CN107528852B - Big data implementation system and method based on network security - Google Patents

Big data implementation system and method based on network security Download PDF

Info

Publication number
CN107528852B
CN107528852B CN201710792580.6A CN201710792580A CN107528852B CN 107528852 B CN107528852 B CN 107528852B CN 201710792580 A CN201710792580 A CN 201710792580A CN 107528852 B CN107528852 B CN 107528852B
Authority
CN
China
Prior art keywords
data
network
big
frame
big data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201710792580.6A
Other languages
Chinese (zh)
Other versions
CN107528852A (en
Inventor
李鑫
周湘贞
任刚
胡广新
张鸿
周飞菲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Shengda University of Economics Business and Management
Original Assignee
Zhengzhou Shengda University of Economics Business and Management
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Shengda University of Economics Business and Management filed Critical Zhengzhou Shengda University of Economics Business and Management
Priority to CN201710792580.6A priority Critical patent/CN107528852B/en
Publication of CN107528852A publication Critical patent/CN107528852A/en
Application granted granted Critical
Publication of CN107528852B publication Critical patent/CN107528852B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a big data implementation system and method based on network security. The big data implementation platform of the system comprises: the system comprises a big data acquisition module, a big data preprocessing module, a big data processing module, a network security supervision module and a controller; the network security supervision module comprises: the system comprises a network detection unit, a visitor verification unit and an access flow monitoring unit. The invention collects multi-path data in parallel through a data receiver with a plurality of data interfaces, adds priority numbers and frame numbers to frame packed data, and stores the collected data in a grading way, thereby analyzing and screening the stored data according to the priority numbers and the frame numbers and outputting the data; in the implementation process of big data, data are acquired through a plurality of channels, so that the acquisition efficiency is high, and the acquired data volume is large; the data after the hierarchical storage is output according to the priority number and the frame number, so that the data transmission is ordered, network blockage and data loss are not easy to cause, the data processing efficiency is improved, and the resource utilization rate is low.

Description

Big data implementation system and method based on network security
Technical Field
The invention relates to the technical field of network security, in particular to a big data implementation system and method based on network security.
Background
With the development of electronic information technology, the frequency of using networks by people is higher and higher, and the rapid increase of data volume indicates that the data has entered the big data era now, and not only the data size is larger and larger, but also the data types are more and the real-time processing requirement is high. When big data is put forward, people gradually experience hidden dangers caused by high-speed development of information, security problems become important problems of network browsing, privacy disclosure, property cheating and the like, and the big data brings technical challenges to traditional data security transmission management.
In the existing big data implementation process, data are often classified after being concentrated together, so that the workload in the later period is large, the data volume is huge, and the network is blocked when the data are received, so that the problem of data loss exists, the data processing efficiency is low, and the resource utilization rate is low.
In summary, in the big data implementation process in the prior art, there are problems of low data processing efficiency and low resource utilization rate.
Disclosure of Invention
The embodiment of the invention provides a big data implementation system and method based on network security, which are used for solving the problems of low data processing efficiency and low resource utilization rate in the prior art.
The embodiment of the invention provides a big data implementation system based on network security, which comprises: a big data implementation platform;
the big data implementation platform comprises: the system comprises a big data acquisition module, a big data preprocessing module, a big data processing module, a network security supervision module and a controller;
the big data acquisition module is used for acquiring multiple paths of data in parallel through a data receiver with multiple data interfaces, packaging frame data of each path of data and adding priority numbers and frame numbers to frame headers of each frame of each path of data;
the big data preprocessing module is used for performing redundancy processing and verification processing on each path of data according to each path of data transmission protocol, and storing the data subjected to the redundancy processing and the verification processing to each path of data receiving buffer and data receiving memory; the data receiving buffer is used for receiving the data of the first ten frames and storing the data of the first ten frames and the data of the later frames into the data receiving memory; when the data in the data receiving buffer is less than ten frames, the data in the data receiving memory is automatically transmitted to the data receiving buffer;
the big data processing module is used for taking the data to be transmitted out of the data receiving buffer according to the priority number and the frame number, analyzing the data information and outputting the screened useful data according to the priority number and the frame number; the data receiving buffer is used for receiving a data receiving mark of a frame to be transmitted, wherein the data receiving buffer is used for receiving the data to be transmitted; comparing the analyzed data information with prestored interception information, wherein the analyzed data information is useful information when the contact ratio is smaller than a first preset value;
the network security supervision module comprises: the system comprises a network detection unit, a visitor verification unit and an access flow monitoring unit;
the network detection unit is used for detecting the network transmission rate and the resource occupancy rate of each data transmission channel in real time;
the visitor verification unit is used for accessing the network big data through an account, a password and a two-dimensional code; the identity authentication is carried out through an account and a password, and the payment authentication is carried out on the access of certain network data through the two-dimensional code;
the access flow monitoring unit is used for monitoring the network data access flow of each data transmission channel in real time, when the network data access flow of a certain channel exceeds a second preset value, the network flow is added to the channel, and meanwhile, the hotspot data type is determined according to the size of the network data access flow;
and the controller is used for coordinating the operation of the modules.
Preferably, the big data implementation platform is a big data server.
Preferably, the data interface includes: the device comprises serial ports, parallel ports, USB interfaces, Ethernet interfaces, wireless receivers and CAN interfaces, wherein the number of each serial port, parallel port, USB interface, Ethernet interface, wireless receiver and CAN interface is at least one.
Preferably, the network security supervision module further includes: a sensitive information filtering unit; and the sensitive information filtering unit is used for filtering illegal advertisement information and unhealthy information.
The embodiment of the invention provides a big data implementation method based on network security, which comprises the following steps:
collecting multi-channel data in parallel through a data receiver with various data interfaces, packaging frame data of each channel of data, and adding priority numbers and frame numbers to frame headers of each frame of each channel of data;
carrying out redundancy processing and verification processing on each path of data according to each path of data transmission protocol, and storing the data subjected to the redundancy processing and the verification processing to each path of data receiving buffer and data receiving memory; the data receiving buffer is used for receiving the data of the first ten frames and storing the data of the first ten frames and the data of the later frames into the data receiving memory; when the data in the data receiving buffer is less than ten frames, the data in the data receiving memory is automatically transmitted to the data receiving buffer;
taking out the data to be transmitted from the data receiving buffer according to the priority number and the frame number, analyzing the data information and outputting the screened useful data according to the priority number and the frame number; the data receiving buffer is used for receiving a data receiving mark of a frame to be transmitted, wherein the data receiving buffer is used for receiving the data to be transmitted; comparing the analyzed data information with prestored interception information, wherein the analyzed data information is useful information when the contact ratio is smaller than a first preset value;
network security supervision is carried out on the big data; the method specifically comprises the following steps: detecting the network transmission rate and the resource occupancy rate of each data transmission channel in real time;
accessing the network big data through the account, the password and the two-dimension code; the identity authentication is carried out through an account and a password, and the payment authentication is carried out on the access of certain network data through the two-dimensional code;
and monitoring the network data access flow of each data transmission channel in real time, adding the network flow to a certain channel when the network data access flow of the channel exceeds a second preset value, and determining the type of the hot spot data according to the size of the network data access flow.
Preferably, the network security supervision is performed on the big data; further comprising: and filtering illegal advertisement information and unhealthy information.
In the embodiment of the invention, a big data implementation system and method based on network security are provided, compared with the prior art, the system has the following beneficial effects:
the invention collects multi-path data in parallel through a data receiver with a plurality of data interfaces, adds priority numbers and frame numbers to frame packed data, and stores the collected data in a grading way, thereby analyzing and screening the stored data according to the priority numbers and the frame numbers and outputting the data; in the process of implementing the big data, the big data is acquired through a plurality of channels, so that the acquisition efficiency is high, and the acquired data volume is large; the data after the hierarchical storage is output according to the priority number and the frame number, so that the data transmission is ordered, network blockage and data loss are not easy to cause, the data processing efficiency is improved, and the resource utilization rate is low. Furthermore, redundancy processing and verification processing are carried out on each path of data according to each path of data transmission protocol, and data transmission reliability is improved.
The invention carries out network detection and access flow monitoring on the big data implementation system in real time through the network security supervision module, and verifies visitor information, thereby enhancing the network security and ensuring that the data is not easy to leak and lose. Particularly, when the visitor information is verified, payment verification can be performed on access of certain network data through the two-dimensional code, and the system is convenient to use and high in practicability; by monitoring the network data access flow of each data transmission channel, the network speed can be flexibly adjusted, and meanwhile, which type of information has large access amount can be judged, so that the reliable basis is improved for network data analysis.
Drawings
Fig. 1 is a functional schematic block diagram of a big data implementation system based on network security according to an embodiment of the present invention;
fig. 2 is a flowchart of a big data implementation method based on network security according to an embodiment of the present invention;
fig. 3 is a flowchart of specific steps of performing network security supervision on big data according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a functional schematic block diagram of a big data implementation system based on network security according to an embodiment of the present invention. As shown in fig. 1, the system includes: big data implementation platform 1.
Preferably, the big data implementation platform 1 of the present invention employs a big data server.
Specifically, the big data implementation platform 1 includes: the system comprises a big data acquisition module 11, a big data preprocessing module 12, a big data processing module 13, a network security supervision module 14 and a controller 15.
The big data acquisition module 11 is configured to acquire multiple paths of data in parallel through a data receiver with multiple data interfaces, package frame data of each path of data, and add a priority number and a frame number to a frame header of each frame of each path of data.
It should be noted that the data interface includes: the device comprises serial ports, parallel ports, USB interfaces, Ethernet interfaces, wireless receivers and CAN interfaces, wherein the number of each serial port, parallel port, USB interface, Ethernet interface, wireless receiver and CAN interface is at least one.
The big data preprocessing module 12 is configured to perform redundancy processing and verification processing on each path of data according to each path of data transmission protocol, and store the data after the redundancy processing and verification processing to each path of data receiving buffer and data receiving memory; the data receiving buffer is used for receiving the data of the first ten frames and storing the data of the first ten frames and the data of the later frames into the data receiving memory; when the data in the data receiving buffer is less than ten frames, the data in the data receiving memory is automatically transmitted to the data receiving buffer.
The big data processing module 13 is configured to take out data to be transmitted from the data receiving buffer according to the priority number and the frame number, analyze data information, and output screened useful data according to the priority number and the frame number; the data receiving buffer is used for receiving a data receiving mark of a frame to be transmitted, wherein the data receiving buffer is used for receiving the data to be transmitted; and comparing the analyzed data information with the prestored interception information, wherein the analyzed data information is useful information when the contact ratio is smaller than the first preset value.
In summary, the invention collects multi-channel data in parallel by a data receiver with multiple data interfaces, adds priority numbers and frame numbers to frame packed data, and stores the collected data in a grading way, so as to analyze and screen the stored data according to the priority numbers and the frame numbers and then output the data; in the process of implementing the big data, the big data is acquired through a plurality of channels, so that the acquisition efficiency is high, and the acquired data volume is large; the data after the hierarchical storage is output according to the priority number and the frame number, so that the data transmission is ordered, network blockage and data loss are not easy to cause, the data processing efficiency is improved, and the resource utilization rate is low. Furthermore, redundancy processing and verification processing are carried out on each path of data according to each path of data transmission protocol, and data transmission reliability is improved.
Specifically, the network security administration module 14 includes: a network detection unit 141, a guest authentication unit 142, and an access traffic monitoring unit 143.
The network detection unit 141 is configured to detect the network transmission rate and the resource occupancy rate of each data transmission channel in real time.
The visitor verification unit 142 is used for accessing the network big data through an account, a password and a two-dimensional code; the identity authentication is carried out through an account and a password, and the payment authentication is carried out on the access of certain network data through the two-dimensional code.
The access traffic monitoring unit 143 is configured to monitor network data access traffic of each data transmission channel in real time, add network traffic to a certain channel when the network data access traffic of the channel exceeds a second preset value, and determine a hotspot data type according to the size of the network data access traffic.
Preferably, the network security administration module 14 further includes: a sensitive information filtering unit; and the sensitive information filtering unit is used for filtering illegal advertisement information and unhealthy information.
It should be noted that the controller 15 in the present invention is used for coordinating the operations of the above modules.
In conclusion, the network security monitoring module is used for carrying out network detection and access flow monitoring on the big data implementation system in real time and verifying visitor information, so that the network security is enhanced, and the data is not easy to leak and lose. Particularly, when the visitor information is verified, payment verification can be performed on access of certain network data through the two-dimensional code, and the system is convenient to use and high in practicability; by monitoring the network data access flow of each data transmission channel, the network speed can be flexibly adjusted, and meanwhile, which type of information has large access amount can be judged, so that the reliable basis is improved for network data analysis.
Fig. 2 is a flowchart of a big data implementation method based on network security according to an embodiment of the present invention.
As shown in fig. 2, the method includes:
and step S21, acquiring multiple paths of data in parallel through a data receiver with multiple data interfaces, packaging frame data of each path of data, and adding priority numbers and frame numbers to frame headers of each frame of each path of data.
Step S22, according to each data transmission protocol, carrying out redundancy processing and check processing to each data path, and storing the data after redundancy processing and check processing to each data receiving buffer and data receiving memory; the data receiving buffer is used for receiving the data of the first ten frames and storing the data of the first ten frames and the data of the later frames into the data receiving memory; when the data in the data receiving buffer is less than ten frames, the data in the data receiving memory is automatically transmitted to the data receiving buffer.
Step S23, taking out the data to be transmitted from the data receiving buffer according to the priority number and the frame number, analyzing the data information and outputting the screened useful data according to the priority number and the frame number; the data receiving buffer is used for receiving a data receiving mark of a frame to be transmitted, wherein the data receiving buffer is used for receiving the data to be transmitted; and comparing the analyzed data information with the prestored interception information, wherein the analyzed data information is useful information when the contact ratio is smaller than the first preset value.
And step S24, performing network security supervision on the big data.
Fig. 3 is a flowchart of specific steps of performing network security supervision on big data according to an embodiment of the present invention. As shown in fig. 3, step S24 specifically includes:
and step S241, detecting the network transmission rate and the resource occupancy rate of each data transmission channel in real time.
Step S242, accessing the network big data through the account, the password and the two-dimension code; the identity authentication is carried out through an account and a password, and the payment authentication is carried out on the access of certain network data through the two-dimensional code.
Step S243, monitoring the network data access traffic of each data transmission channel in real time, adding network traffic to a certain channel when the network data access traffic of the channel exceeds a second preset value, and determining the type of the hotspot data according to the size of the network data access traffic.
Preferably, network security supervision is performed on the big data; further comprising: and filtering illegal advertisement information and unhealthy information.
Based on the same inventive concept, the embodiment of the invention provides a big data implementation method based on network security, and as the principle of solving the technical problem of the method is similar to that of a big data implementation system based on network security, the implementation of the method can refer to the implementation of the system, and repeated parts are not described again.
The above disclosure is only a few specific embodiments of the present invention, and those skilled in the art can make various modifications and variations of the present invention without departing from the spirit and scope of the present invention, and it is intended that the present invention encompass these modifications and variations as well as others within the scope of the appended claims and their equivalents.

Claims (6)

1. A big data implementation system based on network security is characterized by comprising: a big data implementation platform (1);
the big data implementation platform (1) comprises: the system comprises a big data acquisition module (11), a big data preprocessing module (12), a big data processing module (13), a network security supervision module (14) and a controller (15);
the big data acquisition module (11) is used for acquiring multiple paths of data in parallel through a data receiver with multiple data interfaces, packaging frame data of each path of data and adding priority numbers and frame numbers to frame headers of each frame of each path of data;
the big data preprocessing module (12) is used for performing redundancy processing and verification processing on each path of data according to each path of data transmission protocol, and storing the data subjected to the redundancy processing and the verification processing to each path of data receiving buffer and data receiving memory; the data receiving buffer is used for receiving the data of the first ten frames and storing the data of the first ten frames and the data of the later frames into the data receiving memory; when the data in the data receiving buffer is less than ten frames, the data in the data receiving memory is automatically transmitted to the data receiving buffer;
the big data processing module (13) is used for taking out the data to be transmitted from the data receiving buffer according to the priority number and the frame number, analyzing the data information and outputting the screened useful data according to the priority number and the frame number; the data receiving buffer is used for receiving a data receiving mark of a frame to be transmitted, wherein the data receiving buffer is used for receiving the data to be transmitted; comparing the analyzed data information with prestored interception information, wherein the analyzed data information is useful information when the contact ratio is smaller than a first preset value;
the network security administration module (14) comprising: a network detection unit (141), a visitor authentication unit (142) and an access traffic monitoring unit (143);
the network detection unit (141) is used for detecting the network transmission rate and the resource occupancy rate of each data transmission channel in real time;
the visitor verification unit (142) is used for accessing the network big data through an account, a password and a two-dimensional code; the identity authentication is carried out through an account and a password, and the payment authentication is carried out on the access of certain network data through the two-dimensional code;
the access flow monitoring unit (143) is configured to monitor network data access flows of each data transmission channel in real time, increase a network flow speed to a certain channel when the network data access flow of the channel exceeds a second preset value, and determine a hotspot data type according to the size of the network data access flow;
and the controller (15) is used for coordinating the operation of the modules.
2. The big data implementation system based on network security according to claim 1, characterized in that the big data implementation platform (1) is a big data server.
3. The big data implementation system based on network security of claim 1, wherein the data interface comprises: the device comprises serial ports, parallel ports, USB interfaces, Ethernet interfaces, wireless receivers and CAN interfaces, wherein the number of each serial port, parallel port, USB interface, Ethernet interface, wireless receiver and CAN interface is at least one.
4. The big data implementation system based on network security of claim 1, wherein the network security administration module (14) further comprises: a sensitive information filtering unit; and the sensitive information filtering unit is used for filtering illegal advertisement information and unhealthy information.
5. A big data implementation method based on network security is characterized by comprising the following steps:
collecting multi-channel data in parallel through a data receiver with various data interfaces, packaging frame data of each channel of data, and adding priority numbers and frame numbers to frame headers of each frame of each channel of data;
carrying out redundancy processing and verification processing on each path of data according to each path of data transmission protocol, and storing the data subjected to the redundancy processing and the verification processing to each path of data receiving buffer and data receiving memory; the data receiving buffer is used for receiving the data of the first ten frames and storing the data of the first ten frames and the data of the later frames into the data receiving memory; when the data in the data receiving buffer is less than ten frames, the data in the data receiving memory is automatically transmitted to the data receiving buffer;
taking out the data to be transmitted from the data receiving buffer according to the priority number and the frame number, analyzing the data information and outputting the screened useful data according to the priority number and the frame number; the data receiving buffer is used for receiving a data receiving mark of a frame to be transmitted, wherein the data receiving buffer is used for receiving the data to be transmitted; comparing the analyzed data information with prestored interception information, wherein the analyzed data information is useful information when the contact ratio is smaller than a first preset value;
network security supervision is carried out on the big data; the method specifically comprises the following steps: detecting the network transmission rate and the resource occupancy rate of each data transmission channel in real time;
accessing the network big data through the account, the password and the two-dimension code; the identity authentication is carried out through an account and a password, and the payment authentication is carried out on the access of certain network data through the two-dimensional code;
and monitoring the network data access flow of each data transmission channel in real time, adding the network flow to a certain channel when the network data access flow of the channel exceeds a second preset value, and determining the type of the hot spot data according to the size of the network data access flow.
6. The big data implementation method based on network security as claimed in claim 5, wherein the big data implementation is subject to network security supervision; further comprising: and filtering illegal advertisement information and unhealthy information.
CN201710792580.6A 2017-09-05 2017-09-05 Big data implementation system and method based on network security Expired - Fee Related CN107528852B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710792580.6A CN107528852B (en) 2017-09-05 2017-09-05 Big data implementation system and method based on network security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710792580.6A CN107528852B (en) 2017-09-05 2017-09-05 Big data implementation system and method based on network security

Publications (2)

Publication Number Publication Date
CN107528852A CN107528852A (en) 2017-12-29
CN107528852B true CN107528852B (en) 2020-07-31

Family

ID=60683427

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710792580.6A Expired - Fee Related CN107528852B (en) 2017-09-05 2017-09-05 Big data implementation system and method based on network security

Country Status (1)

Country Link
CN (1) CN107528852B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108415854A (en) * 2018-02-11 2018-08-17 中国神华能源股份有限公司 Data collecting system based on shared buffer memory and method
CN109117654A (en) * 2018-08-21 2019-01-01 浙江大数据交易中心有限公司 A kind of big data really weighs method and system
CN109714402A (en) * 2018-12-12 2019-05-03 胡书恺 A kind of redundant data acquisition system and its operation application method
CN112149170A (en) * 2020-10-12 2020-12-29 上海中尖实业(集团)有限公司 Digital big data security processing system
CN113886126A (en) * 2021-10-13 2022-01-04 中里大数据服务(上海)有限公司 Fault-tolerant server-based intelligent management and control system and method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104901889A (en) * 2015-05-15 2015-09-09 嘉兴市稠江光电仪器技术有限公司 Remote data collection and control method based on improved-type UDP/IP protocol
CN105005604A (en) * 2015-07-06 2015-10-28 苏州金立方通讯科技有限公司 Big data system
CN105391742A (en) * 2015-12-18 2016-03-09 桂林电子科技大学 Hadoop-based distributed intrusion detection system
CN106790088A (en) * 2016-12-23 2017-05-31 华北理工大学 A kind of network security enforcement system and method based on big data platform

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8935368B2 (en) * 2012-04-16 2015-01-13 International Business Machines Corporation Data collection from networked devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104901889A (en) * 2015-05-15 2015-09-09 嘉兴市稠江光电仪器技术有限公司 Remote data collection and control method based on improved-type UDP/IP protocol
CN105005604A (en) * 2015-07-06 2015-10-28 苏州金立方通讯科技有限公司 Big data system
CN105391742A (en) * 2015-12-18 2016-03-09 桂林电子科技大学 Hadoop-based distributed intrusion detection system
CN106790088A (en) * 2016-12-23 2017-05-31 华北理工大学 A kind of network security enforcement system and method based on big data platform

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
面向大数据的异构网络安全监控及关联算法研究;刘兰,林军,蔡君;《电信科学 研究与开发集》;20140720;第84-89页 *

Also Published As

Publication number Publication date
CN107528852A (en) 2017-12-29

Similar Documents

Publication Publication Date Title
CN107528852B (en) Big data implementation system and method based on network security
CN103532940B (en) network security detection method and device
CN103532776B (en) Service traffics detection method and system
Pelletier et al. Evaluating the CIC IDS-2017 dataset using machine learning methods and creating multiple predictive models in the statistical computing language R
CN107770263A (en) A kind of internet-of-things terminal safety access method and system based on edge calculations
CN107181612A (en) A kind of visual network method for safety monitoring based on big data
CN108282497A (en) For the ddos attack detection method of SDN control planes
CN104283897A (en) Trojan horse communication feature fast extraction method based on clustering analysis of multiple data streams
CN105553998A (en) Network attack abnormality detection method
CN105024877A (en) Hadoop malicious node detection system based on network behavior analysis
CN103067218B (en) A kind of express network packet content analytical equipment
CN106131083A (en) A kind of attack message detection and take precautions against method and switch
CN108334758A (en) A kind of detection method, device and the equipment of user's ultra vires act
CN109005162B (en) Industrial control system security audit method and device
CN108896804A (en) Stealing detection method, device and electronic equipment
CN107317708B (en) Monitoring method and device for court business application system
CN106101071B (en) A kind of method of the defence link drain type CC attack of Behavior-based control triggering
CN102984003A (en) Network access detection system and network access detection method
US20210083985A1 (en) System and method for determining a network performance property in at least one network
KR20160087187A (en) Cyber blackbox system and method thereof
CN103297298A (en) Network storm real-time rapid detecting method used for intelligent substation
CN110097017B (en) Power transmission network special-type ammeter monitoring system and method
CN107395637A (en) Http tunnels active detecting method, terminal device and storage medium
CN106656647A (en) Real-time flow monitoring method and real-time flow monitoring device
CN105487936A (en) Information system security evaluation method for classified protection under cloud environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200731

Termination date: 20210905