CN107528852A - A kind of big data based on network security implements system and method - Google Patents
A kind of big data based on network security implements system and method Download PDFInfo
- Publication number
- CN107528852A CN107528852A CN201710792580.6A CN201710792580A CN107528852A CN 107528852 A CN107528852 A CN 107528852A CN 201710792580 A CN201710792580 A CN 201710792580A CN 107528852 A CN107528852 A CN 107528852A
- Authority
- CN
- China
- Prior art keywords
- data
- network
- frame
- big
- big data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/16—Threshold monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/50—Testing arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
The invention discloses a kind of big data based on network security to implement system and method.The big data implementing platform of the system includes:Big data acquisition module, big data pretreatment module, big data processing module, network security administration module and controller;Network security administration module includes:Network detection unit, visitor's authentication unit and flowing of access monitoring unit.The present invention passes through the data sink parallel acquisition multichannel data with a variety of data-interfaces, and preference number and frame number are added to frame packing data, the data staging of collection is stored simultaneously, so that according to preference number and frame number to being exported after the data parsing screening of storage;I.e. in big data implementation process, by multiple passage gathered datas, not only collecting efficiency is high, and gathered data amount is big;Data after being stored to classification export according to preference number and frame number, make data transfer orderly, do not easily cause network blockage and loss of data, improve that data-handling efficiency is low, and resource utilization is low.
Description
Technical field
The present invention relates to technical field of network security, more particularly relates to a kind of big data based on network security and implements system
System and method.
Background technology
With the development of electronic information technology, people use the frequency more and more higher of network, and being skyrocketed through for data volume is pre-
Show and come into the big data epoch now, it is increasing and real-time with processing more than data type to be not only data scale
Property require high.While big data proposes, people also gradually realize the hidden danger that high speed information development is brought, and safety problem turns into
The major issue of network browsing, privacy leakage, property are cheated etc., i.e., big data is brought to traditional Security Data Transmission management
Technological challenge.
In existing big data implementation process, after often data are all brought together, then classified, cause the later stage
Workload is big, and factor data amount is huge, network blockage when causing to receive data, so as to there is the problem of loss of data so that data
Treatment effeciency is low, and resource utilization is low.
In summary, big data implementation process of the prior art, has that data-handling efficiency is low, and resource utilization is low
Problem.
The content of the invention
The embodiment of the present invention provides a kind of big data based on network security and implements system and method, to solve existing skill
The problem of data-handling efficiency is low, and resource utilization is low in art be present.
The embodiment of the present invention provides a kind of big data based on network security and implements system, including:Big data implementing platform;
The big data implementing platform, including:Big data acquisition module, big data pretreatment module, big data processing mould
Block, network security administration module and controller;
The big data acquisition module, for passing through the more ways of data sink parallel acquisition with a variety of data-interfaces
According to, and frame data packing is carried out to each circuit-switched data and preference number and frame number are added to frame head of each circuit-switched data per frame;
The big data pretreatment module, for according to each circuit-switched data host-host protocol to each circuit-switched data carry out redundancy processing and
Checking treatment, data storage to each circuit-switched data after redundancy processing and checking treatment is received into buffer and data receive storage
Device;Wherein, preceding ten frame data are stored to data and received in buffer, and later data storage to the data of preceding ten frame are connect
In by memory;When data receive ten frame of data deficiencies in buffer, data receive data in memory from trend number
According to receiving to transmit in buffer;
The big data processing module, for data to be transmitted to be received into caching from data according to preference number and frame number
Taken out in device, and parse data message and export the useful data filtered out according to preference number and frame number;Wherein, according to upper
One frame data to be transmitted takes out complement mark and receives to take out next frame data to be transmitted in buffer from data;By the number after parsing
It is believed that breath is contrasted with the intercept information to prestore, the data message after parsing when registration is less than preset value is useful letter
Breath;
The network security administration module, including:Network detection unit, visitor's authentication unit and flowing of access monitoring are single
Member;
The network detection unit, in real time to the network transmission speed and resources occupation rate of each circuit-switched data transmission channel
Detected;
Visitor's authentication unit, for being conducted interviews by account, password and Quick Response Code to network big data;Wherein,
Authentication is carried out by account and password, payment verification is carried out by access of the Quick Response Code to some network datas;
The flowing of access monitoring unit, for monitoring the network data flowing of access of each circuit-switched data transmission channel in real time,
When the network data flowing of access of a certain passage exceeds preset value, increase network traffics to the passage, while according to network number
Hot spot data type is determined according to the size of flowing of access;
The controller, for coordinating above-mentioned each module operation.
It is preferred that the big data implementing platform is big data server.
It is preferred that the data-interface includes:Serial ports, parallel port, USB interface, Ethernet interface, wireless receiver and CAN
Interface, and each the quantity of serial ports, parallel port, USB interface, Ethernet interface, wireless receiver and CAN interface is at least one
It is individual.
It is preferred that the network security administration module, in addition to:Sensitive information filter element;The sensitive information filtering
Unit, for being filtered out to illegal advertising message and unhealthy information.
The embodiment of the present invention provides a kind of big data implementation based on network security, including:
Frame data are carried out by the data sink parallel acquisition multichannel data with a variety of data-interfaces, and to each circuit-switched data
Pack and preference number and frame number are added to frame head of each circuit-switched data per frame;
Redundancy processing and checking treatment are carried out to each circuit-switched data according to each circuit-switched data host-host protocol, by redundancy processing and verified
Data storage to each circuit-switched data after processing receives buffer and data receive memory;Wherein, by preceding ten frame data store to
Data receive in buffer, and later data storage to the data of preceding ten frame are received in memory;When data receive caching
During ten frame of data deficiencies in device, the data that data receive in memory receive to transmit in buffer from trend data;
Data to be transmitted is received to take out in buffer from data according to preference number and frame number, and parses data message
The useful data filtered out is exported according to preference number and frame number;Wherein, taken out and completed according to previous frame data to be transmitted
Mark receives to take out next frame data to be transmitted in buffer from data;By the data message after parsing and the intercept information to prestore
Contrasted, the data message after parsing when registration is less than preset value is useful information;
Big data is implemented to carry out network security supervision;Specifically include:The network of each circuit-switched data transmission channel is passed in real time
Defeated speed and resources occupation rate are detected;
Network big data is conducted interviews by account, password and Quick Response Code;Wherein, identity is carried out by account and password
Checking, payment verification is carried out by access of the Quick Response Code to some network datas;
The network data flowing of access of each circuit-switched data transmission channel is monitored in real time, when the network data of a certain passage accesses stream
When amount exceeds preset value, increase network traffics to the passage, while focus number is determined according to the size of network data flowing of access
According to type.
It is preferred that described implement to carry out network security supervision to big data;Also include:To illegal advertising message and unhealthy
Information is filtered out.
In the embodiment of the present invention, there is provided a kind of big data based on network security implements system and method, with prior art
Compare, its advantage is as follows:
The present invention is added by the data sink parallel acquisition multichannel data with a variety of data-interfaces to frame packing data
Add preference number and frame number, while the data staging of collection is stored, so that according to preference number and frame number to storage
Exported after data parsing screening;I.e. in big data implementation process, big data collection is carried out by multiple passages, not only collection effect
Rate is high, and gathered data amount is big;Data after being stored to classification export according to preference number and frame number so that data transfer has
Sequence, network blockage and loss of data are not easily caused, low so as to improve data-handling efficiency, resource utilization is low.Further, press
Redundancy processing and checking treatment are carried out to each circuit-switched data according to each circuit-switched data host-host protocol, improve data transmission credibility.
The present invention implements system to big data in real time by network security administration module and carries out network detection and flowing of access
Monitoring, and visitor information is verified, internet security is enhanced, data is not easy to reveal, lost.Especially, to visiting
When objective information is verified, payment verification can also be carried out by access of the Quick Response Code to some network datas, it is easy to use, it is real
It is strong with property;By monitoring the network data flowing of access of each circuit-switched data transmission channel, network speed can be flexibly adjusted, while can be with
Judge which kind of type information visit capacity is big, reliable basis are improved for network data analysis.
Brief description of the drawings
Fig. 1 is that a kind of big data based on network security provided in an embodiment of the present invention implements systemic-function theory diagram;
Fig. 2 is a kind of big data implementation flow chart based on network security provided in an embodiment of the present invention;
Fig. 3 implements to carry out network security supervision specific steps flow chart to be provided in an embodiment of the present invention to big data.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
Fig. 1 is that a kind of big data based on network security provided in an embodiment of the present invention implements systemic-function theory diagram.
As shown in figure 1, the system includes:Big data implementing platform 1.
Preferably, big data implementing platform 1 of the invention uses big data server.
Specifically, big data implementing platform 1, including:Big data acquisition module 11, big data pretreatment module 12, big number
According to processing module 13, network security administration module 14 and controller 15.
Wherein, big data acquisition module 11, for passing through the data sink parallel acquisition multichannel with a variety of data-interfaces
Data, and frame data packing is carried out to each circuit-switched data and preference number and frame number are added to frame head of each circuit-switched data per frame.
It should be noted that data-interface includes:Serial ports, parallel port, USB interface, Ethernet interface, wireless receiver and
CAN interface, and each the quantity of serial ports, parallel port, USB interface, Ethernet interface, wireless receiver and CAN interface is at least
One.
Wherein, big data pretreatment module 12, for being carried out according to each circuit-switched data host-host protocol to each circuit-switched data at redundancy
Reason and checking treatment, data storage to each circuit-switched data after redundancy processing and checking treatment is received into buffer and data receive to deposit
Reservoir;Wherein, preceding ten frame data are stored to data and received in buffer, and by the later data storage of preceding ten frame to data
Receive in memory;When data receive ten frame of data deficiencies in buffer, data receive data in memory from trend
Data receive to transmit in buffer.
Wherein, big data processing module 13, for being received data to be transmitted from data according to preference number and frame number
Taken out in buffer, and parse data message and export the useful data filtered out according to preference number and frame number;Wherein, root
Complement mark, which is taken out, according to previous frame data to be transmitted receives taking-up next frame data to be transmitted in buffer from data;After parsing
Data message contrasted with the intercept information to prestore, the data message after parsing when registration is less than preset value is has
Use information.
In summary, it is of the invention by the data sink parallel acquisition multichannel data with a variety of data-interfaces, and to frame
Packing data adds preference number and frame number, while the data staging of collection is stored, so as to according to preference number and frame
Number to being exported after the parsing screening of the data of storage;I.e. in big data implementation process, big data collection is carried out by multiple passages,
Not only collecting efficiency is high, and gathered data amount is big;Data after being stored to classification export according to preference number and frame number so that
Data transfer is orderly, does not easily cause network blockage and loss of data, so as to low, the resource utilization that improves data-handling efficiency
It is low.Further, redundancy processing and checking treatment are carried out to each circuit-switched data according to each circuit-switched data host-host protocol, improves data transfer
Reliability.
Specifically, network security administration module 14, including:Network detection unit 141, visitor's authentication unit 142 and access
Traffic monitoring unit 143.
Wherein, network detection unit 141, for being accounted in real time to the network transmission speed and resource of each circuit-switched data transmission channel
Detected with rate.
Wherein, visitor's authentication unit 142, for being conducted interviews by account, password and Quick Response Code to network big data;Its
In, authentication is carried out by account and password, payment verification is carried out by access of the Quick Response Code to some network datas.
Wherein, flowing of access monitoring unit 143, the network data for monitoring each circuit-switched data transmission channel in real time access stream
Amount, when the network data flowing of access of a certain passage exceeds preset value, increase network traffics to the passage, while according to network
The size of data access flow determines hot spot data type.
It is preferred that network security administration module 14, in addition to:Sensitive information filter element;Sensitive information filter element, use
Filtered out in illegal advertising message and unhealthy information.
It should be noted that the controller 15 in the present invention, for coordinating above-mentioned each module operation.
In summary, the present invention by network security administration module in real time to big data implement system carry out network detection and
Flowing of access is monitored, and visitor information is verified, is enhanced internet security, data is not easy to reveal, lost.Especially
Ground, when being verified to visitor information, payment verification can also be carried out by access of the Quick Response Code to some network datas, used
It is convenient, it is practical;By monitoring the network data flowing of access of each circuit-switched data transmission channel, network speed can be flexibly adjusted,
It may determine which kind of type information visit capacity is big simultaneously, reliable basis improved for network data analysis.
Fig. 2 is a kind of big data implementation flow chart based on network security provided in an embodiment of the present invention.Such as Fig. 2 institutes
Show, this method includes:
Step S21, by the data sink parallel acquisition multichannel data with a variety of data-interfaces, and each circuit-switched data is entered
Row frame data are packed and add preference number and frame number to frame head of each circuit-switched data per frame.
Step S22, redundancy processing and checking treatment are carried out to each circuit-switched data according to each circuit-switched data host-host protocol, at redundancy
Data storage to each circuit-switched data after reason and checking treatment receives buffer and data receive memory;Wherein, ten frame numbers by before
Receive according to storing to data in buffer, and later data storage to the data of preceding ten frame are received in memory;Work as data
When receiving ten frame of data deficiencies in buffer, the data that data receive in memory receive to pass in buffer from trend data
It is defeated.
Step S23, data to be transmitted is received to take out in buffer from data according to preference number and frame number, and parsed
Data message exports the useful data filtered out according to preference number and frame number;Wherein, according to previous frame data to be transmitted
Complement mark is taken out to receive to take out next frame data to be transmitted in buffer from data;By data message after parsing and prestore
Intercept information is contrasted, and the data message after parsing when registration is less than preset value is useful information.
Step S24, big data is implemented to carry out network security supervision.
Fig. 3 implements to carry out network security supervision specific steps flow chart to be provided in an embodiment of the present invention to big data.Such as
Shown in Fig. 3, step S24 is specifically included:
Step S241, the network transmission speed and resources occupation rate of each circuit-switched data transmission channel are detected in real time.
Step S242, network big data is conducted interviews by account, password and Quick Response Code;Wherein, by account and close
Code carries out authentication, and payment verification is carried out by access of the Quick Response Code to some network datas.
Step S243, the network data flowing of access of each circuit-switched data transmission channel is monitored in real time, when the network of a certain passage
When data access flow exceeds preset value, increase network traffics to the passage, while according to the size of network data flowing of access
Determine hot spot data type.
It is preferred that big data is implemented to carry out network security supervision;Also include:To illegal advertising message and unhealthy information
Filtered out.
Based on same inventive concept, the embodiments of the invention provide a kind of big data implementation based on network security,
Because the principle of this method solution technical problem and a kind of big data implementation system based on network security are similar, therefore this method
Implementation may refer to the implementation of system, repeat part and repeat no more.
Disclosed above is only several specific embodiments of the present invention, and those skilled in the art can be carried out to the present invention
It is various to change with modification without departing from the spirit and scope of the present invention, if these modifications and variations of the present invention belong to the present invention
Within the scope of claim and its equivalent technologies, then the present invention is also intended to comprising including these changes and modification.
Claims (6)
1. a kind of big data based on network security implements system, it is characterised in that including:Big data implementing platform (1);
The big data implementing platform (1), including:Big data acquisition module (11), big data pretreatment module (12), big data
Processing module (13), network security administration module (14) and controller (15);
The big data acquisition module (11), for passing through the more ways of data sink parallel acquisition with a variety of data-interfaces
According to, and frame data packing is carried out to each circuit-switched data and preference number and frame number are added to frame head of each circuit-switched data per frame;
The big data pretreatment module (12), for according to each circuit-switched data host-host protocol to each circuit-switched data carry out redundancy processing and
Checking treatment, data storage to each circuit-switched data after redundancy processing and checking treatment is received into buffer and data receive storage
Device;Wherein, preceding ten frame data are stored to data and received in buffer, and later data storage to the data of preceding ten frame are connect
In by memory;When data receive ten frame of data deficiencies in buffer, data receive data in memory from trend number
According to receiving to transmit in buffer;
The big data processing module (13), for data to be transmitted to be received into caching from data according to preference number and frame number
Taken out in device, and parse data message and export the useful data filtered out according to preference number and frame number;Wherein, according to upper
One frame data to be transmitted takes out complement mark and receives to take out next frame data to be transmitted in buffer from data;By the number after parsing
It is believed that breath is contrasted with the intercept information to prestore, the data message after parsing when registration is less than preset value is useful letter
Breath;
The network security administration module (14), including:Network detection unit (141), visitor's authentication unit (142) and access stream
Measure monitoring unit (143);
The network detection unit (141), in real time to the network transmission speed and resource occupation of each circuit-switched data transmission channel
Rate is detected;
Visitor's authentication unit (142), for being conducted interviews by account, password and Quick Response Code to network big data;Wherein,
Authentication is carried out by account and password, payment verification is carried out by access of the Quick Response Code to some network datas;
The flowing of access monitoring unit (143), for monitoring the network data flowing of access of each circuit-switched data transmission channel in real time,
When the network data flowing of access of a certain passage exceeds preset value, increase network traffics speed to the passage, while according to net
The size of network data access flow determines hot spot data type;
The controller (15), for coordinating above-mentioned each module operation.
2. the big data based on network security implements system as claimed in claim 1, it is characterised in that the big data is implemented
Platform (1) is big data server.
3. the big data based on network security implements system as claimed in claim 1, it is characterised in that the data-interface bag
Include:Serial ports, parallel port, USB interface, Ethernet interface, wireless receiver and CAN interface, and each serial ports, parallel port, USB interface,
The quantity of Ethernet interface, wireless receiver and CAN interface is at least one.
4. the big data based on network security implements system as claimed in claim 1, it is characterised in that the network security prison
Tube module (14), in addition to:Sensitive information filter element;The sensitive information filter element, for illegal advertising message and
Unhealthy information is filtered out.
A kind of 5. big data implementation based on network security, it is characterised in that including:
Frame data packing is carried out by the data sink parallel acquisition multichannel data with a variety of data-interfaces, and to each circuit-switched data
And preference number and frame number are added to frame head of each circuit-switched data per frame;
Redundancy processing and checking treatment are carried out to each circuit-switched data according to each circuit-switched data host-host protocol, by redundancy processing and checking treatment
Data storage afterwards to each circuit-switched data receives buffer and data receive memory;Wherein, preceding ten frame data are stored to data
Receive in buffer, and later data storage to the data of preceding ten frame are received in memory;When data receive in buffer
Ten frame of data deficiencies when, the data that data receive in memory receive to transmit in buffer from trend data;
Data to be transmitted is received to take out in buffer from data according to preference number and frame number, and parse data message to sieve
The useful data selected exports according to preference number and frame number;Wherein, complement mark is taken out according to previous frame data to be transmitted
Receive to take out next frame data to be transmitted in buffer from data;Data message after parsing and the intercept information to prestore are carried out
Contrast, the data message after parsing when registration is less than preset value is useful information;
Big data is implemented to carry out network security supervision;Specifically include:In real time to the network transmission speed of each circuit-switched data transmission channel
Rate and resources occupation rate are detected;
Network big data is conducted interviews by account, password and Quick Response Code;Wherein, identity is carried out by account and password to test
Card, payment verification is carried out by access of the Quick Response Code to some network datas;
The network data flowing of access of each circuit-switched data transmission channel is monitored in real time, when the network data flowing of access of a certain passage surpasses
When going out preset value, increase network traffics to the passage, while hot spot data class is determined according to the size of network data flowing of access
Type.
6. the big data implementation based on network security as claimed in claim 5, it is characterised in that described real to big data
Apply and carry out network security supervision;Also include:Illegal advertising message and unhealthy information are filtered out.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710792580.6A CN107528852B (en) | 2017-09-05 | 2017-09-05 | Big data implementation system and method based on network security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710792580.6A CN107528852B (en) | 2017-09-05 | 2017-09-05 | Big data implementation system and method based on network security |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107528852A true CN107528852A (en) | 2017-12-29 |
CN107528852B CN107528852B (en) | 2020-07-31 |
Family
ID=60683427
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710792580.6A Expired - Fee Related CN107528852B (en) | 2017-09-05 | 2017-09-05 | Big data implementation system and method based on network security |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107528852B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108415854A (en) * | 2018-02-11 | 2018-08-17 | 中国神华能源股份有限公司 | Data collecting system based on shared buffer memory and method |
CN109117654A (en) * | 2018-08-21 | 2019-01-01 | 浙江大数据交易中心有限公司 | A kind of big data really weighs method and system |
CN109714402A (en) * | 2018-12-12 | 2019-05-03 | 胡书恺 | A kind of redundant data acquisition system and its operation application method |
CN112149170A (en) * | 2020-10-12 | 2020-12-29 | 上海中尖实业(集团)有限公司 | Digital big data security processing system |
CN113886126A (en) * | 2021-10-13 | 2022-01-04 | 中里大数据服务(上海)有限公司 | Fault-tolerant server-based intelligent management and control system and method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130273901A1 (en) * | 2012-04-16 | 2013-10-17 | International Business Machines | Scalable Common Infrastructure for Information Collection from Networked Devices |
CN104901889A (en) * | 2015-05-15 | 2015-09-09 | 嘉兴市稠江光电仪器技术有限公司 | Remote data collection and control method based on improved-type UDP/IP protocol |
CN105005604A (en) * | 2015-07-06 | 2015-10-28 | 苏州金立方通讯科技有限公司 | Big data system |
CN105391742A (en) * | 2015-12-18 | 2016-03-09 | 桂林电子科技大学 | Hadoop-based distributed intrusion detection system |
CN106790088A (en) * | 2016-12-23 | 2017-05-31 | 华北理工大学 | A kind of network security enforcement system and method based on big data platform |
-
2017
- 2017-09-05 CN CN201710792580.6A patent/CN107528852B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130273901A1 (en) * | 2012-04-16 | 2013-10-17 | International Business Machines | Scalable Common Infrastructure for Information Collection from Networked Devices |
CN104901889A (en) * | 2015-05-15 | 2015-09-09 | 嘉兴市稠江光电仪器技术有限公司 | Remote data collection and control method based on improved-type UDP/IP protocol |
CN105005604A (en) * | 2015-07-06 | 2015-10-28 | 苏州金立方通讯科技有限公司 | Big data system |
CN105391742A (en) * | 2015-12-18 | 2016-03-09 | 桂林电子科技大学 | Hadoop-based distributed intrusion detection system |
CN106790088A (en) * | 2016-12-23 | 2017-05-31 | 华北理工大学 | A kind of network security enforcement system and method based on big data platform |
Non-Patent Citations (1)
Title |
---|
刘兰,林军,蔡君: "面向大数据的异构网络安全监控及关联算法研究", 《电信科学 研究与开发集》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108415854A (en) * | 2018-02-11 | 2018-08-17 | 中国神华能源股份有限公司 | Data collecting system based on shared buffer memory and method |
CN109117654A (en) * | 2018-08-21 | 2019-01-01 | 浙江大数据交易中心有限公司 | A kind of big data really weighs method and system |
CN109714402A (en) * | 2018-12-12 | 2019-05-03 | 胡书恺 | A kind of redundant data acquisition system and its operation application method |
CN112149170A (en) * | 2020-10-12 | 2020-12-29 | 上海中尖实业(集团)有限公司 | Digital big data security processing system |
CN113886126A (en) * | 2021-10-13 | 2022-01-04 | 中里大数据服务(上海)有限公司 | Fault-tolerant server-based intelligent management and control system and method |
Also Published As
Publication number | Publication date |
---|---|
CN107528852B (en) | 2020-07-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107528852A (en) | A kind of big data based on network security implements system and method | |
CN103179132B (en) | A kind of method and device detecting and defend CC attack | |
CN103532940B (en) | network security detection method and device | |
CN105337991B (en) | A kind of integrated message flow is searched and update method | |
CN104283897B (en) | Wooden horse communication feature rapid extracting method based on multiple data stream cluster analysis | |
CN110519298A (en) | A kind of Tor method for recognizing flux and device based on machine learning | |
CN108123931A (en) | Ddos attack defence installation and method in a kind of software defined network | |
CN106941517A (en) | Five-tuple ticket synthetic method and device under a kind of asymmetric condition | |
CN106789980A (en) | A kind of monitoring administration method and device of website legitimacy | |
CN102664789B (en) | The processing method of a kind of large-scale data and system | |
CN107135093A (en) | A kind of Internet of Things intrusion detection method and detecting system based on finite automata | |
CN101924757A (en) | Method and system for reviewing Botnet | |
CN1319332C (en) | Linux kernel based high-speed network flow measuring unit and flow measuring method | |
CN107370752A (en) | A kind of efficient remote control Trojan detection method | |
CN105491018B (en) | A kind of network data security analysis method based on DPI technology | |
CN108337652A (en) | A kind of method and device of detection flows fraud | |
CN107332723A (en) | The detection method and detection device of convert channel | |
CN104579974A (en) | Hash Bloom filter (HBF) for name lookup in NDN and data forwarding method | |
CN206962832U (en) | Network data auditing system based on FPGA high-performance capture cards | |
CN109275045A (en) | Mobile terminal encrypted video ad traffic recognition methods based on DFI | |
CN103618720B (en) | A kind of Trojan network communication detects and evidence collecting method and system | |
CN106685940A (en) | Password processing method and server | |
CN104065587B (en) | FPGA-based intelligent transformer station network storm processing module and solution | |
CN110059671A (en) | A kind of safety inspection method, system, device and computer readable storage medium | |
CN104993977B (en) | Online data monitoring method and system based on IEC61968 standard |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200731 Termination date: 20210905 |
|
CF01 | Termination of patent right due to non-payment of annual fee |