system, assessment system System, processing system and display system, the monitoring system include that data store internal selftest module, information filtering module and information chase after Track module, the control system include power supply module and switch module, the analysis system include database cloud analysis module and Network Safety Analysis module, the assessment system include online risk evaluation module and big data risk rating module, it is described Line risk evaluation module by connection internet assess large database concept risk, the big data risk rating module for pair Data in large database concept carry out risk rating, and the processing system includes that hard disk self-destruction module, data encryption module, permission mention Rising mould block and alarm module.
Based on the above technical solution, the present invention also provides following optional technical solutions:
In a kind of optinal plan: the data store internal selftest module is for the self-test inside large database concept, the information mistake The data being added in large database concept for being filtered by filter module.
In a kind of optinal plan: the power supply module is connect by power supply adaptor with socket.
In a kind of optinal plan: the database cloud analysis module is for connecting large database concept into cloud.
In a kind of optinal plan: the data inside the large database concept are divided into different ranks, data according to importance Importance be divided into 1 grade, 2 grades, 3 grades and 4 grades from low to high.
In a kind of optinal plan: when data of the hard disk self-destruction module for rank to be 4 grades have stolen risk Hard disk self-destruction, data of the data encryption module for rank to be 3 grades encrypt data when there is stolen risk, institute It states and permission is improved to the calling of data and circulation when privilege-escalation module has stolen risk for the data that rank is 2 grades.
In a kind of optinal plan: the display system includes display.
In a kind of optinal plan: analysis system further includes computer vulnerability analysis system.
Compared to the prior art, beneficial effects of the present invention are as follows:
1, by setting information filtering module, for being filtered the data being added in large database concept, when the information of addition When undesirable, the entrance of data can be refused, guarantee the safety for entering internal information;
2, by setting big data risk rating module, different processing means can be taken according to different stage.
Detailed description of the invention
Fig. 1 is the flow diagram of big data network security monitoring equipment.
Fig. 2 is the flow diagram of monitoring system in big data network security monitoring equipment.
Fig. 3 is the flow diagram of analysis system in big data network security monitoring equipment.
Fig. 4 is the flow diagram of assessment system in big data network security monitoring equipment.
Fig. 5 is the flow diagram of processing system in big data network security monitoring equipment.
Fig. 6 is the flow diagram of control system in big data network security monitoring equipment.
Appended drawing reference annotation: 1- large database concept, 2- monitoring system, 3- control system, 4- analysis system, 5- assessment system, 6- processing system, 7- display system, 21- data store internal selftest module, 22- information filtering module, 23- tracking of information module, 31- power supply module, 32- switch module, 41- database cloud analysis module, 42- Network Safety Analysis module, 43- computer loophole The online risk evaluation module of analysis module, 51-, 52- big data risk rating module, 61- hard disk self-destruction module, 62- data add Close module, 63- privilege-escalation module, 64- alarm module.
Specific embodiment
Following embodiment can be described in detail the present invention in conjunction with attached drawing, in attached drawing or explanation, similar or identical part Using identical label, and in practical applications, shape, thickness or the height of each component can be expanded or shunk.Institute of the present invention Each embodiment enumerated is only to illustrate the present invention, is not used to limit the scope of the present invention.It is made for the present invention any aobvious And modification easy to know or change are without departure from spirit and scope of the invention.
Embodiment 1
Please refer to Fig. 1~6, in the embodiment of the present invention, a kind of big data network security monitoring equipment, including large database concept 1, monitoring System 2, control system 3, analysis system 4, assessment system 5, processing system 6 and display system 7, the large database concept 1 is for depositing Data are stored up, by adding and delete internal data, the information inside large database concept 1 can be updated, it can by large database concept 1 The convenient management to various data and the information to data store internal are handled, very convenient.
The monitoring system 2 includes data store internal selftest module 21, information filtering module 22 and tracking of information module 23, The data store internal selftest module 21 for the self-test inside large database concept 1, the data store internal selftest module 21 every Specific time checks that the data inside large database concept 1, the information filtering module 22 will be for that will be added to large database concept 1 Interior data are filtered, and when the information of addition is undesirable, can refuse the entrance of data, guarantee to enter internal information Safety prevents flame to be directly entered in large database concept 1, causes the loss of data, and the tracking of information module 23 is used for The information lost is tracked, the data in large database concept 1 have specific label, can track something lost by tracking of information module 23 It breaks one's promise the position of breath, searches the IP address of theft data personnel, the information of loss can be given for change in time by tracing module, prevented Because of property loss caused by loss of data.
The control system 3 includes power supply module 31 and switch module 32, and the power supply module 31 passes through power supply adaptor It is connect with socket, equipment is powered, improve the power demand of equipment, the switch module 32 can open equipment With the operation of closing, facilitate the use of equipment.
The analysis system 4 includes database cloud analysis module 41 and Network Safety Analysis module 42, the database cloud Analysis module 41 can carry out security inspection according to the information in cloud, pass through number for connecting large database concept 1 into cloud It can be improved the safety of large database concept 1 according to library cloud analysis module 41, the Network Safety Analysis module 42 can analyze network Safety, the main reason for insecurity of network is Missing data, net can be derived that by Network Safety Analysis module 42 The safety of network prevents the data of trojan horse theft user.
The assessment system 5 includes online risk evaluation module 51 and big data risk rating module 52, the online wind Dangerous evaluation module 51 assesses the risk of large database concept 1 by connection internet, uses different places by the height of risk Reason means, the big data risk rating module 52 are used to carry out risk rating, the big data to the data in large database concept 1 Data inside library 1 are divided into different ranks according to importance, and the importance of data is divided into 1 grade, 2 grades, 3 grades and 4 from low to high Grade, rank is different, and processing mode is also different.
The processing system 6 includes hard disk self-destruction module 61, data encryption module 62, privilege-escalation module 63 and alarm mould Block 64, hard disk self-destruction when data of the hard disk self-destruction module 61 for rank to be 4 grades have stolen risk, prevents data quilt It steals, serious consequence is generated, to data when data of the data encryption module 62 for rank to be 3 grades have stolen risk It is encrypted, the calling of data or circulation at this time needs to input password, and the privilege-escalation module 63 is 2 grades for rank Permission is improved to the calling of data and circulation when data have stolen risk, data of the alarm module 64 for 1 grade exist It alarms when stolen and loss, for reminding staff's database that there are risks.
The display system 7 includes display, and the display is used to facilitate the management work of large database concept 1.
Embodiment 2
The embodiment of the present invention difference from example 1 is that, the analysis system 4 further includes computer vulnerability analysis system 4, the computer leak analysis module 43 is for checking computer-internal with the presence or absence of high-risk loophole, and there is wood for high-risk loophole The danger of horse Virus entry, the computer leak analysis module 43 are used to solve the high-risk leakage copper of computer, improve computer Safety.
The working principle of the invention is: big data risk rating system grades the data in large database concept 1, from low It is respectively 1~4 grade to height, processing mode of the data of each rank when having stolen is different, and data are equipped in large database concept 1 Library built in self testing module 21, periodically in large database concept 1 data carry out self-test, when occur loss of data or it is stolen when, automatically It is handled according to rank, the safety of 4 analysis and testing equipment of analysis system in equipment.
The above, the only specific embodiment of the disclosure, but the protection scope of the disclosure is not limited thereto, it is any Those familiar with the art can easily think of the change or the replacement in the technical scope that the disclosure discloses, and should all contain It covers within the protection scope of the disclosure.Therefore, the protection scope of the disclosure should be subject to the protection scope in claims.

Claims (8)

1. a kind of big data network security monitoring equipment, including large database concept (1), monitoring system (2), control system (3), analysis System (4), assessment system (5), processing system (6) and display system (7), which is characterized in that the monitoring system (2) includes number According to library built in self testing module (21), information filtering module (22) and tracking of information module (23), the control system (3) includes supplying Electric module (31) and switch module (32), the analysis system (4) include database cloud analysis module (41) and network security point It analyses module (42), the assessment system (5) includes online risk evaluation module (51) and big data risk rating module (52), institute Online risk evaluation module (51) are stated by the risk of connection internet assessment large database concept (1), the big data risk is commented Grade module (52) is used to carry out risk rating to the data in large database concept (1), and the processing system (6) includes hard disk self-destruction mould Block (61), data encryption module (62), privilege-escalation module (63) and alarm module (64).
2. big data network security monitoring equipment according to claim 1, which is characterized in that the data store internal self-test Module (21) self-test internal for large database concept (1), the information filtering module (22) will be for that will be added to large database concept (1) Interior data are filtered.
3. big data network security monitoring equipment according to claim 2, which is characterized in that the power supply module (31) is logical Power supply adaptor is crossed to connect with socket.
4. big data network security monitoring equipment according to claim 3, which is characterized in that the database cloud analysis mould Block (41) is for connecting large database concept (1) into cloud.
5. big data network security monitoring equipment according to claim 4, which is characterized in that in the large database concept (1) The data in portion are divided into different ranks according to importance, and the importance of data is divided into 1 grade, 2 grades, 3 grades and 4 grades from low to high.
6. big data network security monitoring equipment according to claim 5, which is characterized in that the hard disk self-destruction module (61) hard disk self-destruction when the data for being 4 grades for rank have stolen risk, the data encryption module (62) are used for rank Data are encrypted when there is stolen risk for 3 grades of data, the privilege-escalation module (63) is 2 grades for rank Permission is improved to the calling of data and circulation when data have stolen risk.
7. big data network security monitoring equipment according to claim 6, which is characterized in that display system (7) packet Include display.
8. any big data network security monitoring equipment according to claim 1~7, which is characterized in that the analysis system System (4) further includes computer vulnerability analysis system (4).
CN201910045493.3A 2019-01-17 2019-01-17 A kind of big data network security monitoring equipment Pending CN109672689A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910045493.3A CN109672689A (en) 2019-01-17 2019-01-17 A kind of big data network security monitoring equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910045493.3A CN109672689A (en) 2019-01-17 2019-01-17 A kind of big data network security monitoring equipment

Publications (1)

Publication Number Publication Date
CN109672689A true CN109672689A (en) 2019-04-23

Family

ID=66150435

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910045493.3A Pending CN109672689A (en) 2019-01-17 2019-01-17 A kind of big data network security monitoring equipment

Country Status (1)

Country Link
CN (1) CN109672689A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111581636A (en) * 2020-03-26 2020-08-25 大连交通大学 Network security monitoring equipment
CN111683037A (en) * 2020-04-13 2020-09-18 安徽公安职业学院 Intelligent network safety system based on big data analysis
CN114221887A (en) * 2021-12-15 2022-03-22 山西大学 Network security monitoring system and method
CN114979194A (en) * 2022-01-28 2022-08-30 上海伟之锦网络技术有限公司 Big data and physiological data-based risk control platform for communication engineering
CN115021999A (en) * 2022-05-27 2022-09-06 武汉云月玲智科技有限公司 Network information security monitoring system and method based on big data management

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080168135A1 (en) * 2007-01-05 2008-07-10 Redlich Ron M Information Infrastructure Management Tools with Extractor, Secure Storage, Content Analysis and Classification and Method Therefor
CN106209851A (en) * 2016-07-13 2016-12-07 安庆师范大学 A kind of safety protection system and method for Computer information network
CN107330330A (en) * 2017-07-12 2017-11-07 胡文强 A kind of computer network security supervising device
CN107819495A (en) * 2017-12-05 2018-03-20 成都法线网络科技有限公司 Big data network security monitoring device
CN108200067A (en) * 2018-01-05 2018-06-22 国网山东省电力公司聊城供电公司 Big data information network adaptive security guard system based on trust computing
CN108462712A (en) * 2018-03-22 2018-08-28 安徽八六物联科技有限公司 A kind of data flow management early warning system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080168135A1 (en) * 2007-01-05 2008-07-10 Redlich Ron M Information Infrastructure Management Tools with Extractor, Secure Storage, Content Analysis and Classification and Method Therefor
CN106209851A (en) * 2016-07-13 2016-12-07 安庆师范大学 A kind of safety protection system and method for Computer information network
CN107330330A (en) * 2017-07-12 2017-11-07 胡文强 A kind of computer network security supervising device
CN107819495A (en) * 2017-12-05 2018-03-20 成都法线网络科技有限公司 Big data network security monitoring device
CN108200067A (en) * 2018-01-05 2018-06-22 国网山东省电力公司聊城供电公司 Big data information network adaptive security guard system based on trust computing
CN108462712A (en) * 2018-03-22 2018-08-28 安徽八六物联科技有限公司 A kind of data flow management early warning system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111581636A (en) * 2020-03-26 2020-08-25 大连交通大学 Network security monitoring equipment
CN111683037A (en) * 2020-04-13 2020-09-18 安徽公安职业学院 Intelligent network safety system based on big data analysis
CN114221887A (en) * 2021-12-15 2022-03-22 山西大学 Network security monitoring system and method
CN114979194A (en) * 2022-01-28 2022-08-30 上海伟之锦网络技术有限公司 Big data and physiological data-based risk control platform for communication engineering
CN115021999A (en) * 2022-05-27 2022-09-06 武汉云月玲智科技有限公司 Network information security monitoring system and method based on big data management

Similar Documents

Publication Publication Date Title
CN109672689A (en) A kind of big data network security monitoring equipment
CN105337971A (en) Electric power information system cloud safety guarantee system and implementation method thereof
CN103795735B (en) Safety means, server and server info safety implementation method
WO2013052377A2 (en) Secure integrated cyberspace security and situational awareness system
CN102508792A (en) Method for realizing secure access of data in hard disk
CN113596028A (en) Method and device for handling network abnormal behaviors
CN108810035A (en) A kind of Network Security Device monitored in real time
Al-Matari et al. Cybersecurity tools for IS auditing
Khodabakhsh et al. Cyber-risk identification for a digital substation
Xu et al. Network security
Peng Research on the Technology of Computer Network Security Protection
CN103902922A (en) Method and system for preventing file from being stolen
CN111581636A (en) Network security monitoring equipment
Vivekananth Cybersecurity risks in remote working environment and strategies to mitigate them
CN108965253A (en) A kind of network safety system based on artificial intelligence
Mysore Strategic Integration of Cybersecurity in Power Transmission Systems for Enhanced Grid Resilience
CN112000953A (en) Big data terminal safety protection system
CN105912945A (en) Safety reinforcing device and operation method of operating system
Gu et al. Optimization Strategy of Computer Network Security Technology in Big Data Environment
CN106941497B (en) Safety processing system based on information platform data
CN110990900B (en) Computer network intelligent monitoring system
US20230252138A1 (en) Cybersecurity workflow management using autodetection
Kuldashevna TECHNOLOGIES FOR PROVIDING INFORMATION PROTECTION
ENE et al. Cybersecurity–A Permanent Challenge for the Energy Sector
Rayimdjonova et al. THE PRINCIPLE OF PROVIDING INFORMATION SECURITY IN MULTISERVICE COMMUNICATION NETWORKS

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190423