CN106845276A - A kind of big data based on network security implements system - Google Patents
A kind of big data based on network security implements system Download PDFInfo
- Publication number
- CN106845276A CN106845276A CN201710075047.8A CN201710075047A CN106845276A CN 106845276 A CN106845276 A CN 106845276A CN 201710075047 A CN201710075047 A CN 201710075047A CN 106845276 A CN106845276 A CN 106845276A
- Authority
- CN
- China
- Prior art keywords
- big data
- module
- network security
- unit
- processing modules
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Implement system, including control module, big data acquisition module, distributed processing modules, distributed storage module, big data output module and network security module the invention discloses a kind of big data based on network security;Input of the output end of the control module respectively with big data acquisition module, distributed processing modules, distributed storage module, big data output module and network security module is connected;The big data acquisition module, distributed processing modules, distributed storage module and big data output module are sequentially connected;The network security module includes monitoring unit, ciphering unit and decryption unit.A kind of big data based on network security proposed by the present invention implements system, big data that can be fast and effectively to obtaining using distributed processing modules is arranged, analyzed, implement system compared to existing big data, it is high with treatment effeciency, resource utilization is high, data integrity, the advantage of good confidentiality, are worthy to be popularized in processing procedure.
Description
Technical field
Implement technical field the present invention relates to big data, more particularly to a kind of big data based on network security implements system
System.
Background technology
Big data (big data, mega data), or flood tide data, refer to needing new tupe could have
Stronger decision edge, the magnanimity of insight and process optimization ability, high growth rate and diversified information assets.In Victor
What mayer-Schoenberg and Kenneth Cook were write《The big data epoch》Middle big data refers to without random analysis method (sampling
Investigation) as shortcut, and be analyzed treatment using all data.The 4V features of big data:Volume (a large amount of),
Velocity (high speed), Variety (various), Value (value).Chinese population is numerous, Internet Users in 2013
Through more than 500,000,000 people, the whole world first.The Internet user of magnanimity creates large-scale data volume.It was predicted that to the whole world in 2015
The enterprise of Fortune 500 for having more than 85% will lose ground in big data competition.It is considered that this development trend is at home
It is same inevitable, in following market competition, most worthy letter can be obtained from a large amount of internet datas in the very first time
The enterprise of breath is just most advantageous.
With developing rapidly for the applications such as mobile Internet, Internet of Things, global metadata amount occurs in that explosive growth.Data
Amount is skyrocketed through imply that and come into the big data epoch now.Virtual network operator possesses huge user, while having
To terminal and the control ability of user's Internet channel so that there are good data basis in terms of user behavior analysis, deeply
Analysis customer flow behavioural characteristic and rule, find user's potential consumption demand, are effective hands of lifting value and management level
Section.However, not exclusively data scale is increasing, and data type is many and treatment requirement of real-time is all substantially increased
The complexity of big data treatment.The technological challenge that big data is brought to traditional Security Data Transmission management.Existing big data
There is internet security processing method poor, processing data is easily revealed, lost, and treatment effeciency is low, the low shortcoming of resource utilization more.
Based on above mentioned problem, the present invention proposes a kind of big data based on network security and implements system.
The content of the invention
The invention aims to solve shortcoming present in prior art, and propose it is a kind of based on network security
Big data implements system.
A kind of big data based on network security is implemented at system, including control module, big data acquisition module, distribution
Reason module, distributed storage module, big data output module and network security module;The output end of the control module respectively with
Big data acquisition module, distributed processing modules, distributed storage module, big data output module and network security module it is defeated
Enter end to be connected;The big data acquisition module, distributed processing modules, distributed storage module and big data output module according to
Secondary connection;The network security module include monitoring unit, ciphering unit and decryption unit, the output end of the monitoring unit with
Big data acquisition module is connected with the input of distributed processing modules;The output end and distributed storage of the ciphering unit
The input of module is connected;The output end of the decryption unit is connected with the input of big data output module;The control
Molding block is used to control whole big data to implement system;The monitoring unit of the network security module to big data acquisition module and
The course of work of distributed processing modules carries out safety monitoring;The ciphering unit of the network security module is to distributed storage mould
The big data of block storage is encrypted;The decryption unit of the network security module when big data output module is authorized,
Big data to encryption storage is decrypted output.
Preferably, the big data implementation system based on network security also includes backup module, the backup module
Input be connected with the output end of control module, the output end of the backup module respectively with big data acquisition module, distribution
Formula processing module, distributed storage module are connected with the input of big data output module, the backup module be used for power off,
Suspension, the system failure class big data automated back-up in particular cases.
Preferably, the big data implementation system based on network security also includes cache module, the cache module
Input be connected with the output end of control module, the output end of the cache module respectively with big data acquisition module, distribution
Formula processing module, distributed storage module are connected with the input of big data output module, and the cache module is used for system
Big data under normal operation is cached automatically.
Preferably, the big data acquisition module includes multiple independent big data collectors, under varying environment
The collection of big data.
Preferably, the distributed processing modules include distributed computer framework, for the big number of taxonomic revision collection
According to.
Preferably, the distributed processing modules include that big data taxon, big data arrange unit and big data point
Analysis unit, the big data taxon is classified the big data that big data acquisition module is gathered according to specific feature;
The big data arranges the big data that unit classified big data taxon and carries out duplicate removal, impurity elimination and processes, and by relationship type
Data carry out complete process;The big data analytic unit is used to analyze the big data after arranging unit arrangement through big data, obtains
Go out analysis result.
Preferably, the distributed storage module includes real-time data memory unit and relation data memory cell, described
Distributed storage module is used to classify to store and processes the data result for obtaining, the real-time data memory through distributed processing modules
Unit is used to store the process data of real-time change, and the relation data memory cell is used to store relational data.
A kind of big data based on network security proposed by the present invention implements system, can be fast using distributed processing modules
The fast effective big data to acquisition is arranged, analyzed, and the complicated big data for gathering is carried out using big data taxon
Classification, greatly improves treatment effeciency and processing speed, reduces intractability, and unit is arranged to classifying using big data
Big data carry out duplicate removal, impurity elimination and relational data complete process, greatly improve resource utilization, reduce storage mould
The EMS memory occupation amount of block, the present invention carries out safety monitoring to big data implementation process with protection, network using network security module
It is safe, the problems such as effectively avoiding the leakage of processing data, lose, system is implemented compared to existing big data, this
Invention is high with treatment effeciency, and resource utilization is high, and data integrity, the advantage of good confidentiality, are worthy to be popularized in processing procedure.
Brief description of the drawings
Fig. 1 is the block diagram that a kind of big data based on network security proposed by the present invention implements system;
Fig. 2 is the distributed processing modules frame that a kind of big data based on network security proposed by the present invention implements system
Figure;
Fig. 3 is the distributed storage module frame that a kind of big data based on network security proposed by the present invention implements system
Figure.
Specific embodiment
Referring to Fig. 1-3, the present invention is made with reference to specific embodiment further explain.
A kind of big data based on network security proposed by the present invention implements system, including the collection of control module, big data
Module, distributed processing modules, distributed storage module, big data output module and network security module;Control module it is defeated
Go out end to pacify with big data acquisition module, distributed processing modules, distributed storage module, big data output module and network respectively
The input of full module is connected;The output of big data acquisition module, distributed processing modules, distributed storage module and big data
Module is sequentially connected;Network security module include monitoring unit, ciphering unit and decryption unit, the output end of monitoring unit with it is big
Data acquisition module is connected with the input of distributed processing modules;The output end of ciphering unit and distributed storage module
Input is connected;The output end of decryption unit is connected with the input of big data output module;Control module is used to control
Whole big data implements system;The monitoring unit of network security module is to big data acquisition module and the work of distributed processing modules
Safety monitoring is carried out as process;The ciphering unit of network security module is added to the big data that distributed storage module is stored
It is close;When big data output module is authorized, the big data to encryption storage is solved the decryption unit of network security module
Close output;Big data acquisition module includes multiple independent big data collectors, for the collection of the big data under varying environment;
Distributed processing modules include distributed computer framework, for the big data of taxonomic revision collection, distributed processing modules bag
Include big data taxon, big data and arrange unit and big data analytic unit, big data is gathered mould by big data taxon
The big data of block collection is classified according to specific feature;Big data arrange unit by big data taxon classified it is big
Data carry out duplicate removal, impurity elimination treatment, and relational data is carried out into complete process;Big data analytic unit is used to analyze through big number
According to the big data after unit is arranged is arranged, analysis result is drawn;Distributed storage module includes real-time data memory unit and pass
It is data storage cell, distributed storage module is used to classify to store and processes the data result for obtaining through distributed processing modules,
Real-time data memory unit is used to store the process data of real-time change, and relation data memory cell is used to store relationship type number
According to.
A kind of big data based on network security implements system and also includes backup module, the input connection of backup module
Have an output end of control module, the output end of backup module respectively with big data acquisition module, distributed processing modules, distribution
Memory module is connected with the input of big data output module, backup module be used for power off, suspension, the special feelings of system failure class
Big data automated back-up under condition.
A kind of big data based on network security implements system and also includes cache module, the input connection of cache module
Have an output end of control module, the output end of cache module respectively with big data acquisition module, distributed processing modules, distribution
Memory module is connected with the input of big data output module, the big data that cache module is used under system normal operation
Automatic caching.
A kind of big data based on network security proposed by the present invention implements system, can be fast using distributed processing modules
The fast effective big data to acquisition is arranged, analyzed, and the complicated big data for gathering is carried out using big data taxon
Classification, greatly improves treatment effeciency and processing speed, reduces intractability, and unit is arranged to classifying using big data
Big data carry out duplicate removal, impurity elimination and relational data complete process, greatly improve resource utilization, reduce storage mould
The EMS memory occupation amount of block, the present invention carries out safety monitoring to big data implementation process with protection, network using network security module
It is safe, the problems such as effectively avoiding the leakage of processing data, lose, system is implemented compared to existing big data, this
Invention is high with treatment effeciency, and resource utilization is high, and data integrity, the advantage of good confidentiality, are worthy to be popularized in processing procedure.
The above, the only present invention preferably specific embodiment, but protection scope of the present invention is not limited thereto,
Any one skilled in the art the invention discloses technical scope in, technology according to the present invention scheme and its
Inventive concept is subject to equivalent or change, should all be included within the scope of the present invention.
Claims (7)
1. a kind of big data based on network security implements system, it is characterised in that including control module, big data collection mould
Block, distributed processing modules, distributed storage module, big data output module and network security module;The control module
Output end respectively with big data acquisition module, distributed processing modules, distributed storage module, big data output module and network
The input of security module is connected;The big data acquisition module, distributed processing modules, distributed storage module and big number
It is sequentially connected according to output module;The network security module includes monitoring unit, ciphering unit and decryption unit, the monitoring list
The output end of unit is connected with the input of big data acquisition module and distributed processing modules;The output end of the ciphering unit
Input with distributed storage module is connected;The input phase of the output end of the decryption unit and big data output module
Connection;The control module is used to control whole big data to implement system;The monitoring unit of the network security module is to big number
Safety monitoring is carried out according to the course of work of acquisition module and distributed processing modules;The ciphering unit pair of the network security module
The big data of distributed storage module storage is encrypted;The decryption unit of the network security module is in big data output module
When authorized, the big data to encryption storage is decrypted output.
2. a kind of big data based on network security according to claim 1 implements system, it is characterised in that described to be based on
The big data of network security implements system and also includes backup module, and the input of the backup module is connected with control module
Output end, the output end of the backup module respectively with big data acquisition module, distributed processing modules, distributed storage module
Input with big data output module is connected, the backup module be used for power off, suspension, system failure class in particular cases
Big data automated back-up.
3. a kind of big data based on network security according to claim 1 implements system, it is characterised in that described to be based on
The big data of network security implements system and also includes cache module, and the input of the cache module is connected with control module
Output end, the output end of the cache module respectively with big data acquisition module, distributed processing modules, distributed storage module
Input with big data output module is connected, and the big data that the cache module is used under system normal operation is automatic
Caching.
4. a kind of big data based on network security according to claim 1 implements system, it is characterised in that the big number
Multiple independent big data collectors are included according to acquisition module, for the collection of the big data under varying environment.
5. a kind of big data based on network security according to claim 1 implements system, it is characterised in that the distribution
Formula processing module includes distributed computer framework, for the big data of taxonomic revision collection.
6. a kind of big data based on network security according to claim 1 implements system, it is characterised in that the distribution
Formula processing module includes that big data taxon, big data arrange unit and big data analytic unit, the big data grouping sheet
Unit is classified the big data that big data acquisition module is gathered according to specific feature;The big data arranges unit and will count greatly
The big data classified according to taxon carries out duplicate removal, impurity elimination treatment, and relational data is carried out into complete process;The big number
It is used to analyze according to analytic unit and arranges the big data after unit is arranged through big data, draws analysis result.
7. a kind of big data based on network security according to claim 1 implements system, it is characterised in that the distribution
Formula memory module includes real-time data memory unit and relation data memory cell, and the distributed storage module is deposited for classification
Store up and process the data result for obtaining through distributed processing modules, the real-time data memory unit is used to store the mistake of real-time change
Number of passes evidence, the relation data memory cell is used to store relational data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710075047.8A CN106845276A (en) | 2017-02-13 | 2017-02-13 | A kind of big data based on network security implements system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710075047.8A CN106845276A (en) | 2017-02-13 | 2017-02-13 | A kind of big data based on network security implements system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106845276A true CN106845276A (en) | 2017-06-13 |
Family
ID=59127828
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710075047.8A Pending CN106845276A (en) | 2017-02-13 | 2017-02-13 | A kind of big data based on network security implements system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106845276A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108549466A (en) * | 2018-04-23 | 2018-09-18 | 台州创投环保科技有限公司 | A kind of agricultural big data analysis device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103440244A (en) * | 2013-07-12 | 2013-12-11 | 广东电子工业研究院有限公司 | Large-data storage and optimization method |
CN103617231A (en) * | 2013-11-26 | 2014-03-05 | 国家电网公司 | Large data management system |
CN104021194A (en) * | 2014-06-13 | 2014-09-03 | 浪潮(北京)电子信息产业有限公司 | Mixed type processing system and method oriented to industry big data diversity application |
CN105871877A (en) * | 2016-05-05 | 2016-08-17 | 云神科技投资股份有限公司 | Big data implementation system and method based on network security |
-
2017
- 2017-02-13 CN CN201710075047.8A patent/CN106845276A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103440244A (en) * | 2013-07-12 | 2013-12-11 | 广东电子工业研究院有限公司 | Large-data storage and optimization method |
CN103617231A (en) * | 2013-11-26 | 2014-03-05 | 国家电网公司 | Large data management system |
CN104021194A (en) * | 2014-06-13 | 2014-09-03 | 浪潮(北京)电子信息产业有限公司 | Mixed type processing system and method oriented to industry big data diversity application |
CN105871877A (en) * | 2016-05-05 | 2016-08-17 | 云神科技投资股份有限公司 | Big data implementation system and method based on network security |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108549466A (en) * | 2018-04-23 | 2018-09-18 | 台州创投环保科技有限公司 | A kind of agricultural big data analysis device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chen et al. | Research on intrusion detection method based on Pearson correlation coefficient feature selection algorithm | |
Zawoad et al. | Digital forensics in the age of big data: Challenges, approaches, and opportunities | |
CN107870981A (en) | Electronic installation, the method and storage medium of tables of data filing processing | |
CN105912524B (en) | The article topic keyword extracting method and device decomposed based on low-rank matrix | |
CN106649578A (en) | Public opinion analysis method and system based on social network platform | |
CN109992569A (en) | Cluster log feature extracting method, device and storage medium | |
CN106230809B (en) | A kind of mobile Internet public sentiment monitoring method and system based on URL | |
CN106330963A (en) | Cross-network multi-node log collecting method | |
CN108363689A (en) | Secret protection multi-key word Top-k cipher text retrieval methods towards mixed cloud and system | |
CN103136372A (en) | Method of quick location, classification and filtration of universal resource locator (URL) in network credibility behavior management | |
CN111061837A (en) | Topic identification method, device, equipment and medium | |
CN107958154A (en) | A kind of malware detection device and method | |
CN112968872A (en) | Malicious flow detection method, system and terminal based on natural language processing | |
CN107679069A (en) | Method is found based on a kind of special group of news data and related commentary information | |
CN112364003A (en) | Big data management method, device, equipment and medium for different industries | |
CN106844588A (en) | A kind of analysis method and system of the user behavior data based on web crawlers | |
Wang et al. | TextDroid: Semantics-based detection of mobile malware using network flows | |
Guo et al. | Learning to upgrade internet information security and protection strategy in big data era | |
CN107220557A (en) | A kind of detection method and system of the sensitive data behavior of user's unauthorized access | |
CN107819837A (en) | A kind of method and log cache analysis system for lifting buffer service quality | |
CN102325143B (en) | Cloud platform based information collection, storage, encryption and retrieval system | |
CN112507348A (en) | Intelligent network security implementation method based on big data platform | |
CN106845276A (en) | A kind of big data based on network security implements system | |
CN106919566A (en) | A kind of query statistic method and system based on mass data | |
CN101901245A (en) | Method for auditing webpage based on cloud semantic database |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170613 |