CN106210088A - A kind of contamination analysis platform of multi-source data - Google Patents

A kind of contamination analysis platform of multi-source data Download PDF

Info

Publication number
CN106210088A
CN106210088A CN201610562108.9A CN201610562108A CN106210088A CN 106210088 A CN106210088 A CN 106210088A CN 201610562108 A CN201610562108 A CN 201610562108A CN 106210088 A CN106210088 A CN 106210088A
Authority
CN
China
Prior art keywords
data
link
node
computer
similarity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610562108.9A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610562108.9A priority Critical patent/CN106210088A/en
Publication of CN106210088A publication Critical patent/CN106210088A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Alarm Systems (AREA)

Abstract

The contamination analysis platform of a kind of multi-source data, including polluted information acquisition terminal, wireless network, Cloud Server cluster, encryption system and security postures map system;Polluted information acquisition terminal includes polluting distributed points computer, blowdown data distributed computer, air quality distributed computer and water source Mass Distribution formula computer, and the data that polluted information acquisition terminal collects are sent to Cloud Server cluster by wireless network and are analyzed, process and store;Described encryption system is for being encrypted the data received, and the user only holding key could obtain data;Described Cloud Server cluster includes multiple node and link, and described security postures map system is for generating visual security postures map for Cloud Server cluster, to facilitate management personnel to be monitored the safety information of server cluster.

Description

A kind of contamination analysis platform of multi-source data
Technical field
The present invention relates to contamination data control field, be specifically related to the contamination analysis platform of a kind of multi-source data.
Background technology
Along with the development of social modernization's process, the pollution problem of environment is increasingly paid close attention to by people, is included into ring The distributed points of border monitoring gets more and more, and data to be processed also get more and more, and this makes to utilize cloud computing to process relevant environment Information becomes inevitable trend.Cloud Server be typically all multiple computer composition cluster, but the peace of Cloud Server itself Full problem is also a highly important problem, because this is related to the problems such as safe, the leakage of important environmental information be correlated with. Therefore, it is necessary to design the contamination analysis platform of the multi-source data of a kind of high security.
Summary of the invention
For the problems referred to above, the present invention provides the contamination analysis platform of a kind of multi-source data.
The purpose of the present invention realizes by the following technical solutions:
The contamination analysis platform of a kind of multi-source data, including polluted information acquisition terminal, wireless network, Cloud Server collection Group, encryption system and security postures map system;Described polluted information acquisition terminal includes polluting distributed points computer, blowdown number According to distributed computer, air quality distributed computer and water source Mass Distribution formula computer, above-mentioned distributed computer divides Yong Yu not monitor the concrete distribution situation of each points of contamination, the blowdown data of each blowdown point, the air quality of each distributed points Situation, the water source quality condition of each distributed points, the data that polluted information acquisition terminal collects are sent to by wireless network Cloud Server cluster is analyzed, processes and stores;Described encryption system, for being encrypted the data received, is only held The user having key could obtain data;Described Cloud Server cluster includes multiple node and link, described security postures map System is for generating visual security postures map for Cloud Server cluster, to facilitate management personnel to Cloud Server cluster Safety information is monitored;
The invention have the benefit that various types of other polluter is monitored by the multiple distributed computer of employing, number According to the most reliable, cloud service cluster is utilized to alleviate calculating and the storage capacity of tradition home server.
Accompanying drawing explanation
The invention will be further described to utilize accompanying drawing, but the embodiment in accompanying drawing does not constitute any limit to the present invention System, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to obtain according to the following drawings Other accompanying drawing.
Fig. 1 is the structured flowchart of the contamination analysis platform of a kind of multi-source data;
Fig. 2 is the structured flowchart of safety military posture map system;
Fig. 3 is the security postures map example after generating.
Reference: wireless network-1;Cloud Server cluster-2;Encryption system-3;Pollute distributed points computer-4;Blowdown Data distributed computer-5;Air quality distributed computer-6;Water source Mass Distribution formula computer-7;Geographical background figure is raw Become module-100;Safety information acquisition module-200;Data base's generation module-300;Roller warning generation module-400;Peace Full situation value estimation block-500;Main map generation module-600.
Detailed description of the invention
The invention will be further described with the following Examples.
Application scenarios 1:
The contamination analysis platform of a kind of multi-source data as shown in Figure 1, including polluted information acquisition terminal, wireless network 1, Cloud Server cluster 2, encryption system 3 and security postures map system.Polluted information acquisition terminal includes that polluting distributed points calculates Machine 4, blowdown data distributed computer 5, air quality distributed computer 6 and water source Mass Distribution formula computer 7, above-mentioned point Cloth computer is respectively used to monitor the concrete distribution situation of each points of contamination, the blowdown data of each blowdown point, each distribution The air quality situation of point, the water source quality condition of each distributed points, the data that polluted information acquisition terminal collects pass through nothing Gauze network 1 is sent to Cloud Server cluster 2 and is analyzed, processes and stores;Described encryption system 3 is for the data received Being encrypted, the user only holding key could obtain data;Described Cloud Server cluster 2 includes multiple node and link, Cloud, for generating visual security postures map for Cloud Server cluster 2, is taken by described security postures map system to facilitate The safety information of business device cluster is monitored.
The present invention uses multiple distributed computer to be monitored various types of other polluter, and data are comprehensively reliable, profit Calculating and the storage capacity of tradition home server is alleviated with cloud service cluster.
Preferably, described air quality distributed computer 6 and water source Mass Distribution formula computer 7 include local computer And the watch-dog being connected with local computer, described watch-dog includes sensor, programmable controller and auxiliary reclay, institute State sensor and include PH sensor, EO sensor and COD sensor.
Preferably, described local computer carries out communication according to communications protocol by RS232 serial port and watch-dog, passes through Wireless network 1 and Cloud Server cluster 2 communication.
Preferably, as in figure 2 it is shown, described security postures map system includes geographical background figure generation module 100, safety letter Breath acquisition module 200, data base's generation module 300, roller warning generation module 400, security postures value estimation block 500 and Main map generation module 600:
(1) geographical background figure generation module 100: utilize MAPX software, using the geographical map at network place as Background Layer, splits the network into multiple node and the link connected between two nodes simultaneously, by node and link maps to Background On layer;
(2) safety information acquisition module 200: network information data is acquired by multiple data acquisition unit, described Data acquisition unit is based on Syslog acquisition mode, using Snmp as supplementary acquisition mode, by differently configured network security Equipment completes the collection to network information data;Described network information data includes daily record data, data on flows and vulnerability information, The acquisition of wherein said vulnerability information by scanning tools and network ids intrusion detection instrument, by Snmp or Http agreement by Log collection plug-in unit or data-interface complete;Described daily record data is passed through Syslog agreement and Flow agreement by data acquisition unit It is acquired;
(3) data base's generation module 300: the described network information data after gathering is carried out by proxy management server Merger and filtration, form unified data form and be sent to server terminal basis of formation data base;
(4) roller warning generation module 400: network information data is carried out polymerization classification and accordingly generates roller report Alert, described roller is reported to the police and is arranged on the right side of security postures map, the following operation of concrete execution:
(4-1) from basic database, recall network information data, multiple classification thresholds T1 is set simultaneously, T2, T3 ..., Tn, similarity update threshold values T, curvature threshold K, similarity duration threshold A and initial similarity C, and circulation takes Go out the network information data in preset time, call Similarity Measure function and calculate real-time similarity, and generate at each node The curvilinear function AI of real-time similarity and time;
(4-2) result of calculation is compared, if similarity is more than initial similarity C in real time, then update the most similar Degree is current similarity, and otherwise retaining initial similarity C is current similarity, and enumerator adds 1;
(4-3) by current similarity and multiple classification thresholds T1, T2, T3 ..., Tn compares, according to the most similar The threshold interval at degree place determines the alarm level of this security incident, wherein T < T1 < T2 < T3 ... < Tn;If it is current Similarity does not falls within arbitrary interval, then current similarity compared with similarity threshold values T, if current similarity is less than similar Bottom valve value T, the then following operation of execution:
Calculating current point in time, relative to the real-time similarity variable quantity of previous time point, i.e. calculates described curvilinear function AI Current point in time is relative to curvature K' of previous time point, if K'> is K, and current similarity is less than similarity threshold T's When persistent period is less than similarity duration threshold A, by qualitative for this network information data for harmless security incident, do not perform to add Add the operation of new warning classification, the relevant information of described harmless security incident is stored into the temporary store of artificial setting simultaneously In, when same node is had reached 2 harmless security incidents by enumerator numeration, then perform to add the behaviour of new warning classification Make;When arbitrary current similarity is less than the persistent period of similarity threshold T more than or equal to big similarity duration threshold A Time, also perform to add the operation of new warning classification;The misdetection rate of now security incident is less than 5 ‰;
(4-4) by all-network information data, after above-mentioned polymerization sorting technique classification, to roll the form reported to the police Display is on the right side of map, and the warning color of different classification is set to different;
(5) security postures value estimation block 500: obtain the network safety situation value of each node and link according to following formula:
FN{WH, WL, FH, FL, t}=WH.FH+WL.FL
Herein,
FH(H, V1, Fs, t)=V1.Fs(t)+10P’(t)
FL(L, V2, US, t)=V2.Us(t)+10B‘(t)
Wherein, WHRepresent the weighted value that destination node is shared in all nodes, WLRepresent that Target Link is in all links Shared weighted value, WH、WLThe information on services provided by node and link component respectively obtains;
FHRepresenting the security postures situation of t destination node, H represents destination node, V1Represent that a certain service is transported at node Weight shared in all services of row;P represents joint behavior situation, and P value the biggest expression joint behavior is the poorest, and P ' (t) represents t Moment link performance changing condition, is tried to achieve by the curvature calculating function P point, and forces P ' (t)≤3, works as P ' (t) value and is more than When 3, injunction P ' (t)=3;Fs(t)=N1 (t) .10D1(t), represent the service safe situation situation of t destination node, N1 T () represents that t node is hacked the number of times of generation, D1t represents the order of severity that t node is hacked, and it saves with target The attack kind that the currently provided service of point is subject to is relevant with the number of times of attack being subject to, and is manually set this letter as the case may be Number;
FLRepresenting the security postures situation of t Target Link, L represents Target Link, V2Represent that a certain Component service is at chain Shared weight in all component service that road is run;B represents link performance situation, and the performance of numerical value the biggest expression link is the poorest, B ' (t) represents t link performance changing condition, is tried to achieve by the curvature calculating function B point, and forces B ' (t)≤3, when When B ' (t) value is more than 3, injunction B ' (t)=3;US(t)=N2 (t) .10D2(t), represent the service safe of t Target Link Situation situation, N2t represents that t link is hacked the number of times of generation, and D2t represents the order of severity that t link is hacked, its Attack kind and suffered number of times of attack that the service provided with Target Link is subject to are relevant, the most artificially set This function fixed;
(6) main map generation module 600: according to each node calculated and the network safety situation value of link, root According to threshold value set in advance, the network safety situation of different numerical value is carried out classification, represent different situation grade with different colours Node and the safe condition of link, generate security postures map.
In the present embodiment, network information data is acquired by multiple data acquisition unit, it is ensured that network information data is adopted Collect is comprehensive;Algorithm based on attribute phase recency, by arranging threshold values, compares each warning information, calls respective function and carries out The filtration of warning information, polymerization, be simultaneous for the background event that is likely to occur or substantially do not hinder safe event, uses phase Rate of seemingly writing music and the new evaluation criteria of persistent period, eliminate outside Normal Alarm by this kind of event, reduces and does monitoring personnel Disturb, on the other hand in order to avoid security breaches, this kind of security incident is put in temporary store, recognize when occurring more than 2 times Being set to new security incident, the misdetection rate of now security incident is less than 5 ‰, and this makes the safety behavior verity of military posture map more Height, this improves the credibility of military posture map from another point of view;Devise new network safety situation computing formula, consider simultaneously The security postures of node and link, it is contemplated that the impact of many factors;Force to be defined to by the maximum of P ' (t) and B ' (t) 3, then the item 10 that reaction node and link performance dynamically changeP‘(t)With 10B‘(t)Not over 1000, this is to a certain degree suppressing The misjudgment phenomenon in short-term being likely to occur in dynamic representation, it is ensured that the stability of image.
Preferably, the acquisition process of described joint behavior situation P is: respectively to processor utilization, memory usage, net Network connects number, data packetloss rate arranges corresponding threshold value, and the change threshold at Fixed Time Interval, above-mentioned each value is surpassed The absolute value sum of the difference crossing respective doors limit value is expressed as J1, by each value in Fixed Time Interval amplitude of variation more than change threshold The absolute value sum of the concrete difference of value is expressed as J2, following formula obtain joint behavior situation P:P=2J1+J2
The acquisition process of described link performance situation B is: respectively to link component number of network connections, bandwidth availability ratio, number According to packet loss, link component processor utilization, corresponding threshold value, and the change threshold at Fixed Time Interval are set;Will The absolute value sum of the concrete difference that above-mentioned each value exceedes respective doors limit value is designated as J3, and at Fixed Time Interval, each value is changed width Degree is designated as J4 more than the absolute value sum of the concrete difference of change threshold, following formula obtain link performance situation B:B=2J3+J4
The determination process of the weighted value of described each node is:
(1) each node is set up relative to other nodes importance degree comparator matrix on network safety situation;
(2) the importance degree comparator matrix by node is converted to the fuzzy consistent matrix of node;
(3) according to each element of the fuzzy consistent matrix of node, the weighted value of each node is calculated.
The determination process of the weighted value of described each link is:
(1) each link is set up relative to other links importance degree comparator matrix on network safety situation;
(2) the importance degree comparator matrix by link is converted to the fuzzy consistent matrix of link;
(3) according to each element of the fuzzy consistent matrix of link, the weighted value of each link is calculated.
Fig. 3 gives the example of the security postures map after generation.
The present embodiment considers the impact of the dynamically change of node and link, relative to present discrete type node and chain For the performance state method for expressing of road, the dynamically change of node and link (can be passed through P=2 continuouslyJ1+J2And B=2J3+J4 Arrange replace discrete type of the prior art and dynamically change) be reacted in final security postures value.
Application scenarios 2:
The contamination analysis platform of a kind of multi-source data as shown in Figure 1, including polluted information acquisition terminal, wireless network 1, Cloud Server cluster 2, encryption system 3 and security postures map system.Polluted information acquisition terminal includes that polluting distributed points calculates Machine 4, blowdown data distributed computer 5, air quality distributed computer 6 and water source Mass Distribution formula computer 7, above-mentioned point Cloth computer is respectively used to monitor the concrete distribution situation of each points of contamination, the blowdown data of each blowdown point, each distribution The air quality situation of point, the water source quality condition of each distributed points, the data that polluted information acquisition terminal collects pass through nothing Gauze network 1 is sent to Cloud Server cluster 2 and is analyzed, processes and stores;Described encryption system 3 is for the data received Being encrypted, the user only holding key could obtain data;Described Cloud Server cluster 2 includes multiple node and link, Cloud, for generating visual security postures map for Cloud Server cluster 2, is taken by described security postures map system to facilitate The safety information of business device cluster is monitored.
The present invention uses multiple distributed computer to be monitored various types of other polluter, and data are comprehensively reliable, profit Calculating and the storage capacity of tradition home server is alleviated with cloud service cluster.
Preferably, described air quality distributed computer 6 and water source Mass Distribution formula computer 7 include local computer And the watch-dog being connected with local computer, described watch-dog includes sensor, programmable controller and auxiliary reclay, institute State sensor and include PH sensor, EO sensor and COD sensor.
Preferably, described local computer carries out communication according to communications protocol by RS232 serial port and watch-dog, passes through Wireless network 1 and Cloud Server cluster 2 communication.
Preferably, as in figure 2 it is shown, described security postures map system includes geographical background figure generation module 100, safety letter Breath acquisition module 200, data base's generation module 300, roller warning generation module 400, security postures value estimation block 500 and Main map generation module 600:
(1) geographical background figure generation module 100: utilize MAPX software, using the geographical map at network place as Background Layer, splits the network into multiple node and the link connected between two nodes simultaneously, by node and link maps to Background On layer;
(2) safety information acquisition module 200: network information data is acquired by multiple data acquisition unit, described Data acquisition unit is based on Syslog acquisition mode, using Snmp as supplementary acquisition mode, by differently configured network security Equipment completes the collection to network information data;Described network information data includes daily record data, data on flows and vulnerability information, The acquisition of wherein said vulnerability information by scanning tools and network ids intrusion detection instrument, by Snmp or Http agreement by Log collection plug-in unit or data-interface complete;Described daily record data is passed through Syslog agreement and Flow agreement by data acquisition unit It is acquired;
(3) data base's generation module 300: the described network information data after gathering is carried out by proxy management server Merger and filtration, form unified data form and be sent to server terminal basis of formation data base;
(4) roller warning generation module 400: network information data is carried out polymerization classification and accordingly generates roller report Alert, described roller is reported to the police and is arranged on the right side of security postures map, the following operation of concrete execution:
(4-1) from basic database, recall network information data, multiple classification thresholds T1 is set simultaneously, T2, T3 ..., Tn, similarity update threshold values T, curvature threshold K, similarity duration threshold A and initial similarity C, and circulation takes Go out the network information data in preset time, call Similarity Measure function and calculate real-time similarity, and generate at each node The curvilinear function AI of real-time similarity and time;
(4-2) result of calculation is compared, if similarity is more than initial similarity C in real time, then update the most similar Degree is current similarity, and otherwise retaining initial similarity C is current similarity, and enumerator adds 1;
(4-3) by current similarity and multiple classification thresholds T1, T2, T3 ..., Tn compares, according to the most similar The threshold interval at degree place determines the alarm level of this security incident, wherein T < T1 < T2 < T3 ... < Tn;If it is current Similarity does not falls within arbitrary interval, then current similarity compared with similarity threshold values T, if current similarity is less than similar Bottom valve value T, the then following operation of execution:
Calculating current point in time, relative to the real-time similarity variable quantity of previous time point, i.e. calculates described curvilinear function AI Current point in time is relative to curvature K' of previous time point, if K'> is K, and current similarity is less than similarity threshold T's When persistent period is less than similarity duration threshold A, by qualitative for this network information data for harmless security incident, do not perform to add Add the operation of new warning classification, the relevant information of described harmless security incident is stored into the temporary store of artificial setting simultaneously In, when same node is reached 3 harmless security incidents by enumerator numeration is accumulative, then perform to add the operation of new warning classification; When arbitrary time currently the similarity persistent period less than similarity threshold T is more than or equal to big similarity duration threshold A, also Perform to add the operation of new warning classification;The misdetection rate of now security incident is less than 6 ‰;
(4-4) by all-network information data, after above-mentioned polymerization sorting technique classification, to roll the form reported to the police Display is on the right side of map, and the warning color of different classification is set to different;
(5) security postures value estimation block 500: obtain the network safety situation value of each node and link according to following formula:
FN{WH, WL, FH, FL, t}=WH.FH+WL.FL
Herein,
FH(H, V1, Fs, t)=V1.Fs(t)+10P’(t)
FL(L, V2, US, t)=V2.US(t)+10B‘(t)
Wherein, WHRepresent the weighted value that destination node is shared in all nodes, WLRepresent that Target Link is in all links Shared weighted value, WH、WLThe information on services provided by node and link component respectively obtains;
FHRepresenting the security postures situation of t destination node, H represents destination node, V1Represent that a certain service is transported at node Weight shared in all services of row;P represents joint behavior situation, and P value the biggest expression joint behavior is the poorest, and P ' (t) represents t Moment link performance changing condition, is tried to achieve by the curvature calculating function P point, and forces P ' (t)≤3, works as P ' (t) value and is more than When 3, injunction P ' (t)=3;Fs(t)=N1 (t) .10D1(t), represent the service safe situation situation of t destination node, N1 T () represents that t node is hacked the number of times of generation, D1t represents the order of severity that t node is hacked, and it saves with target The attack kind that the currently provided service of point is subject to is relevant with the number of times of attack being subject to, and is manually set this letter as the case may be Number;
FLRepresenting the security postures situation of t Target Link, L represents Target Link, V2Represent that a certain Component service is at chain Shared weight in all component service that road is run;B represents link performance situation, and the performance of numerical value the biggest expression link is the poorest, B ' (t) represents t link performance changing condition, is tried to achieve by the curvature calculating function B point, and forces B ' (t)≤3, when When B ' (t) value is more than 3, injunction B ' (t)=3;US(t)=N2 (t) .10D2(t), represent the service safe of t Target Link Situation situation, N2t represents that t link is hacked the number of times of generation, and D2t represents the order of severity that t link is hacked, its Attack kind and suffered number of times of attack that the service provided with Target Link is subject to are relevant, the most artificially set This function fixed;
(6) main map generation module 600: according to each node calculated and the network safety situation value of link, root According to threshold value set in advance, the network safety situation of different numerical value is carried out classification, represent different situation grade with different colours Node and the safe condition of link, generate security postures map.
In the present embodiment, network information data is acquired by multiple data acquisition unit, it is ensured that network information data is adopted Collect is comprehensive;Algorithm based on attribute phase recency, by arranging threshold values, compares each warning information, calls respective function and carries out The filtration of warning information, polymerization, be simultaneous for the background event that is likely to occur or substantially do not hinder safe event, uses phase Rate of seemingly writing music and the new evaluation criteria of persistent period, eliminate outside Normal Alarm by this kind of event, reduces and does monitoring personnel Disturb, on the other hand in order to avoid security breaches, this kind of security incident is put in temporary store, recognize when occurring more than 3 times Being set to new security incident, the misdetection rate of now security incident is less than 6 ‰, and this makes the safety behavior verity of military posture map more Height, this improves the credibility of military posture map from another point of view;Devise new network safety situation computing formula, consider simultaneously The security postures of node and link, it is contemplated that the impact of many factors;Force to be defined to by the maximum of P ' (t) and B ' (t) 3, then the item 10 that reaction node and link performance dynamically changeP‘(t)With 10B‘(t)Not over 1000, this is to a certain degree suppressing The misjudgment phenomenon in short-term being likely to occur in dynamic representation, it is ensured that the stability of image.
Preferably, the acquisition process of described joint behavior situation P is: respectively to processor utilization, memory usage, net Network connects number, data packetloss rate arranges corresponding threshold value, and the change threshold at Fixed Time Interval, above-mentioned each value is surpassed The absolute value sum of the difference crossing respective doors limit value is expressed as J1, by each value in Fixed Time Interval amplitude of variation more than change threshold The absolute value sum of the concrete difference of value is expressed as J2, following formula obtain joint behavior situation P:P=2J1+J2
The acquisition process of described link performance situation B is: respectively to link component number of network connections, bandwidth availability ratio, number According to packet loss, link component processor utilization, corresponding threshold value, and the change threshold at Fixed Time Interval are set;Will The absolute value sum of the concrete difference that above-mentioned each value exceedes respective doors limit value is designated as J3, and at Fixed Time Interval, each value is changed width Degree is designated as J4 more than the absolute value sum of the concrete difference of change threshold, following formula obtain link performance situation B:B=2J3+J4
The determination process of the weighted value of described each node is:
(1) each node is set up relative to other nodes importance degree comparator matrix on network safety situation;
(2) the importance degree comparator matrix by node is converted to the fuzzy consistent matrix of node;
(3) according to each element of the fuzzy consistent matrix of node, the weighted value of each node is calculated.
The determination process of the weighted value of described each link is:
(1) each link is set up relative to other links importance degree comparator matrix on network safety situation;
(2) the importance degree comparator matrix by link is converted to the fuzzy consistent matrix of link;
(3) according to each element of the fuzzy consistent matrix of link, the weighted value of each link is calculated.
Fig. 3 gives the example of the security postures map after generation.
The present embodiment considers the impact of the dynamically change of node and link, relative to present discrete type node and chain For the performance state method for expressing of road, the dynamically change of node and link (can be passed through P=2 continuouslyJ1+J2And B=2J3+J4 Arrange replace discrete type of the prior art and dynamically change) be reacted in final security postures value.
Application scenarios 3:
The contamination analysis platform of a kind of multi-source data as shown in Figure 1, including polluted information acquisition terminal, wireless network 1, Cloud Server cluster 2, encryption system 3 and security postures map system.Polluted information acquisition terminal includes that polluting distributed points calculates Machine 4, blowdown data distributed computer 5, air quality distributed computer 6 and water source Mass Distribution formula computer 7, above-mentioned point Cloth computer is respectively used to monitor the concrete distribution situation of each points of contamination, the blowdown data of each blowdown point, each distribution The air quality situation of point, the water source quality condition of each distributed points, the data that polluted information acquisition terminal collects pass through nothing Gauze network 1 is sent to Cloud Server cluster 2 and is analyzed, processes and stores;Described encryption system 3 is for the data received Being encrypted, the user only holding key could obtain data;Described Cloud Server cluster 2 includes multiple node and link, Cloud, for generating visual security postures map for Cloud Server cluster 2, is taken by described security postures map system to facilitate The safety information of business device cluster is monitored.
The present invention uses multiple distributed computer to be monitored various types of other polluter, and data are comprehensively reliable, profit Calculating and the storage capacity of tradition home server is alleviated with cloud service cluster.
Preferably, described air quality distributed computer 6 and water source Mass Distribution formula computer 7 include local computer And the watch-dog being connected with local computer, described watch-dog includes sensor, programmable controller and auxiliary reclay, institute State sensor and include PH sensor, EO sensor and COD sensor.
Preferably, described local computer carries out communication according to communications protocol by RS232 serial port and watch-dog, passes through Wireless network 1 and Cloud Server cluster 2 communication.
Preferably, as in figure 2 it is shown, described security postures map system includes geographical background figure generation module 100, safety letter Breath acquisition module 200, data base's generation module 300, roller warning generation module 400, security postures value estimation block 500 and Main map generation module 600:
(1) geographical background figure generation module 100: utilize MAPX software, using the geographical map at network place as Background Layer, splits the network into multiple node and the link connected between two nodes simultaneously, by node and link maps to Background On layer;
(2) safety information acquisition module 200: network information data is acquired by multiple data acquisition unit, described Data acquisition unit is based on Syslog acquisition mode, using Snmp as supplementary acquisition mode, by differently configured network security Equipment completes the collection to network information data;Described network information data includes daily record data, data on flows and vulnerability information, The acquisition of wherein said vulnerability information by scanning tools and network ids intrusion detection instrument, by Snmp or Http agreement by Log collection plug-in unit or data-interface complete;Described daily record data is passed through Syslog agreement and Flow agreement by data acquisition unit It is acquired;
(3) data base's generation module 300: the described network information data after gathering is carried out by proxy management server Merger and filtration, form unified data form and be sent to server terminal basis of formation data base;
(4) roller warning generation module 400: network information data is carried out polymerization classification and accordingly generates roller report Alert, described roller is reported to the police and is arranged on the right side of security postures map, the following operation of concrete execution:
(4-1) from basic database, recall network information data, multiple classification thresholds T1 is set simultaneously, T2, T3 ..., Tn, similarity update threshold values T, curvature threshold K, similarity duration threshold A and initial similarity C, and circulation takes Go out the network information data in preset time, call Similarity Measure function and calculate real-time similarity, and generate at each node The curvilinear function AI of real-time similarity and time;
(4-2) result of calculation is compared, if similarity is more than initial similarity C in real time, then update the most similar Degree is current similarity, and otherwise retaining initial similarity C is current similarity, and enumerator adds 1;
(4-3) by current similarity and multiple classification thresholds T1, T2, T3 ..., Tn compares, according to the most similar The threshold interval at degree place determines the alarm level of this security incident, wherein T < T1 < T2 < T3 ... < Tn;If it is current Similarity does not falls within arbitrary interval, then current similarity compared with similarity threshold values T, if current similarity is less than similar Bottom valve value T, the then following operation of execution:
Calculating current point in time, relative to the real-time similarity variable quantity of previous time point, i.e. calculates described curvilinear function AI Current point in time is relative to curvature K' of previous time point, if K'> is K, and current similarity is less than similarity threshold T's When persistent period is less than similarity duration threshold A, by qualitative for this network information data for harmless security incident, do not perform to add Add the operation of new warning classification, the relevant information of described harmless security incident is stored into the temporary store of artificial setting simultaneously In, when same node is had reached 4 harmless security incidents by enumerator numeration, then perform to add the behaviour of new warning classification Make;When arbitrary current similarity is less than the persistent period of similarity threshold T more than or equal to big similarity duration threshold A Time, also perform to add the operation of new warning classification;The misdetection rate of now security incident is less than 7 ‰;
(4-4) by all-network information data, after above-mentioned polymerization sorting technique classification, to roll the form reported to the police Display is on the right side of map, and the warning color of different classification is set to different;
(5) security postures value estimation block 500: obtain the network safety situation value of each node and link according to following formula:
FN{WH, WL, FH, FL, t}=WH.FH+WL.FL
Herein,
FH(H, V1, Fs, t)=V1.Fs(t)+10P’(t)
FL(L, V2, US, t)=V2.US(t)+10B‘(t)
Wherein, WHRepresent the weighted value that destination node is shared in all nodes, WLRepresent that Target Link is in all links Shared weighted value, WH、WLThe information on services provided by node and link component respectively obtains;
FHRepresenting the security postures situation of t destination node, H represents destination node, V1Represent that a certain service is transported at node Weight shared in all services of row;P represents joint behavior situation, and P value the biggest expression joint behavior is the poorest, and P ' (t) represents t Moment link performance changing condition, is tried to achieve by the curvature calculating function P point, and forces P ' (t)≤3, works as P ' (t) value and is more than When 3, injunction P ' (t)=3;Fs(t)=N1 (t) .10D1(t), represent the service safe situation situation of t destination node, N1 T () represents that t node is hacked the number of times of generation, D1t represents the order of severity that t node is hacked, and it saves with target The attack kind that the currently provided service of point is subject to is relevant with the number of times of attack being subject to, and is manually set this letter as the case may be Number;
FLRepresenting the security postures situation of t Target Link, L represents Target Link, V2Represent that a certain Component service is at chain Shared weight in all component service that road is run;B represents link performance situation, and the performance of numerical value the biggest expression link is the poorest, B ' (t) represents t link performance changing condition, is tried to achieve by the curvature calculating function B point, and forces B ' (t)≤3, when When B ' (t) value is more than 3, injunction B ' (t)=3;US(t)=N2 (t) .10D2(t), represent the service safe of t Target Link Situation situation, N2t represents that t link is hacked the number of times of generation, and D2t represents the order of severity that t link is hacked, its Attack kind and suffered number of times of attack that the service provided with Target Link is subject to are relevant, the most artificially set This function fixed;
(6) main map generation module 600: according to each node calculated and the network safety situation value of link, root According to threshold value set in advance, the network safety situation of different numerical value is carried out classification, represent different situation grade with different colours Node and the safe condition of link, generate security postures map.
In the present embodiment, network information data is acquired by multiple data acquisition unit, it is ensured that network information data is adopted Collect is comprehensive;Algorithm based on attribute phase recency, by arranging threshold values, compares each warning information, calls respective function and carries out The filtration of warning information, polymerization, be simultaneous for the background event that is likely to occur or substantially do not hinder safe event, uses phase Rate of seemingly writing music and the new evaluation criteria of persistent period, eliminate outside Normal Alarm by this kind of event, reduces and does monitoring personnel Disturb, on the other hand in order to avoid security breaches, this kind of security incident is put in temporary store, recognize when occurring more than 4 times Being set to new security incident, the misdetection rate of now security incident is less than 7 ‰, and this makes the safety behavior verity of military posture map more Height, this improves the credibility of military posture map from another point of view;Devise new network safety situation computing formula, consider simultaneously The security postures of node and link, it is contemplated that the impact of many factors;Force to be defined to by the maximum of P ' (t) and B ' (t) 3, then the item 10 that reaction node and link performance dynamically changeP‘(t)With 10B‘(t)Not over 1000, this is to a certain degree suppressing The misjudgment phenomenon in short-term being likely to occur in dynamic representation, it is ensured that the stability of image.
Preferably, the acquisition process of described joint behavior situation P is: respectively to processor utilization, memory usage, net Network connects number, data packetloss rate arranges corresponding threshold value, and the change threshold at Fixed Time Interval, above-mentioned each value is surpassed The absolute value sum of the difference crossing respective doors limit value is expressed as J1, by each value in Fixed Time Interval amplitude of variation more than change threshold The absolute value sum of the concrete difference of value is expressed as J2, following formula obtain joint behavior situation P:P=2J1+J2
The acquisition process of described link performance situation B is: respectively to link component number of network connections, bandwidth availability ratio, number According to packet loss, link component processor utilization, corresponding threshold value, and the change threshold at Fixed Time Interval are set;Will The absolute value sum of the concrete difference that above-mentioned each value exceedes respective doors limit value is designated as J3, and at Fixed Time Interval, each value is changed width Degree is designated as J4 more than the absolute value sum of the concrete difference of change threshold, following formula obtain link performance situation B:B=2J3+J4
The determination process of the weighted value of described each node is:
(1) each node is set up relative to other nodes importance degree comparator matrix on network safety situation;
(2) the importance degree comparator matrix by node is converted to the fuzzy consistent matrix of node;
(3) according to each element of the fuzzy consistent matrix of node, the weighted value of each node is calculated.
The determination process of the weighted value of described each link is:
(1) each link is set up relative to other links importance degree comparator matrix on network safety situation;
(2) the importance degree comparator matrix by link is converted to the fuzzy consistent matrix of link;
(3) according to each element of the fuzzy consistent matrix of link, the weighted value of each link is calculated.
Fig. 3 gives the example of the security postures map after generation.
The present embodiment considers the impact of the dynamically change of node and link, relative to present discrete type node and chain For the performance state method for expressing of road, the dynamically change of node and link (can be passed through P=2 continuouslyJ1+J2And B=2J3+J4 Arrange replace discrete type of the prior art and dynamically change) be reacted in final security postures value.
Embodiment 4:
The contamination analysis platform of a kind of multi-source data as shown in Figure 1, including polluted information acquisition terminal, wireless network 1, Cloud Server cluster 2, encryption system 3 and security postures map system.Polluted information acquisition terminal includes that polluting distributed points calculates Machine 4, blowdown data distributed computer 5, air quality distributed computer 6 and water source Mass Distribution formula computer 7, above-mentioned point Cloth computer is respectively used to monitor the concrete distribution situation of each points of contamination, the blowdown data of each blowdown point, each distribution The air quality situation of point, the water source quality condition of each distributed points, the data that polluted information acquisition terminal collects pass through nothing Gauze network 1 is sent to Cloud Server cluster 2 and is analyzed, processes and stores;Described encryption system 3 is for the data received Being encrypted, the user only holding key could obtain data;Described Cloud Server cluster 2 includes multiple node and link, Cloud, for generating visual security postures map for Cloud Server cluster 2, is taken by described security postures map system to facilitate The safety information of business device cluster is monitored.
The present invention uses multiple distributed computer to be monitored various types of other polluter, and data are comprehensively reliable, profit Calculating and the storage capacity of tradition home server is alleviated with cloud service cluster.
Preferably, described air quality distributed computer 6 and water source Mass Distribution formula computer 7 include local computer And the watch-dog being connected with local computer, described watch-dog includes sensor, programmable controller and auxiliary reclay, institute State sensor and include PH sensor, EO sensor and COD sensor.
Preferably, described local computer carries out communication according to communications protocol by RS232 serial port and watch-dog, passes through Wireless network 1 and Cloud Server cluster 2 communication.
Preferably, as in figure 2 it is shown, described security postures map system includes geographical background figure generation module 100, safety letter Breath acquisition module 200, data base's generation module 300, roller warning generation module 400, security postures value estimation block 500 and Main map generation module 600:
(1) geographical background figure generation module 100: utilize MAPX software, using the geographical map at network place as Background Layer, splits the network into multiple node and the link connected between two nodes simultaneously, by node and link maps to Background On layer;
(2) safety information acquisition module 200: network information data is acquired by multiple data acquisition unit, described Data acquisition unit is based on Syslog acquisition mode, using Snmp as supplementary acquisition mode, by differently configured network security Equipment completes the collection to network information data;Described network information data includes daily record data, data on flows and vulnerability information, The acquisition of wherein said vulnerability information by scanning tools and network ids intrusion detection instrument, by Snmp or Http agreement by Log collection plug-in unit or data-interface complete;Described daily record data is passed through Syslog agreement and Flow agreement by data acquisition unit It is acquired;
(3) data base's generation module 300: the described network information data after gathering is carried out by proxy management server Merger and filtration, form unified data form and be sent to server terminal basis of formation data base;
(4) roller warning generation module 400: network information data is carried out polymerization classification and accordingly generates roller report Alert, described roller is reported to the police and is arranged on the right side of security postures map, the following operation of concrete execution:
(4-1) from basic database, recall network information data, multiple classification thresholds T1 is set simultaneously, T2, T3 ..., Tn, similarity update threshold values T, curvature threshold K, similarity duration threshold A and initial similarity C, and circulation takes Go out the network information data in preset time, call Similarity Measure function and calculate real-time similarity, and generate at each node The curvilinear function AI of real-time similarity and time;
(4-2) result of calculation is compared, if similarity is more than initial similarity C in real time, then update the most similar Degree is current similarity, and otherwise retaining initial similarity C is current similarity, and enumerator adds 1;
(4-3) by current similarity and multiple classification thresholds T1, T2, T3 ..., Tn compares, according to the most similar The threshold interval at degree place determines the alarm level of this security incident, wherein T < T1 < T2 < T3 ... < Tn;If it is current Similarity does not falls within arbitrary interval, then current similarity compared with similarity threshold values T, if current similarity is less than similar Bottom valve value T, the then following operation of execution:
Calculating current point in time, relative to the real-time similarity variable quantity of previous time point, i.e. calculates described curvilinear function AI Current point in time is relative to curvature K' of previous time point, if K'> is K, and current similarity is less than similarity threshold T's When persistent period is less than similarity duration threshold A, by qualitative for this network information data for harmless security incident, do not perform to add Add the operation of new warning classification, the relevant information of described harmless security incident is stored into the temporary store of artificial setting simultaneously In, when same node is had reached 5 harmless security incidents by enumerator numeration, then perform to add the behaviour of new warning classification Make;When arbitrary current similarity is less than the persistent period of similarity threshold T more than or equal to big similarity duration threshold A Time, also perform to add the operation of new warning classification;The misdetection rate of now security incident is less than 8 ‰;
(4-4) by all-network information data, after above-mentioned polymerization sorting technique classification, to roll the form reported to the police Display is on the right side of map, and the warning color of different classification is set to different;
(5) security postures value estimation block 500: obtain the network safety situation value of each node and link according to following formula:
FN{WH, WL, FH, FL, t}=WH.FH+WL.FL
Herein,
FH(H, V1, Fs, t)=V1.Fs(t)+10P’(t)
FL(L, V2, US, t)=V2.US(t)+10B‘(t)
Wherein, WHRepresent the weighted value that destination node is shared in all nodes, WLRepresent that Target Link is in all links Shared weighted value, WH、WLThe information on services provided by node and link component respectively obtains;
FHRepresenting the security postures situation of t destination node, H represents destination node, V1Represent that a certain service is transported at node Weight shared in all services of row;P represents joint behavior situation, and P value the biggest expression joint behavior is the poorest, and P ' (t) represents t Moment link performance changing condition, is tried to achieve by the curvature calculating function P point, and forces P ' (t)≤3, works as P ' (t) value and is more than When 3, injunction P ' (t)=3;Fs(t)=N1 (t) .10D1(t), represent the service safe situation situation of t destination node, N1 T () represents that t node is hacked the number of times of generation, D1t represents the order of severity that t node is hacked, and it saves with target The attack kind that the currently provided service of point is subject to is relevant with the number of times of attack being subject to, and is manually set this letter as the case may be Number;
FLRepresenting the security postures situation of t Target Link, L represents Target Link, V2Represent that a certain Component service is at chain Shared weight in all component service that road is run;B represents link performance situation, and the performance of numerical value the biggest expression link is the poorest, B ' (t) represents t link performance changing condition, is tried to achieve by the curvature calculating function B point, and forces B ' (t)≤3, when When B ' (t) value is more than 3, injunction B ' (t)=3;Us(t)=N2 (t) .10D2(t), represent the service safe of t Target Link Situation situation, N2 (t) represents that t link is hacked the number of times of generation, and D2 (t) represents the serious journey that t link is hacked Degree, attack kind and suffered number of times of attack that its service provided with Target Link is subject to are relevant, as the case may be It is manually set this function;
(6) main map generation module 600: according to each node calculated and the network safety situation value of link, root According to threshold value set in advance, the network safety situation of different numerical value is carried out classification, represent different situation grade with different colours Node and the safe condition of link, generate security postures map.
In the present embodiment, network information data is acquired by multiple data acquisition unit, it is ensured that network information data is adopted Collect is comprehensive;Algorithm based on attribute phase recency, by arranging threshold values, compares each warning information, calls respective function and carries out The filtration of warning information, polymerization, be simultaneous for the background event that is likely to occur or substantially do not hinder safe event, uses phase Rate of seemingly writing music and the new evaluation criteria of persistent period, eliminate outside Normal Alarm by this kind of event, reduces and does monitoring personnel Disturb, on the other hand in order to avoid security breaches, this kind of security incident is put in temporary store, recognize when occurring more than 5 times Being set to new security incident, the misdetection rate of now security incident is less than 8 ‰, and this makes the safety behavior verity of military posture map more Height, this improves the credibility of military posture map from another point of view;Devise new network safety situation computing formula, consider simultaneously The security postures of node and link, it is contemplated that the impact of many factors;Force to be defined to by the maximum of P ' (t) and B ' (t) 3, then the item 10 that reaction node and link performance dynamically changeP‘(t)With 10B‘(t)Not over 1000, this is to a certain degree suppressing The misjudgment phenomenon in short-term being likely to occur in dynamic representation, it is ensured that the stability of image.
Preferably, the acquisition process of described joint behavior situation P is: respectively to processor utilization, memory usage, net Network connects number, data packetloss rate arranges corresponding threshold value, and the change threshold at Fixed Time Interval, above-mentioned each value is surpassed The absolute value sum of the difference crossing respective doors limit value is expressed as J1, by each value in Fixed Time Interval amplitude of variation more than change threshold The absolute value sum of the concrete difference of value is expressed as J2, following formula obtain joint behavior situation P:P=2J1+J2
The acquisition process of described link performance situation B is: respectively to link component number of network connections, bandwidth availability ratio, number According to packet loss, link component processor utilization, corresponding threshold value, and the change threshold at Fixed Time Interval are set;Will The absolute value sum of the concrete difference that above-mentioned each value exceedes respective doors limit value is designated as J3, and at Fixed Time Interval, each value is changed width Degree is designated as J4 more than the absolute value sum of the concrete difference of change threshold, following formula obtain link performance situation B:B=2J3+J4
The determination process of the weighted value of described each node is:
(1) each node is set up relative to other nodes importance degree comparator matrix on network safety situation;
(2) the importance degree comparator matrix by node is converted to the fuzzy consistent matrix of node;
(3) according to each element of the fuzzy consistent matrix of node, the weighted value of each node is calculated.
The determination process of the weighted value of described each link is:
(1) each link is set up relative to other links importance degree comparator matrix on network safety situation;
(2) the importance degree comparator matrix by link is converted to the fuzzy consistent matrix of link;
(3) according to each element of the fuzzy consistent matrix of link, the weighted value of each link is calculated.
Fig. 3 gives the example of the security postures map after generation.
The present embodiment considers the impact of the dynamically change of node and link, relative to present discrete type node and chain For the performance state method for expressing of road, the dynamically change of node and link (can be passed through P=2 continuouslyJ1+J2And B=2J3+J4 Arrange replace discrete type of the prior art and dynamically change) be reacted in final security postures value.
Application scenarios 5:
The contamination analysis platform of a kind of multi-source data as shown in Figure 1, including polluted information acquisition terminal, wireless network 1, Cloud Server cluster 2, encryption system 3 and security postures map system.Polluted information acquisition terminal includes that polluting distributed points calculates Machine 4, blowdown data distributed computer 5, air quality distributed computer 6 and water source Mass Distribution formula computer 7, above-mentioned point Cloth computer is respectively used to monitor the concrete distribution situation of each points of contamination, the blowdown data of each blowdown point, each distribution The air quality situation of point, the water source quality condition of each distributed points, the data that polluted information acquisition terminal collects pass through nothing Gauze network 1 is sent to Cloud Server cluster 2 and is analyzed, processes and stores;Described encryption system 3 is for the data received Being encrypted, the user only holding key could obtain data;Described Cloud Server cluster 2 includes multiple node and link, Cloud, for generating visual security postures map for Cloud Server cluster 2, is taken by described security postures map system to facilitate The safety information of business device cluster is monitored.
The present invention uses multiple distributed computer to be monitored various types of other polluter, and data are comprehensively reliable, profit Calculating and the storage capacity of tradition home server is alleviated with cloud service cluster.
Preferably, described air quality distributed computer 6 and water source Mass Distribution formula computer 7 include local computer And the watch-dog being connected with local computer, described watch-dog includes sensor, programmable controller and auxiliary reclay, institute State sensor and include PH sensor, EO sensor and COD sensor.
Preferably, described local computer carries out communication according to communications protocol by RS232 serial port and watch-dog, passes through Wireless network 1 and Cloud Server cluster 2 communication.
Preferably, as in figure 2 it is shown, described security postures map system includes geographical background figure generation module 100, safety letter Breath acquisition module 200, data base's generation module 300, roller warning generation module 400, security postures value estimation block 500 and Main map generation module 600:
(1) geographical background figure generation module 100: utilize MAPX software, using the geographical map at network place as Background Layer, splits the network into multiple node and the link connected between two nodes simultaneously, by node and link maps to Background On layer;
(2) safety information acquisition module 200: network information data is acquired by multiple data acquisition unit, described Data acquisition unit is based on Syslog acquisition mode, using Snmp as supplementary acquisition mode, by differently configured network security Equipment completes the collection to network information data;Described network information data includes daily record data, data on flows and vulnerability information, The acquisition of wherein said vulnerability information by scanning tools and network ids intrusion detection instrument, by Snmp or Http agreement by Log collection plug-in unit or data-interface complete;Described daily record data is passed through Syslog agreement and Flow agreement by data acquisition unit It is acquired;
(3) data base's generation module 300: the described network information data after gathering is carried out by proxy management server Merger and filtration, form unified data form and be sent to server terminal basis of formation data base;
(4) roller warning generation module 400: network information data is carried out polymerization classification and accordingly generates roller report Alert, described roller is reported to the police and is arranged on the right side of security postures map, the following operation of concrete execution:
(4-1) from basic database, recall network information data, multiple classification thresholds T1 is set simultaneously, T2, T3 ..., Tn, similarity update threshold values T, curvature threshold K, similarity duration threshold A and initial similarity C, and circulation takes Go out the network information data in preset time, call Similarity Measure function and calculate real-time similarity, and generate at each node The curvilinear function AI of real-time similarity and time;
(4-2) result of calculation is compared, if similarity is more than initial similarity C in real time, then update the most similar Degree is current similarity, and otherwise retaining initial similarity C is current similarity, and enumerator adds 1;
(4-3) by current similarity and multiple classification thresholds T1, T2, T3 ..., Tn compares, according to the most similar The threshold interval at degree place determines the alarm level of this security incident, wherein T < T1 < T2 < T3 ... < Tn;If it is current Similarity does not falls within arbitrary interval, then current similarity compared with similarity threshold values T, if current similarity is less than similar Bottom valve value T, the then following operation of execution:
Calculating current point in time, relative to the real-time similarity variable quantity of previous time point, i.e. calculates described curvilinear function AI Current point in time is relative to curvature K' of previous time point, if K'> is K, and current similarity is less than similarity threshold T's When persistent period is less than similarity duration threshold A, by qualitative for this network information data for harmless security incident, do not perform to add Add the operation of new warning classification, the relevant information of described harmless security incident is stored into the temporary store of artificial setting simultaneously In, when same node is had reached 6 harmless security incidents by enumerator numeration, then perform to add the behaviour of new warning classification Make;When arbitrary current similarity is less than the persistent period of similarity threshold T more than or equal to big similarity duration threshold A Time, also perform to add the operation of new warning classification;The misdetection rate of now security incident is less than 9 ‰;
(4-4) by all-network information data, after above-mentioned polymerization sorting technique classification, to roll the form reported to the police Display is on the right side of map, and the warning color of different classification is set to different;
(5) security postures value estimation block 500: obtain the network safety situation value of each node and link according to following formula:
FN{ WH, WL, FH, FL, t}=WH.FH+WL.FL
Herein,
FH(H, V1, Fs, t)=V1.Fs(t)+10P’(t)
FL(L, V2, US, t)=V2.US(t)+10B‘(t)
Wherein, WHRepresent the weighted value that destination node is shared in all nodes, WLRepresent that Target Link is in all links Shared weighted value, WH、WLThe information on services provided by node and link component respectively obtains;
FHRepresenting the security postures situation of t destination node, H represents destination node, V1Represent that a certain service is transported at node Weight shared in all services of row;P represents joint behavior situation, and P value the biggest expression joint behavior is the poorest, and P ' (t) represents t Moment link performance changing condition, is tried to achieve by the curvature calculating function P point, and forces P ' (t)≤3, works as P ' (t) value and is more than When 3, injunction P ' (t)=3;Fs(t)=N1 (t) .10D1(t), represent the service safe situation situation of t destination node, N1 T () represents that t node is hacked the number of times of generation, D1 (t) represents the order of severity that t node is hacked, itself and target The attack kind that the currently provided service of node is subject to is relevant with the number of times of attack being subject to, and is manually set this letter as the case may be Number;
FLRepresenting the security postures situation of t Target Link, L represents Target Link, V2Represent that a certain Component service is at chain Shared weight in all component service that road is run;B represents link performance situation, and the performance of numerical value the biggest expression link is the poorest, B ' (t) represents t link performance changing condition, is tried to achieve by the curvature calculating function B point, and forces B ' (t)≤3, when When B ' (t) value is more than 3, injunction B ' (t)=3;US(t)=N2 (t) .10D2(t), represent the service safe of t Target Link Situation situation, N2 (t) represents that t link is hacked the number of times of generation, and D2 (t) represents the serious journey that t link is hacked Degree, attack kind and suffered number of times of attack that its service provided with Target Link is subject to are relevant, as the case may be It is manually set this function;
(6) main map generation module 600: according to each node calculated and the network safety situation value of link, root According to threshold value set in advance, the network safety situation of different numerical value is carried out classification, represent different situation grade with different colours Node and the safe condition of link, generate security postures map.
In the present embodiment, network information data is acquired by multiple data acquisition unit, it is ensured that network information data is adopted Collect is comprehensive;Algorithm based on attribute phase recency, by arranging threshold values, compares each warning information, calls respective function and carries out The filtration of warning information, polymerization, be simultaneous for the background event that is likely to occur or substantially do not hinder safe event, uses phase Rate of seemingly writing music and the new evaluation criteria of persistent period, eliminate outside Normal Alarm by this kind of event, reduces and does monitoring personnel Disturb, on the other hand in order to avoid security breaches, this kind of security incident is put in temporary store, recognize when occurring more than 6 times Being set to new security incident, the misdetection rate of now security incident is less than 9 ‰, and this makes the safety behavior verity of military posture map more Height, this improves the credibility of military posture map from another point of view;Devise new network safety situation computing formula, consider simultaneously The security postures of node and link, it is contemplated that the impact of many factors;Force to be defined to by the maximum of P ' (t) and B ' (t) 3, then the item 10 that reaction node and link performance dynamically changeP‘(t)With 10B‘(t)Not over 1000, this is to a certain degree suppressing The misjudgment phenomenon in short-term being likely to occur in dynamic representation, it is ensured that the stability of image.
Preferably, the acquisition process of described joint behavior situation P is: respectively to processor utilization, memory usage, net Network connects number, data packetloss rate arranges corresponding threshold value, and the change threshold at Fixed Time Interval, above-mentioned each value is surpassed The absolute value sum of the difference crossing respective doors limit value is expressed as J1, by each value in Fixed Time Interval amplitude of variation more than change threshold The absolute value sum of the concrete difference of value is expressed as J2, following formula obtain joint behavior situation P:P=2J1+J2
The acquisition process of described link performance situation B is: respectively to link component number of network connections, bandwidth availability ratio, number According to packet loss, link component processor utilization, corresponding threshold value, and the change threshold at Fixed Time Interval are set;Will The absolute value sum of the concrete difference that above-mentioned each value exceedes respective doors limit value is designated as J3, and at Fixed Time Interval, each value is changed width Degree is designated as J4 more than the absolute value sum of the concrete difference of change threshold, following formula obtain link performance situation B:B=2J3+J4
The determination process of the weighted value of described each node is:
(1) each node is set up relative to other nodes importance degree comparator matrix on network safety situation;
(2) the importance degree comparator matrix by node is converted to the fuzzy consistent matrix of node;
(3) according to each element of the fuzzy consistent matrix of node, the weighted value of each node is calculated.
The determination process of the weighted value of described each link is:
(1) each link is set up relative to other links importance degree comparator matrix on network safety situation;
(2) the importance degree comparator matrix by link is converted to the fuzzy consistent matrix of link;
(3) according to each element of the fuzzy consistent matrix of link, the weighted value of each link is calculated.
Fig. 3 gives the example of the security postures map after generation.
The present embodiment considers the impact of the dynamically change of node and link, relative to present discrete type node and chain For the performance state method for expressing of road, the dynamically change of node and link (can be passed through P=2 continuouslyJ1+J2And B=2J3+J4 Arrange replace discrete type of the prior art and dynamically change) be reacted in final security postures value.
Last it should be noted that, above example is only in order to illustrate technical scheme, rather than the present invention is protected Protecting the restriction of scope, although having made to explain to the present invention with reference to preferred embodiment, those of ordinary skill in the art should Work as understanding, technical scheme can be modified or equivalent, without deviating from the reality of technical solution of the present invention Matter and scope.

Claims (3)

1. a contamination analysis platform for multi-source data, is characterized in that, including polluted information acquisition terminal, wireless network, cloud clothes Business device cluster, encryption system and security postures map system;Described polluted information acquisition terminal include pollute distributed points computer, Blowdown data distributed computer, air quality distributed computer and water source Mass Distribution formula computer, above-mentioned distributed meter Calculation machine is respectively used to monitor the concrete distribution situation of each points of contamination, the blowdown data of each blowdown point, the sky of each distributed points Gas quality condition, the water source quality condition of each distributed points, the data that polluted information acquisition terminal collects pass through wireless network It is sent to Cloud Server cluster be analyzed, process and store;Described encryption system is used for being encrypted the data received, The user only holding key could obtain data;Described Cloud Server cluster includes multiple node and link, described safe state Gesture map system is for generating visual security postures map for Cloud Server cluster, to facilitate the peace to Cloud Server cluster Full information is monitored.
The contamination analysis platform of a kind of multi-source data the most according to claim 1, is characterized in that, described air quality is distributed Formula computer includes local computer and the watch-dog being connected with local computer, described prison with water source Mass Distribution formula computer Control device include sensor, programmable controller and auxiliary reclay, described sensor include PH sensor, EO sensor and COD sensor.
The contamination analysis platform of a kind of multi-source data the most according to claim 2, is characterized in that, described local computer is pressed Communication is carried out by RS232 serial port and watch-dog, by wireless network and Cloud Server trunking communication according to communications protocol.
CN201610562108.9A 2016-07-14 2016-07-14 A kind of contamination analysis platform of multi-source data Withdrawn CN106210088A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610562108.9A CN106210088A (en) 2016-07-14 2016-07-14 A kind of contamination analysis platform of multi-source data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610562108.9A CN106210088A (en) 2016-07-14 2016-07-14 A kind of contamination analysis platform of multi-source data

Publications (1)

Publication Number Publication Date
CN106210088A true CN106210088A (en) 2016-12-07

Family

ID=57475136

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610562108.9A Withdrawn CN106210088A (en) 2016-07-14 2016-07-14 A kind of contamination analysis platform of multi-source data

Country Status (1)

Country Link
CN (1) CN106210088A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108268569A (en) * 2017-01-04 2018-07-10 上海宝信软件股份有限公司 The acquisition of water resource monitoring data and analysis system and method based on big data technology
CN109478055A (en) * 2016-03-01 2019-03-15 源讯网源公司 Using intelligent node for monitoring industrial process in general, intelligence system
CN109873802A (en) * 2018-12-25 2019-06-11 中铁西南科学研究院有限公司 A kind of managing and control system of measuring instrumentss data safety

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109478055A (en) * 2016-03-01 2019-03-15 源讯网源公司 Using intelligent node for monitoring industrial process in general, intelligence system
CN108268569A (en) * 2017-01-04 2018-07-10 上海宝信软件股份有限公司 The acquisition of water resource monitoring data and analysis system and method based on big data technology
CN109873802A (en) * 2018-12-25 2019-06-11 中铁西南科学研究院有限公司 A kind of managing and control system of measuring instrumentss data safety

Similar Documents

Publication Publication Date Title
CN106209856B (en) Method for generating big data security posture map based on trusted computing
CN103685575B (en) A kind of web portal security monitoring method based on cloud framework
Yang et al. A time efficient approach for detecting errors in big sensor data on cloud
CN107851049A (en) System and method for providing Network Safety Analysis based on operating technology and information technology
CN110445801B (en) Situation sensing method and system of Internet of things
CN111162949A (en) Interface monitoring method based on Java byte code embedding technology
WO2008100604A1 (en) Method for equitable placement of a limited number of sensors for wide area surveillance
CN111131304A (en) Cloud platform-oriented large-scale virtual machine fine-grained abnormal behavior detection method and system
CN110460608B (en) Situation awareness method and system including correlation analysis
CN108494802A (en) Key message infrastructure security based on artificial intelligence threatens Active Defending System Against
CN106210088A (en) A kind of contamination analysis platform of multi-source data
CN115037559B (en) Data safety monitoring system based on flow, electronic equipment and storage medium
CN105915402A (en) Industrial control network security protection system
Agate et al. A resilient smart architecture for road surface condition monitoring
CN110493044B (en) Quantifiable situation perception method and system
CN110493217B (en) Distributed situation perception method and system
CN117729032A (en) Night safety protection method for office network
CN109150920A (en) A kind of attack detecting source tracing method based on software defined network
CN110493218B (en) Situation awareness virtualization method and device
Tsugawa et al. Community structure and interaction locality in social networks
CN110471975B (en) Internet of things situation awareness calling method and device
CN109725121A (en) A kind of method and system generating sampling task
CN106226719A (en) A kind of fault electric arc detecting system based on secure cloud network
Lim et al. Research issues in data provenance for streaming environments
CN106196450A (en) A kind of high security central air conditioning system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C04 Withdrawal of patent application after publication (patent law 2001)
WW01 Invention patent application withdrawn after publication

Application publication date: 20161207