CN113347631A - Hot spot sharing method based on big data and artificial intelligence and big data cloud platform - Google Patents
Hot spot sharing method based on big data and artificial intelligence and big data cloud platform Download PDFInfo
- Publication number
- CN113347631A CN113347631A CN202110531205.2A CN202110531205A CN113347631A CN 113347631 A CN113347631 A CN 113347631A CN 202110531205 A CN202110531205 A CN 202110531205A CN 113347631 A CN113347631 A CN 113347631A
- Authority
- CN
- China
- Prior art keywords
- information
- request
- authority
- track
- determining
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
According to the hot spot sharing method and the big data cloud platform based on big data and artificial intelligence, network area description data containing all information communication networks in an information communication network set are determined from a first hot spot sharing request queue aiming at each information communication network set, and information safety evaluation characteristics are determined according to data authority updating tracks of the network area description data. The information security evaluation feature is used for determining an access intrusion detection result corresponding to a hotspot sharing request in each information communication network in the information communication network set. Therefore, the network area description data can be determined for the information communication network, so that the information security evaluation characteristics can be accurately and completely determined according to the corresponding data authority updating track, and a data basis is provided for subsequent access intrusion detection.
Description
The application is a divisional application with the application number of 202011251126.8, the application date of 11/2020, and the application name of hot spot sharing method and big data cloud platform based on artificial intelligence and feature analysis.
Technical Field
The application relates to the technical field of artificial intelligence and hotspot sharing, in particular to a hotspot sharing method based on big data and artificial intelligence and a big data cloud platform.
Background
With the development of society and the advancement of technology, sharing economy has become a new development mode. Through sharing economy, social productivity can be greatly improved, unnecessary cost is reduced, communication among people can be increased, and cohesion of various industries in the society is enhanced.
In addition, continuous optimization of big data and information communication provides a solid technical foundation for the current business processing, and hot spot sharing is used as one of the economic sharing modes, so that network sharing among a plurality of terminals can be realized, and the efficiency of cloud and online business processing is improved. However, the problems of information security, authority security, etc. faced in hot spot sharing currently need to be carefully considered.
Disclosure of Invention
The first aspect of the application discloses a hotspot sharing method based on big data and artificial intelligence, which comprises the following steps:
determining the information communication network where each hotspot sharing request is located from the obtained first hotspot sharing request queue; grouping the information communication networks according to the information authority security level of a request object among the hotspot sharing requests in different information communication networks to obtain at least one information communication network set; the information authority security level of a request object of a hotspot sharing request in any two information communication networks in the same information communication network set is greater than or equal to a set level;
for each information communication network set, determining information security evaluation characteristics corresponding to the information communication network set from the first hotspot sharing request queue based on each information communication network in the information communication network set; the information security evaluation features at least comprise network security index data of each information communication network in the information communication network set, and the information security evaluation features are used for determining access intrusion detection results corresponding to hotspot sharing requests in each information communication network in the information communication network set;
determining access intrusion detection results corresponding to hotspot sharing requests in all information communication networks in the information communication network set based on the information security evaluation characteristics, and identifying the access intrusion detection results by adopting a preset artificial intelligence model to obtain identification results; and according to the identification result, accessing the target terminal initiating the corresponding hotspot sharing request into a hotspot network corresponding to the current hotspot sharing terminal.
Preferably, the information authority security level of the request object between the hotspot sharing requests in different information communication networks is determined by the following method:
extracting network parameter distribution corresponding to each information communication network from the first hotspot sharing request queue;
respectively inputting the network parameter distribution corresponding to each information communication network into a preset network parameter identification thread to obtain request description information of a hotspot sharing request in each information communication network;
determining the information authority security level of a request object corresponding to the hotspot sharing request in each information communication network based on the request description information of each hotspot sharing request;
the method comprises the following steps of determining the information authority security level of a request object corresponding to a hotspot sharing request in each information communication network based on request description information of each hotspot sharing request, and further comprising the following steps:
acquiring a first request category attribute and a second request category attribute for each group of request description information; wherein the attribute heat value of the second request class attribute is less than the attribute heat value of the first request class attribute; determining the object user behavior characteristics of each group of request description information according to the attribute field characteristics of the second request type attributes, and acquiring the user behavior description information of each group of request description information from the first request type attributes according to the object user behavior characteristics; determining label consistency weights of the user behavior classification labels of the user behavior description information and each preset classification label in a preset classification label set; the preset classification label set comprises a plurality of preset classification labels, each preset classification label is provided with a classification correction weight, and the classification correction weight indicates that the request description information is legal information or abnormal information; selecting K preset classification labels from the preset classification label set based on the label consistency weight of the user behavior classification label and each preset classification label; wherein K is a positive integer greater than or equal to 1; determining whether the request description information is the legal information or the abnormal information based on the classification correction weight of K preset classification labels;
when the request description information is determined to be the legal information, determining a first request permission list corresponding to the request description information, and when the request description information is determined to be the abnormal information, determining a second request permission list corresponding to the request description information; performing list time sequence correction on the first request permission list or the second request permission list to obtain a third request permission list;
acquiring N types of list unit combinations of the third request permission list and a permission event set corresponding to each type of list unit combination, wherein each type of list unit combination comprises M different list information transmission paths, and N and M are positive integers greater than or equal to 1; determining the authority event transmission track corresponding to the list unit combination in the authority event set corresponding to the list unit combination; adopting the authority event transmission tracks corresponding to the list unit combination to carry out track trend identification to obtain path iteration data of each list information transmission path in the list unit combination; carrying out transmission track characteristic iteration on the authority event transmission track corresponding to the list unit combination based on the path iteration data of each list information transmission path in the N types of list unit combinations to obtain the authority event iteration track corresponding to the list unit combination; adding the authority event iteration track corresponding to the list unit combination into the authority event set corresponding to the list unit combination; returning and executing the step to determine the authority event transmission tracks corresponding to the list unit combinations in the authority event sets corresponding to the list unit combinations until the current fitting coefficients between the authority event transmission tracks corresponding to the N kinds of list unit combinations are larger than the target fitting coefficients;
when the current fitting coefficient between the authority event transmission tracks corresponding to the N kinds of list unit combinations is larger than a target fitting coefficient, fitting the authority event transmission tracks corresponding to the N kinds of list unit combinations to obtain a target transmission track; extracting a first track node with an information authority identifier and a second track node with an information security identifier in the target transmission track; respectively determining a first relative position weight of each first track node and a second relative position weight of each second track node; and calculating the weighted sum of the first relative position weight and the second relative position weight, and determining the information authority security level of the request object corresponding to each group of request description information according to the weighted sum result.
Preferably, the determining, based on each information communication network in the information communication network set, the information security evaluation feature corresponding to the information communication network set from the first hotspot sharing request queue includes:
determining network area description data containing all information communication networks in the information communication network set from the first hotspot sharing request queue;
determining the information security evaluation characteristics according to the data authority updating track of the network area description data;
wherein, the information security evaluation feature is determined according to the data authority update track of the network area description data, and the method further comprises the following steps:
acquiring a plurality of continuous track sections of the data authority updating track, wherein one track section comprises a dynamic updating track and a dynamic correcting track under one authority evaluation index;
acquiring a node change track of the node parameter change record based on a parameter mapping value and an authority description value of the node parameter change record of the data authority update track in the track section; performing first superposition on the node change track recorded by the node parameter change and a set change track in a preset track database to generate a first superposed node change track; sampling and acquiring an evaluation index change record from a node identification section of the node change track superposed for the first time, wherein the node identification section is a section of the node parameter change record in the node change track superposed for the first time, and corresponds to an identification;
acquiring a parameter mapping value and an authority description value mapped in the track section by the evaluation index change record; based on the parameter mapping value and the authority description value mapped in the track section by the evaluation index change record, carrying out second superposition on the node change track which is superposed for the first time, and generating an authority node updating track of the data authority updating track; and extracting node features corresponding to each authority node from the authority node updating track, determining a node feature sequence corresponding to the node features according to the sequence from small to large of feature dimensions of each group of node features, and generating the information security evaluation features based on evaluation labels existing in the node feature sequence.
Preferably, the method further comprises:
determining the information security evaluation feature from a second hotspot sharing request queue obtained currently, wherein the second hotspot sharing request queue and the first hotspot sharing request queue both contain the information security evaluation feature, and determining a current access authority request record of the information security evaluation feature;
and caching the characteristic correction result when determining to perform characteristic correction aiming at the information security evaluation characteristic according to the current access authority request record of the information security evaluation characteristic.
Preferably, determining, based on the information security evaluation feature, an access intrusion detection result corresponding to a hotspot sharing request in each information communication network in the information communication network set includes:
determining a feature validity time period and information security labels of information security evaluation features, determining a plurality of event label combinations according to a plurality of evaluation event labels in historical security evaluation results, performing label matching rate calculation according to the label association degree of each evaluation event label in each event label combination with the information security label in the feature validity time period to obtain a plurality of label matching rate calculation results respectively corresponding to the plurality of event label combinations, and taking the label heat weighted value of the event label combination corresponding to each label matching rate calculation result as the weighted value of each label matching rate calculation result;
respectively acquiring message transmission records of each information communication network corresponding to the information security label determined in the characteristic validity period based on the plurality of label matching rate calculation results to obtain a plurality of message transmission records, integrating the plurality of message transmission records acquired based on the plurality of label matching rate calculation results according to the weight value of each label matching rate calculation result to obtain a first message transmission record set, wherein the label heat weighted values between any two evaluation event labels in each event label combination are equal, the label heat weighted values corresponding to different event label combinations are different, each label matching rate calculation result is used for determining the access path risk rate corresponding to the hotspot sharing request in each information communication network corresponding to the information security label in any set time step length, and the label matching rate calculation result is obtained by calculating the label matching rate according to the historical security evaluation result;
acquiring a fusion identification result between the plurality of hotspot sharing requests and the information security label within the feature validity period according to the historical security evaluation result and the access path risk rate of the plurality of hotspot sharing requests corresponding to the information security label, and taking a target request message corresponding to the fusion identification result corresponding to the plurality of hotspot sharing requests as a second message transmission record; and calculating the transmission record correlation degree of the first message transmission record set and the second message transmission record, and determining an access intrusion detection result corresponding to each hotspot sharing request according to the transmission record correlation degree and the access path risk rate of each hotspot sharing request.
Preferably, determining an access intrusion detection result corresponding to each hotspot sharing request according to the transmission record correlation and the access path risk rate of each hotspot sharing request includes:
determining path node information of a sharing request transmission path corresponding to each hotspot sharing request based on the transmission record correlation degree, and determining access period information of each hotspot sharing request according to a risk triggering period of an access path risk rate of each hotspot sharing request in a corresponding information communication network; extracting a first description information list corresponding to the path node information and a second description information list corresponding to the access period information, and determining a plurality of information units with different feature description values respectively included in the first description information list and the second description information list; wherein the information unit is one piece of description information in the first description information list and the second description information list;
on the premise that the list structure characteristics of the first description information list are the same as the second description information list structure characteristics, obtaining the sharing request attribute information of the path node information in any information unit of the first description information list, and determining an information unit with the minimum feature description value in the second description information list as a target information unit in parallel; based on an encryption protocol of a request message field of each hotspot sharing request, adding the sharing request attribute information to the target information unit, and determining sharing request mapping information corresponding to the sharing request attribute information in the target information unit; generating an information matching list between the path node information and the access period information according to request permission difference information between the sharing request attribute information and the sharing request mapping information;
acquiring target execution function information in the target information unit by taking the sharing request mapping information as reference information, adding the target execution function information to the information unit where the sharing request attribute information is located according to a plurality of information matching paths corresponding to the information matching list, so as to obtain a function execution result corresponding to the target execution function information in the information unit where the sharing request attribute information is located, and determining the function execution result as an information access result according to the reference information; the target execution function information is information of an execution function corresponding to the access action, and an information access result is used for representing an access result of the current hotspot sharing terminal;
determining a corresponding information comparison result when the sharing request attribute information is added to the target information unit; according to the relevance between the function execution result and the field time sequence feature tags corresponding to the comparison nodes in the information comparison result, sequentially acquiring the intrusion detection tags corresponding to the information access result in the second description information list according to the sequence of time sequence weights from large to small, stopping acquiring the intrusion detection tags in the next information unit until the acquired information security level of the information unit where the intrusion detection tags are located is consistent with the information security level of the information access result in the first description information list, establishing the corresponding relation between the information access result and the intrusion detection tags acquired last time, and determining the access intrusion detection result corresponding to each hotspot sharing request based on the corresponding relation.
Preferably, the identifying the access intrusion detection result by using a preset artificial intelligence model to obtain an identification result includes:
determining a timeliness index of a training set of a preset artificial intelligence model, updating the training set according to a recognition result of a previous period when the timeliness index does not reach a set index, inputting an access intrusion detection result into the preset artificial intelligence model when the timeliness index reaches the set index, and judging whether an early warning result output by the preset artificial intelligence model is received or not; the previous period is determined according to the set time step;
when an early warning result output by the preset artificial intelligence model is received, establishing an authority detection thread according to the early warning result;
when a classification result corresponding to an intrusion detection classification label is output by a preset artificial intelligence model, determining a thread input parameter of the classification result corresponding to the intrusion detection classification label in the authority detection thread;
when it is determined that the thread input parameters of the classification results corresponding to the intrusion detection classification labels in the authority detection thread are dynamic input parameters or static input parameters in set categories, directly loading the classification results corresponding to the intrusion detection classification labels into a parameter set to be processed of the authority detection thread, or after loading the classification results corresponding to the intrusion detection classification labels into a parameter transmission data set of a preset artificial intelligence model, transmitting the classification results corresponding to the intrusion detection classification labels into the parameter set to be processed of the authority detection thread through the preset artificial intelligence model; operating the authority detection thread, and acquiring access authority distribution information of the current hotspot sharing terminal, which is output after the authority detection thread extracts the authority list of the classification result;
determining authority distribution records and authority verification codes of the access authority distribution information; under the condition that the access authority distribution information contains a decryption label according to the authority distribution record, determining correlation coefficients between authority verification codes under the encryption label of the access authority distribution information and authority verification codes under the decryption label of the access authority distribution information according to authority verification codes under the decryption label of the access authority distribution information and verification logic information of the authority verification codes, and distributing the authority verification codes under the encryption label of the access authority distribution information and the authority verification codes under the decryption label to the decryption label;
extracting a first verification code queue corresponding to the permission verification code of the decryption label and a second verification code queue corresponding to the permission verification code under the encryption label, determining fusion queue characteristics of the first verification code queue and the second verification code queue, inputting the fusion queue characteristics into the preset artificial intelligence model, and obtaining an identification result of the preset artificial intelligence model for identifying and outputting the fusion queue characteristics.
Preferably, accessing the target terminal initiating the corresponding hotspot sharing request to the hotspot network corresponding to the current hotspot sharing terminal according to the identification result includes:
and when the identification result represents that the corresponding hotspot sharing request has no abnormal access behavior, accessing the target terminal initiating the corresponding hotspot sharing request into a hotspot network corresponding to the current hotspot sharing terminal.
A second aspect of the application discloses a big data cloud platform, which comprises a processing engine, a network module and a memory; the processing engine and the memory communicate via the network module, and the processing engine reads the computer program from the memory and runs it to perform the method of the first aspect.
A third aspect of the present application discloses a computer-readable storage medium having stored thereon a computer program which, when executed, implements the method of the first aspect.
Compared with the prior art, the hotspot sharing method based on big data and artificial intelligence and the big data cloud platform provided by the embodiment of the application have the following technical effects: before the target terminal is accessed to the hotspot network corresponding to the current hotspot sharing terminal, the access intrusion detection result of the target terminal is identified, so that the information security relative to the current hotspot sharing terminal is ensured. Therefore, the target terminal passes the access verification before using the hotspot network corresponding to the current hotspot sharing terminal. The access intrusion detection result is determined based on the information security evaluation characteristics, and the access intrusion detection result can be respectively identified aiming at different information communication networks where different hotspot sharing requests are located, so that the access verification can be accurately and reliably realized. In addition, because the access verification is performed on the side of the big data cloud platform, a corresponding verification program does not need to be deployed in the current hotspot sharing terminal, and the running speed of the current hotspot sharing terminal can be prevented from being seriously slowed down.
In the description that follows, additional features will be set forth, in part, in the description. These features will be in part apparent to those skilled in the art upon examination of the following and the accompanying drawings, or may be learned by production or use. The features of the present application may be realized and attained by practice or use of various aspects of the methodologies, instrumentalities and combinations particularly pointed out in the detailed examples that follow.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
The methods, systems, and/or processes of the figures are further described in accordance with the exemplary embodiments. These exemplary embodiments will be described in detail with reference to the drawings. These exemplary embodiments are non-limiting exemplary embodiments in which reference numerals represent similar mechanisms throughout the various views of the drawings.
FIG. 1 is a block diagram of an exemplary big data and artificial intelligence based hotspot sharing system, shown in accordance with some embodiments of the present application.
FIG. 2 is a schematic diagram illustrating hardware and software components in an exemplary big data cloud platform according to some embodiments of the present application.
FIG. 3 is a flow diagram illustrating an exemplary big data and artificial intelligence based hotspot sharing method and/or process according to some embodiments of the present application.
FIG. 4 is a block diagram illustrating an exemplary big data and artificial intelligence based hotspot sharing device according to some embodiments of the present application.
Detailed Description
The inventor finds that, through research and research, most of common hotspot sharing methods are that a terminal a opens a hotspot interface, and then shares a hotspot to a terminal b according to a hotspot access request of the terminal b, which may cause information loss of the terminal a. The inventor also finds that, for access verification of the terminal b, if a corresponding verification program is deployed in the terminal a, the running speed of the terminal a is severely slowed down, and it is difficult to accurately and reliably implement the access verification.
In order to better understand the technical solutions, the technical solutions of the present application are described in detail below with reference to the drawings and specific embodiments, and it should be understood that the specific features in the embodiments and examples of the present application are detailed descriptions of the technical solutions of the present application, and are not limitations of the technical solutions of the present application, and the technical features in the embodiments and examples of the present application may be combined with each other without conflict.
In the following detailed description, numerous specific details are set forth by way of examples in order to provide a thorough understanding of the relevant guidance. It will be apparent, however, to one skilled in the art that the present application may be practiced without these specific details. In other instances, well-known methods, procedures, systems, compositions, and/or circuits have been described at a relatively high-level, without detail, in order to avoid unnecessarily obscuring aspects of the present application.
These and other features, functions, methods of execution, and combination of functions and elements of related elements in the structure and economies of manufacture disclosed in the present application may become more apparent upon consideration of the following description with reference to the accompanying drawings, all of which form a part of this application. It is to be expressly understood, however, that the drawings are for the purpose of illustration and description only and are not intended as a definition of the limits of the application. It should be understood that the drawings are not to scale. It is to be expressly understood, however, that the drawings are for the purpose of illustration and description only and are not intended as a definition of the limits of the application. It should be understood that the drawings are not to scale.
Flowcharts are used herein to illustrate the implementations performed by systems according to embodiments of the present application. It should be expressly understood that the processes performed by the flowcharts may be performed out of order. Rather, these implementations may be performed in the reverse order or simultaneously. In addition, at least one other implementation may be added to the flowchart. One or more implementations may be deleted from the flowchart.
Fig. 1 is a block diagram illustrating an exemplary big data and artificial intelligence based hotspot sharing system 300 according to some embodiments of the present application, where the big data and artificial intelligence based hotspot sharing system 300 may include a big data cloud platform 100 and a plurality of terminals 200 in communication with each other.
In some embodiments, as shown in fig. 2, big data cloud platform 100 may include a processing engine 110, a network module 120, and a memory 130, processing engine 110 and memory 130 communicating through network module 120.
The Memory 130 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like. The memory 130 is used for storing a program, and the processing engine 110 executes the program after receiving the execution instruction.
It is to be understood that the configuration shown in FIG. 2 is merely illustrative and that big data cloud platform 100 may also include more or fewer components than shown in FIG. 2, or have a different configuration than shown in FIG. 2. The components shown in fig. 2 may be implemented in hardware, software, or a combination thereof.
Fig. 3 is a flowchart illustrating an exemplary big data and artificial intelligence based hotspot sharing method and/or process according to some embodiments of the present application, which may be applied to the big data cloud platform 100 in fig. 1, and may specifically include the following steps S31 to S33.
Step S31, determining the information communication network where each hotspot sharing request is located from the obtained first hotspot sharing request queue; and grouping the information communication networks according to the information authority security level of the request object among the hotspot sharing requests in different information communication networks to obtain at least one information communication network set.
For example, the first hotspot sharing request queue is used to record hotspot sharing requests collected at different time intervals, and the hotspot sharing requests may be initiated to different terminals by different terminals, or may be initiated to the same terminal by different terminals. The request object may be understood as a terminal that initiates a hotspot sharing request. The information authority security level is used for describing the interaction security of the request object. The information authority security level of the request object of the hotspot sharing request in any two information communication networks in the same information communication network set is greater than or equal to the set level, and the set level is adjusted according to the actual situation, which is not limited herein.
Step S32, for each information communication network set, determining, based on each information communication network in the information communication network set, an information security evaluation feature corresponding to the information communication network set from the first hotspot sharing request queue.
For example, the information security evaluation feature at least includes network security index data of each information communication network in the information communication network set, and the information security evaluation feature is used for determining an access intrusion detection result corresponding to a hotspot sharing request in each information communication network in the information communication network set.
Step S33, determining access intrusion detection results corresponding to the hotspot sharing requests in each information communication network in the information communication network set based on the information security evaluation characteristics, and identifying the access intrusion detection results by adopting a preset artificial intelligence model to obtain identification results; and according to the identification result, accessing the target terminal initiating the corresponding hotspot sharing request into a hotspot network corresponding to the current hotspot sharing terminal.
For example, the access intrusion detection result is used to represent a pre-detection result of an illegal access behavior of the hotspot sharing request to the current hotspot sharing terminal. And the identification result is used for representing whether the target terminal is a safe terminal.
It can be understood that, by performing the above steps S31-S33, the information communication network where each hotspot sharing request is located is first determined from the first hotspot sharing request queue and the information communication networks are grouped according to the information authority security level of the request object between the hotspot sharing requests in each different information communication network to obtain at least one information communication network set, secondly, determining information security evaluation characteristics corresponding to each information communication network set from a first hot spot sharing request queue based on each information communication network in each information communication network set, and finally determining access intrusion detection results corresponding to the hot spot sharing requests in each information communication network set based on the information security evaluation characteristics, and according to the identification result obtained by identifying the access intrusion detection result, the target terminal initiating the corresponding hotspot sharing request is accessed into the hotspot network corresponding to the current hotspot sharing terminal.
By the design, before the target terminal is accessed to the hotspot network corresponding to the current hotspot sharing terminal, the access intrusion detection result of the target terminal is identified, so that the information security relative to the current hotspot sharing terminal is ensured. Therefore, the target terminal passes the access verification before using the hotspot network corresponding to the current hotspot sharing terminal. The access intrusion detection result is determined based on the information security evaluation characteristics, and the access intrusion detection result can be respectively identified aiming at different information communication networks where different hotspot sharing requests are located, so that the access verification can be accurately and reliably realized. In addition, because the access verification is performed on the side of the big data cloud platform, a corresponding verification program does not need to be deployed in the current hotspot sharing terminal, and the running speed of the current hotspot sharing terminal can be prevented from being seriously slowed down.
In some embodiments, for step S31, the information authority security level of the request object between the hotspot sharing requests in different information communication networks is determined through the following steps a to c.
Step a, extracting network parameter distribution corresponding to each information communication network from the first hotspot sharing request queue.
And b, respectively inputting the network parameter distribution corresponding to each information communication network into a preset network parameter identification thread to obtain the request description information of the hotspot sharing request in each information communication network.
And c, determining the information authority security level of the request object corresponding to the hot spot sharing request in each information communication network based on the request description information of each hot spot sharing request.
Therefore, based on the content described in the steps a to c, the information authority security level of the request object corresponding to the hotspot sharing request in each information communication network can be determined in real time, and the delay of the information authority security level is avoided.
On the basis of the above, the determining, by step c, the information authority security level of the request object corresponding to the hotspot sharing request in each information communication network based on the request description information of each hotspot sharing request may further include implementing the content described in steps c1 to c4 below.
Step c1, obtaining a first request type attribute and a second request type attribute for each group of request description information; wherein the attribute heat value of the second request class attribute is less than the attribute heat value of the first request class attribute; determining the object user behavior characteristics of each group of request description information according to the attribute field characteristics of the second request type attributes, and acquiring the user behavior description information of each group of request description information from the first request type attributes according to the object user behavior characteristics; determining label consistency weights of the user behavior classification labels of the user behavior description information and each preset classification label in a preset classification label set; the preset classification label set comprises a plurality of preset classification labels, each preset classification label is provided with a classification correction weight, and the classification correction weight indicates that the request description information is legal information or abnormal information; selecting K preset classification labels from the preset classification label set based on the label consistency weight of the user behavior classification label and each preset classification label; wherein K is a positive integer greater than or equal to 1; and determining whether the request description information is the legal information or the illegal information based on the classification correction weight of K preset classification labels.
Step c2, when determining that the request description information is the legal information, determining a first request permission list corresponding to the request description information, and when determining that the request description information is the illegal information, determining a second request permission list corresponding to the request description information; and performing list time sequence correction on the first request permission list or the second request permission list to obtain a third request permission list.
Step c3, acquiring N list element combinations of the third request permission list and a permission event set corresponding to each list element combination, where each list element combination includes M different list information transmission paths, and N and M are positive integers greater than or equal to 1; determining the authority event transmission track corresponding to the list unit combination in the authority event set corresponding to the list unit combination; adopting the authority event transmission tracks corresponding to the list unit combination to carry out track trend identification to obtain path iteration data of each list information transmission path in the list unit combination; carrying out transmission track characteristic iteration on the authority event transmission track corresponding to the list unit combination based on the path iteration data of each list information transmission path in the N types of list unit combinations to obtain the authority event iteration track corresponding to the list unit combination; adding the authority event iteration track corresponding to the list unit combination into the authority event set corresponding to the list unit combination; and returning and executing the steps to determine the authority event transmission tracks corresponding to the list unit combinations in the authority event sets corresponding to the list unit combinations until the current fitting coefficients between the authority event transmission tracks corresponding to the N kinds of list unit combinations are larger than the target fitting coefficients.
Step c4, when the current fitting coefficient between the authority event transmission tracks corresponding to the N kinds of list unit combinations is larger than the target fitting coefficient, fitting the authority event transmission tracks corresponding to the N kinds of list unit combinations to obtain target transmission tracks; extracting a first track node with an information authority identifier and a second track node with an information security identifier in the target transmission track; respectively determining a first relative position weight of each first track node and a second relative position weight of each second track node; and calculating the weighted sum of the first relative position weight and the second relative position weight, and determining the information authority security level of the request object corresponding to each group of request description information according to the weighted sum result.
It can be understood that, by executing the contents described in the above steps c 1-c 4, different request type attributes of each set of request description information can be analyzed, so as to determine a request permission list in the case that the request description information is legal information and abnormal information, and further determine a target delivery track of the request description information, so that the information permission security level can be accurately determined in real time according to the weighted sum of the relative position weights of different track nodes corresponding to the target delivery track.
In some examples, the determining, by step S32, information security evaluation features corresponding to the information communication network set from the first hotspot sharing request queue based on each information communication network in the information communication network set may further include the following steps S321 and S322.
Step S321, determining network area description data including all information communication networks in the information communication network set from the first hotspot sharing request queue.
Step S322, determining the information security evaluation feature according to the data authority update trajectory of the network area description data.
Therefore, when the contents described in the above steps S321 to S322 are executed, the network area description data can be determined for the information communication network, so that the information security evaluation feature can be accurately and completely determined according to the corresponding data authority update track, and a data basis is provided for subsequent access intrusion detection.
Further, the determining of the information security evaluation feature according to the data authority update trajectory of the network area description data described in step S322 further includes the following contents described in steps S3221 to S3223.
Step S3221, a plurality of continuous track sections of the data authority updating track are obtained, where one track section includes a dynamic updating track and a dynamic correcting track under one authority evaluation index.
Step S3222, based on the parameter mapping value and the authority description value recorded in the track section by the node parameter change of the data authority updating track, obtaining the node change track recorded by the node parameter change; performing first superposition on the node change track recorded by the node parameter change and a set change track in a preset track database to generate a first superposed node change track; and sampling to obtain an evaluation index change record from a node identification section of the node change track superposed for the first time, wherein the node identification section is a section of the node parameter change record in the node change track superposed for the first time, and the section corresponds to the identification.
Step S3223, acquiring a parameter mapping value and an authority description value mapped in the track section by the evaluation index change record; based on the parameter mapping value and the authority description value mapped in the track section by the evaluation index change record, carrying out second superposition on the node change track which is superposed for the first time, and generating an authority node updating track of the data authority updating track; and extracting node features corresponding to each authority node from the authority node updating track, determining a node feature sequence corresponding to the node features according to the sequence from small to large of feature dimensions of each group of node features, and generating the information security evaluation features based on evaluation labels existing in the node feature sequence.
It can be understood that through the contents described in the above steps S3221 to S3223, trajectory superposition and feature extraction can be performed on a plurality of continuous trajectory sections of the data authority updating trajectory, so as to determine a node feature sequence. Therefore, the information safety evaluation features can be completely generated based on the evaluation labels in the node feature sequence, and partial loss of the information safety evaluation features is avoided.
On the basis of the above-mentioned step S31-step S33, the method further includes: determining the information security evaluation feature from a second hotspot sharing request queue obtained currently, wherein the second hotspot sharing request queue and the first hotspot sharing request queue both contain the information security evaluation feature, and determining a current access authority request record of the information security evaluation feature; and caching the characteristic correction result when determining to perform characteristic correction aiming at the information security evaluation characteristic according to the current access authority request record of the information security evaluation characteristic. Therefore, by caching the characteristic correction results of the information security evaluation characteristics corresponding to different hotspot sharing request queues, accurate and rapid characteristic restoration can be realized through the cached characteristic correction results when the subsequent characteristics are lost, so that the interruption of the subsequent access verification is avoided.
In practical application, the inventor finds that different message transmission environments and message transmission behaviors need to be considered when determining the access intrusion detection result, so that the missed detection of the hotspot sharing request can be avoided. To improve this technical problem, the determining, based on the information security evaluation feature, an access intrusion detection result corresponding to the hotspot sharing request in each information communication network in the set of information communication networks, which is described in step S33, may further include the following steps S3311 to S3313.
Step S3311, determining a feature validity period and an information security label of an information security evaluation feature, determining a plurality of event label combinations according to a plurality of evaluation event labels in historical security evaluation results, performing label matching rate calculation according to the label association degree of each evaluation event label in each event label combination with the information security label in the feature validity period, obtaining a plurality of label matching rate calculation results respectively corresponding to the plurality of event label combinations, and taking a label heat weighted value of the event label combination corresponding to each label matching rate calculation result as a weighted value of each label matching rate calculation result.
Step S3312, based on the multiple label matching rate calculation results, respectively obtaining the message transmission records of each information communication network corresponding to the information security label determined in the feature validity period, obtaining multiple message transmission records, according to the weight value of each label matching rate calculation result, integrating the multiple message transmission records obtained based on the multiple label matching rate calculation results, obtaining a first message transmission record set, wherein the label heat weighted values between any two evaluation event labels in each event label combination are equal, the label heat weighted values corresponding to different event label combinations are different, each label matching rate calculation result is used for determining the access path risk rate corresponding to the hotspot sharing request in each information communication network corresponding to the information security label in any set time step length, and the label matching rate calculation result is obtained by calculating the label matching rate according to the historical safety evaluation result.
Step S3313, according to the historical security evaluation result and the access path risk rate of the multiple hotspot sharing requests corresponding to the information security label, acquiring a fusion identification result between the multiple hotspot sharing requests and the information security label within the feature validity period, and taking a target request message corresponding to the fusion identification result corresponding to the multiple hotspot sharing requests as a second message transmission record; and calculating the transmission record correlation degree of the first message transmission record set and the second message transmission record, and determining an access intrusion detection result corresponding to each hotspot sharing request according to the transmission record correlation degree and the access path risk rate of each hotspot sharing request.
Thus, by executing the steps S3311 to S3313, the feature validity period of the information security evaluation feature and the information security label can be analyzed and calculated, so as to determine the correlation degree of the transmission records between different message transmission records, and thus, the access intrusion detection result corresponding to each hotspot sharing request can be determined based on the correlation degree of the transmission records and the access path risk rate of each hotspot sharing request. Therefore, when the access intrusion detection result is determined, different message transmission environments and message transmission behaviors can be considered, and missing detection of the hotspot sharing request is avoided.
Further, on the basis of the step S3313, determining an access intrusion detection result corresponding to each hotspot sharing request according to the transmission record correlation and the access path risk rate of each hotspot sharing request may exemplarily include the following steps S3313 a-S3313 d.
Step S3313a, determining path node information of the sharing request transmission path corresponding to each hotspot sharing request based on the transmission record correlation, and determining access period information of each hotspot sharing request according to the risk triggering period of the access path risk rate of each hotspot sharing request in the corresponding information communication network; extracting a first description information list corresponding to the path node information and a second description information list corresponding to the access period information, and determining a plurality of information units with different feature description values respectively included in the first description information list and the second description information list; wherein the information unit is one piece of description information in the first description information list and the second description information list.
Step S3313b, on the premise that the list structure feature of the first description information list is the same as the list structure feature of the second description information list, obtaining the sharing request attribute information of the path node information in any information unit of the first description information list, and determining an information unit having the smallest feature description value in the second description information list as a target information unit in parallel; based on an encryption protocol of a request message field of each hotspot sharing request, adding the sharing request attribute information to the target information unit, and determining sharing request mapping information corresponding to the sharing request attribute information in the target information unit; and generating an information matching list between the path node information and the access period information according to request permission difference information between the sharing request attribute information and the sharing request mapping information.
Step S3313c, obtaining target execution function information in the target information unit with the sharing request mapping information as reference information, adding the target execution function information to the information unit where the sharing request attribute information is located according to a plurality of information matching paths corresponding to the information matching list, to obtain a function execution result corresponding to the target execution function information in the information unit where the sharing request attribute information is located, and determining the function execution result as an information access result according to the reference information; and the target execution function information is information of an execution function corresponding to the access action, and the information access result is used for representing the access result of the current hotspot sharing terminal.
Step S3313d, determining a corresponding information comparison result when the sharing request attribute information is added to the target information unit; according to the relevance between the function execution result and the field time sequence feature tags corresponding to the comparison nodes in the information comparison result, sequentially acquiring the intrusion detection tags corresponding to the information access result in the second description information list according to the sequence of time sequence weights from large to small, stopping acquiring the intrusion detection tags in the next information unit until the acquired information security level of the information unit where the intrusion detection tags are located is consistent with the information security level of the information access result in the first description information list, establishing the corresponding relation between the information access result and the intrusion detection tags acquired last time, and determining the access intrusion detection result corresponding to each hotspot sharing request based on the corresponding relation.
It is understood that, by executing the above-mentioned steps S3313 a-S3313 d, it is possible to determine the path node information of the sharing request transmission path corresponding to each hotspot sharing request based on the transmission record correlation degree, and determine the access period information of each hotspot sharing request through the risk triggering period of the access path risk rate of each hotspot sharing request in the corresponding information communication network. Therefore, the information matching list of the path node information and the access time interval information can be obtained, the corresponding relation between the information access result and the intrusion detection label obtained at the last time is established based on the information matching list, and the access intrusion detection result corresponding to each hotspot sharing request can be determined based on the corresponding relation. Therefore, the access intrusion detection result comprehensively considers the shared request transmission path and the access path risk rate, and the access intrusion detection result is difficult to tamper.
In some examples, the inventors have also found that in order to obtain an accurate and reliable identification result, it is necessary to consider the identification timeliness and the correlation between different detection tags accessing the intrusion detection result. To achieve the above object, the identifying the access intrusion detection result by using the preset artificial intelligence model described in step S33 to obtain the identification result may further include the following steps S3321 to S3325.
Step S3321, determining a timeliness index of a training set of a preset artificial intelligence model, updating the training set according to a recognition result of a previous period when the timeliness index does not reach a set index, inputting the access intrusion detection result into the preset artificial intelligence model when the timeliness index reaches the set index, and judging whether an early warning result output by the preset artificial intelligence model is received or not; and determining the previous period according to the set time step.
Step S3222, when an early warning result output by the preset artificial intelligence model is received, an authority detection thread is created according to the early warning result; and when the classification result corresponding to the intrusion detection classification label is output by a preset artificial intelligence model, determining the thread input parameters of the classification result corresponding to the intrusion detection classification label in the authority detection thread.
Step S3223, when it is determined that the thread input parameter of the classification result corresponding to the intrusion detection classification label in the authority detection thread is a dynamic input parameter or a static input parameter in a set category, directly loading the classification result corresponding to the intrusion detection classification label into a to-be-processed parameter set of the authority detection thread, or after loading the classification result corresponding to the intrusion detection classification label into a parameter conduction data set of a preset artificial intelligence model, conducting the classification result corresponding to the intrusion detection classification label into the to-be-processed parameter set of the authority detection thread through the preset artificial intelligence model; and operating the authority detection thread, and acquiring the access authority distribution information of the current hotspot sharing terminal, which is output after the authority detection thread extracts the authority list of the classification result.
Step S3324, determining the authority distribution record of the access authority distribution information and each authority verification code; and under the condition that the access authority distribution information contains the decryption label according to the authority distribution record, determining a correlation coefficient between each authority verification code under the encryption label of the access authority distribution information and each authority verification code under the decryption label of the access authority distribution information according to the authority verification code under the decryption label of the access authority distribution information and verification logic information thereof, and distributing the authority verification code under the encryption label of the access authority distribution information and the authority verification code under the decryption label to the decryption label.
Step S3325, extracting a first verification code queue corresponding to the authority verification code of the decryption tag and a second verification code queue corresponding to the authority verification code under the encryption tag, determining fusion queue characteristics of the first verification code queue and the second verification code queue, inputting the fusion queue characteristics into the preset artificial intelligence model, and obtaining an identification result of the preset artificial intelligence model for identifying and outputting the fusion queue characteristics.
It can be understood that by performing the above steps S3321 to S3325, the training set can be updated based on the timeliness index of the training set of the preset artificial intelligence model, thereby ensuring the recognition timeliness. The correlation coefficient of different authority verification codes under the decryption label and the encryption label can be considered, so that the correlation between different detection labels accessing the intrusion detection result is considered. Therefore, the identification result can be accurately and reliably obtained by integrating the identification timeliness and the correlation among different detection labels accessing the intrusion detection result.
In one possible example, the step S33 of accessing, according to the identification result, the target terminal that initiates the corresponding hotspot sharing request to the hotspot network corresponding to the current hotspot sharing terminal includes: and when the identification result represents that the corresponding hotspot sharing request has no abnormal access behavior, accessing the target terminal initiating the corresponding hotspot sharing request into a hotspot network corresponding to the current hotspot sharing terminal. Therefore, the information security of the current hotspot sharing terminal during hotspot sharing can be ensured.
In a conceivable embodiment, in order to continuously ensure the information security of the current hotspot sharing terminal when sharing the hotspot, on the basis of the above steps S31-S33, the following steps S34-S36 may be further included.
Step S34, monitoring a service processing process of the target terminal in the hotspot network, wherein in the process of monitoring the service processing process of the target terminal, an information invoking frequency of the target terminal in the hotspot network is determined.
Step S35, acquiring the current service interaction record corresponding to the service processing process of the target terminal based on the information calling frequency; extracting record updating information from the current business interaction record; and judging whether the interaction record in the current business interaction record has an interaction object change relative to the interaction record in the last business interaction record of the current business interaction record.
Step S36, if yes, determining the record update information extracted from the current service interaction record as the effective record update information of the current service interaction record; otherwise, overlapping the record updating information extracted from the current service interaction record with the effective record updating information of the last service interaction record at the corresponding time interval, and determining the overlapping result as the effective record updating information of the current service interaction record; when the abnormal access identification exists in the effective record updating information, sending prompt information to the current hotspot sharing terminal; the prompt message is used for indicating the current hotspot sharing terminal to intercept the hotspot sharing operation of the target terminal.
It can be understood that, by executing the steps S34 to S36, the valid record update information corresponding to the target terminal can be continuously monitored, so that when the abnormal access identifier is monitored, the current hotspot sharing terminal is instructed to intercept the hotspot sharing operation of the target terminal, and thus, the information security of the current hotspot sharing terminal when sharing the hotspot can be continuously ensured.
In an embodiment, the information communication network where the hotspot sharing request is determined from the obtained first hotspot sharing request queue as described in step S31 may be as described in the following steps S311 to S314.
Step S311, determining forwarding path information of each hotspot sharing request in the first hotspot sharing request queue according to the first hotspot sharing request queue; calculating and obtaining the request field of each hotspot sharing request in the first hotspot sharing request queue by using a preset communication network analysis model, and obtaining the field time sequence characteristics of each request field; wherein the field timing characteristics include dynamic timing characteristics and static timing characteristics.
Step S312, determining and obtaining the field timing characteristics of the mapping request field corresponding to each request field by using the pre-stored timing distribution record according to the field timing characteristics of each request field.
Step 313, according to the field timing characteristics of each request field and mapping request field, respectively determining whether the number of path nodes from each request field to the forwarding path information is greater than the number of path nodes from the corresponding mapping request field to the forwarding path information.
Step S314, if yes, acquiring the field time sequence characteristics of the mapping request field corresponding to the request field, and using the field time sequence characteristics as the field time sequence characteristics of the request field; if not, keeping the field time sequence characteristics of the request field unchanged; and determining the information communication network with the minimum time delay with the determined field time sequence characteristics of the request field as the information communication network where the hotspot sharing request corresponding to the request field is positioned.
In this way, based on the content described in the above steps S311 to S314, the information communication network where each hotspot sharing request is located can be accurately determined based on the timing delay.
FIG. 4 is a block diagram illustrating an exemplary big data and artificial intelligence based hotspot sharing device 140, according to some embodiments of the present application, the big data and artificial intelligence based hotspot sharing device 140 comprising the following functional modules.
The communication network grouping module 141 is configured to determine, from the obtained first hotspot sharing request queue, an information communication network where each hotspot sharing request is located; grouping the information communication networks according to the information authority security level of a request object among the hotspot sharing requests in different information communication networks to obtain at least one information communication network set; the information authority security level of a request object of the hotspot sharing request in any two information communication networks in the same information communication network set is greater than or equal to a set level.
A detection result determining module 142, configured to determine, for each information communication network set, information security evaluation features corresponding to the information communication network set from the first hotspot sharing request queue based on each information communication network in the information communication network set; the information security evaluation features at least comprise network security index data of each information communication network in the information communication network set, and the information security evaluation features are used for determining access intrusion detection results corresponding to hotspot sharing requests in each information communication network in the information communication network set.
The hotspot sharing access module 143 is configured to determine, based on the information security evaluation feature, an access intrusion detection result corresponding to a hotspot sharing request in each information communication network in the information communication network set, and identify the access intrusion detection result by using a preset artificial intelligence model to obtain an identification result; and according to the identification result, accessing the target terminal initiating the corresponding hotspot sharing request into a hotspot network corresponding to the current hotspot sharing terminal.
It will be appreciated that the above description of the apparatus embodiment may be referred to as the description of the method embodiment shown in figure 3.
Based on the same inventive concept, the following system embodiment is also provided.
A1. A hot spot sharing system based on big data and artificial intelligence comprises a big data cloud platform and a plurality of terminals which are communicated with each other; wherein the big data cloud platform is configured to:
determining the information communication network where each hotspot sharing request is located from the obtained first hotspot sharing request queue; grouping the information communication networks according to the information authority security level of a request object among the hotspot sharing requests in different information communication networks to obtain at least one information communication network set; the information authority security level of a request object of a hotspot sharing request in any two information communication networks in the same information communication network set is greater than or equal to a set level;
for each information communication network set, determining information security evaluation characteristics corresponding to the information communication network set from the first hotspot sharing request queue based on each information communication network in the information communication network set; the information security evaluation features at least comprise network security index data of each information communication network in the information communication network set, and the information security evaluation features are used for determining access intrusion detection results corresponding to hotspot sharing requests in each information communication network in the information communication network set;
determining access intrusion detection results corresponding to hotspot sharing requests in all information communication networks in the information communication network set based on the information security evaluation characteristics, and identifying the access intrusion detection results by adopting a preset artificial intelligence model to obtain identification results; and according to the identification result, accessing the target terminal initiating the corresponding hotspot sharing request into a hotspot network corresponding to the current hotspot sharing terminal.
It will be appreciated that the above description of the system embodiment may refer to the description of the method embodiment shown in figure 3.
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing detailed disclosure is to be considered merely illustrative and not restrictive of the broad application. Various modifications, improvements and adaptations to the present application may occur to those skilled in the art, although not explicitly described herein. Such modifications, improvements and adaptations are proposed in the present application and thus fall within the spirit and scope of the exemplary embodiments of the present application.
Also, this application uses specific terminology to describe embodiments of the application. Reference throughout this specification to "one embodiment," "an embodiment," and/or "some embodiments" means that a particular feature, structure, or characteristic described in connection with at least one embodiment of the present application is included in at least one embodiment of the present application. Therefore, it is emphasized and should be appreciated that two or more references to "an embodiment" or "one embodiment" or "an alternative embodiment" in various portions of this specification are not necessarily all referring to the same embodiment. Furthermore, some features, structures, or characteristics of at least one embodiment of the present application may be combined as appropriate.
In addition, those skilled in the art will recognize that the various aspects of the application may be illustrated and described in terms of several patentable species or contexts, including any new and useful combination of procedures, machines, articles, or materials, or any new and useful modifications thereof. Accordingly, various aspects of the present application may be embodied entirely in hardware, entirely in software (including firmware, resident software, micro-code, etc.) or in a combination of hardware and software. The above hardware or software may be referred to as a "unit", "component", or "system". Furthermore, aspects of the present application may be represented as a computer product, including computer readable program code, embodied in at least one computer readable medium.
The computer readable storage medium may comprise a propagated data signal with the computer program code embodied therewith, for example, on baseband or as part of a carrier wave. The propagated signal may take any of a variety of forms, including electromagnetic, optical, and the like, or any suitable combination. A computer-readable storage medium may be any computer-readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code on a computer readable storage medium may be propagated over any suitable medium, including radio, electrical cable, fiber optic cable, RF, or the like, or any combination of the preceding.
Computer program code required for the execution of aspects of the present application may be written in any combination of one or more programming languages, including object oriented programming, such as Java, Scala, Smalltalk, Eiffel, JADE, Emerald, C + +, C #, VB.NET, Python, and the like, or similar conventional programming languages, such as the "C" programming language, Visual Basic, Fortran 2003, Perl, COBOL 2002, PHP, ABAP, dynamic programming languages, such as Python, Ruby, and Groovy, or other programming languages. The programming code may execute entirely on the user's computer, as a stand-alone software package, partly on the user's computer, partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any network format, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or in a cloud computing environment, or as a service, such as a software as a service (SaaS).
Additionally, the order of the process elements and sequences described herein, the use of numerical letters, or other designations are not intended to limit the order of the processes and methods unless otherwise indicated in the claims. While various presently contemplated embodiments of the invention have been discussed in the foregoing disclosure by way of example, it should be understood that such detail is solely for that purpose and that the appended claims are not limited to the disclosed embodiments, but, on the contrary, are intended to cover all modifications and equivalent arrangements that are within the spirit and scope of the embodiments herein. For example, although the system components described above may be implemented by hardware means, they may also be implemented by software-only solutions, such as installing the described system on an existing server or mobile device.
It should also be appreciated that in the foregoing description of embodiments of the present application, various features are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure aiding in the understanding of at least one embodiment of the invention. However, this method of disclosure is not intended to require more features than are expressly recited in the claims. Indeed, the embodiments may be characterized as having less than all of the features of a single embodiment disclosed above.
Claims (7)
1. A hotspot sharing method based on big data and artificial intelligence is characterized by comprising the following steps:
aiming at each information communication network set, determining network area description data containing all information communication networks in the information communication network set from a first hotspot sharing request queue;
determining information safety evaluation characteristics according to the data authority updating track of the network area description data; the information security evaluation features at least comprise network security index data of each information communication network in the information communication network set, and the information security evaluation features are used for determining access intrusion detection results corresponding to hotspot sharing requests in each information communication network in the information communication network set;
wherein, updating the track according to the data authority of the network area description data to determine the information security evaluation characteristics, further comprises:
acquiring a plurality of continuous track sections of the data authority updating track, wherein one track section comprises a dynamic updating track and a dynamic correcting track under one authority evaluation index;
acquiring a node change track of the node parameter change record based on a parameter mapping value and an authority description value of the node parameter change record of the data authority update track in the track section; performing first superposition on the node change track recorded by the node parameter change and a set change track in a preset track database to generate a first superposed node change track; sampling and acquiring an evaluation index change record from a node identification section of the node change track superposed for the first time, wherein the node identification section is a section of the node parameter change record in the node change track superposed for the first time, and corresponds to an identification;
acquiring a parameter mapping value and an authority description value mapped in the track section by the evaluation index change record; based on the parameter mapping value and the authority description value mapped in the track section by the evaluation index change record, carrying out second superposition on the node change track which is superposed for the first time, and generating an authority node updating track of the data authority updating track; and extracting node features corresponding to each authority node from the authority node updating track, determining a node feature sequence corresponding to the node features according to the sequence from small to large of feature dimensions of each group of node features, and generating the information security evaluation features based on evaluation labels existing in the node feature sequence.
2. The method of claim 1,
before the step of determining, for each information communication network set, network area description data including all information communication networks in the information communication network set from the first hotspot sharing request queue, the method further includes:
determining the information communication network where each hotspot sharing request is located from the obtained first hotspot sharing request queue; grouping the information communication networks according to the information authority security level of a request object among the hotspot sharing requests in different information communication networks to obtain at least one information communication network set; the information authority security level of a request object of a hotspot sharing request in any two information communication networks in the same information communication network set is greater than or equal to a set level;
after the step of updating the trajectory determination information security evaluation feature in accordance with the data rights of the network area description data, the method further comprises:
determining access intrusion detection results corresponding to hotspot sharing requests in all information communication networks in the information communication network set based on the information security evaluation characteristics, and identifying the access intrusion detection results by adopting a preset artificial intelligence model to obtain identification results; and according to the identification result, accessing the target terminal initiating the corresponding hotspot sharing request into a hotspot network corresponding to the current hotspot sharing terminal.
3. The method of claim 2, wherein the information permission security level of the requested object between the hotspot sharing requests in different information communication networks is determined by:
extracting network parameter distribution corresponding to each information communication network from the first hotspot sharing request queue;
respectively inputting the network parameter distribution corresponding to each information communication network into a preset network parameter identification thread to obtain request description information of a hotspot sharing request in each information communication network;
and determining the information authority security level of a request object corresponding to the hot spot sharing request in each information communication network based on the request description information of each hot spot sharing request.
4. The method of claim 3, wherein the information authority security level of the request object corresponding to the hotspot sharing request in each information communication network is determined based on the request description information of each hotspot sharing request, further comprising:
acquiring a first request category attribute and a second request category attribute for each group of request description information; wherein the attribute heat value of the second request class attribute is less than the attribute heat value of the first request class attribute; determining the object user behavior characteristics of each group of request description information according to the attribute field characteristics of the second request type attributes, and acquiring the user behavior description information of each group of request description information from the first request type attributes according to the object user behavior characteristics; determining label consistency weights of the user behavior classification labels of the user behavior description information and each preset classification label in a preset classification label set; the preset classification label set comprises a plurality of preset classification labels, each preset classification label is provided with a classification correction weight, and the classification correction weight indicates that the request description information is legal information or abnormal information; selecting K preset classification labels from the preset classification label set based on the label consistency weight of the user behavior classification label and each preset classification label; wherein K is a positive integer greater than or equal to 1; determining whether the request description information is the legal information or the abnormal information based on the classification correction weight of K preset classification labels;
when the request description information is determined to be the legal information, determining a first request permission list corresponding to the request description information, and when the request description information is determined to be the abnormal information, determining a second request permission list corresponding to the request description information; performing list time sequence correction on the first request permission list or the second request permission list to obtain a third request permission list;
acquiring N types of list unit combinations of the third request permission list and a permission event set corresponding to each type of list unit combination, wherein each type of list unit combination comprises M different list information transmission paths, and N and M are positive integers greater than or equal to 1; determining the authority event transmission track corresponding to the list unit combination in the authority event set corresponding to the list unit combination; adopting the authority event transmission tracks corresponding to the list unit combination to carry out track trend identification to obtain path iteration data of each list information transmission path in the list unit combination; carrying out transmission track characteristic iteration on the authority event transmission track corresponding to the list unit combination based on the path iteration data of each list information transmission path in the N types of list unit combinations to obtain the authority event iteration track corresponding to the list unit combination; adding the authority event iteration track corresponding to the list unit combination into the authority event set corresponding to the list unit combination; returning and executing the step to determine the authority event transmission tracks corresponding to the list unit combinations in the authority event sets corresponding to the list unit combinations until the current fitting coefficients between the authority event transmission tracks corresponding to the N kinds of list unit combinations are larger than the target fitting coefficients;
when the current fitting coefficient between the authority event transmission tracks corresponding to the N kinds of list unit combinations is larger than a target fitting coefficient, fitting the authority event transmission tracks corresponding to the N kinds of list unit combinations to obtain a target transmission track; extracting a first track node with an information authority identifier and a second track node with an information security identifier in the target transmission track; respectively determining a first relative position weight of each first track node and a second relative position weight of each second track node; and calculating the weighted sum of the first relative position weight and the second relative position weight, and determining the information authority security level of the request object corresponding to each group of request description information according to the weighted sum result.
5. The method of claim 2, further comprising:
determining the information security evaluation feature from a second hotspot sharing request queue obtained currently, wherein the second hotspot sharing request queue and the first hotspot sharing request queue both contain the information security evaluation feature, and determining a current access authority request record of the information security evaluation feature;
and caching the characteristic correction result when determining to perform characteristic correction aiming at the information security evaluation characteristic according to the current access authority request record of the information security evaluation characteristic.
6. A big data cloud platform is characterized by comprising a processing engine, a network module and a memory; the processing engine and the memory communicate through the network module, the processing engine reading a computer program from the memory and operating to perform the method of any of claims 1-5.
7. A computer-readable storage medium, on which a computer program is stored which, when executed, implements the method of any one of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110531205.2A CN113347631A (en) | 2020-11-11 | 2020-11-11 | Hot spot sharing method based on big data and artificial intelligence and big data cloud platform |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110531205.2A CN113347631A (en) | 2020-11-11 | 2020-11-11 | Hot spot sharing method based on big data and artificial intelligence and big data cloud platform |
CN202011251126.8A CN112437439B (en) | 2020-11-11 | 2020-11-11 | Hot spot sharing method based on artificial intelligence and feature analysis and big data cloud platform |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011251126.8A Division CN112437439B (en) | 2020-11-11 | 2020-11-11 | Hot spot sharing method based on artificial intelligence and feature analysis and big data cloud platform |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113347631A true CN113347631A (en) | 2021-09-03 |
Family
ID=74699687
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110531213.7A Withdrawn CN113347632A (en) | 2020-11-11 | 2020-11-11 | Hot spot sharing method applied to artificial intelligence and big data cloud platform |
CN202011251126.8A Active CN112437439B (en) | 2020-11-11 | 2020-11-11 | Hot spot sharing method based on artificial intelligence and feature analysis and big data cloud platform |
CN202110531205.2A Withdrawn CN113347631A (en) | 2020-11-11 | 2020-11-11 | Hot spot sharing method based on big data and artificial intelligence and big data cloud platform |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110531213.7A Withdrawn CN113347632A (en) | 2020-11-11 | 2020-11-11 | Hot spot sharing method applied to artificial intelligence and big data cloud platform |
CN202011251126.8A Active CN112437439B (en) | 2020-11-11 | 2020-11-11 | Hot spot sharing method based on artificial intelligence and feature analysis and big data cloud platform |
Country Status (1)
Country | Link |
---|---|
CN (3) | CN113347632A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115221135A (en) * | 2022-07-21 | 2022-10-21 | 东营国图信息科技有限公司 | Industrial internet data sharing method and system |
CN116032669A (en) * | 2023-03-30 | 2023-04-28 | 联一信息技术(北京)有限公司 | Shared data privacy processing method and server combined with artificial intelligence |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113810487B (en) * | 2021-09-14 | 2022-07-19 | 浙江显峰科技有限公司 | Information identification system based on Internet of things technology |
CN114491554A (en) * | 2022-01-14 | 2022-05-13 | 北京国信网联科技有限公司 | Information security situation analysis method |
CN115203689B (en) * | 2022-07-25 | 2023-05-02 | 广州正则纬创信息科技有限公司 | Data security sharing method and system |
CN116796315B (en) * | 2023-07-18 | 2024-01-05 | 北京同星科技有限公司 | Terminal data real-time monitoring system based on internet |
CN117062192B (en) * | 2023-10-11 | 2023-12-12 | 深圳市微琪思网络有限公司 | Method and system for establishing wireless connection of electric iron based on artificial intelligence algorithm |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11043094B2 (en) * | 2016-06-08 | 2021-06-22 | Aerial Technologies Inc. | System and methods for smart intrusion detection using wireless signals and artificial intelligence |
CN109803264B (en) * | 2018-12-24 | 2022-04-29 | 奇安信科技集团股份有限公司 | Method and device for recognizing wireless intrusion |
CN111756692B (en) * | 2020-05-19 | 2021-05-14 | 中国科学院信息工程研究所 | Network security protection method and system |
-
2020
- 2020-11-11 CN CN202110531213.7A patent/CN113347632A/en not_active Withdrawn
- 2020-11-11 CN CN202011251126.8A patent/CN112437439B/en active Active
- 2020-11-11 CN CN202110531205.2A patent/CN113347631A/en not_active Withdrawn
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115221135A (en) * | 2022-07-21 | 2022-10-21 | 东营国图信息科技有限公司 | Industrial internet data sharing method and system |
CN115221135B (en) * | 2022-07-21 | 2023-05-09 | 陕西合友网络科技有限公司 | Sharing method and system for industrial Internet data |
CN116032669A (en) * | 2023-03-30 | 2023-04-28 | 联一信息技术(北京)有限公司 | Shared data privacy processing method and server combined with artificial intelligence |
CN116032669B (en) * | 2023-03-30 | 2023-07-25 | 联一信息技术(北京)有限公司 | Shared data privacy processing method and server combined with artificial intelligence |
Also Published As
Publication number | Publication date |
---|---|
CN113347632A (en) | 2021-09-03 |
CN112437439A (en) | 2021-03-02 |
CN112437439B (en) | 2021-08-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112437439B (en) | Hot spot sharing method based on artificial intelligence and feature analysis and big data cloud platform | |
ES2808954T3 (en) | Procedure and device for use in risk management of application information | |
CN107943949B (en) | Method and server for determining web crawler | |
CN111652615B (en) | Safety identification method based on block chain big data and artificial intelligence cloud service platform | |
CN114610773A (en) | Data application scene recognition method based on big data and cloud computing server | |
CN108734012A (en) | Malware recognition methods, device and electronic equipment | |
CN112615865B (en) | Data anti-intrusion method based on big data and artificial intelligence and big data server | |
CN104158828B (en) | The method and system of suspicious fishing webpage are identified based on cloud content rule base | |
CN110912874B (en) | Method and system for effectively identifying machine access behaviors | |
CN112685774B (en) | Payment data processing method based on big data and block chain finance and cloud server | |
CN115238828A (en) | Chromatograph fault monitoring method and device | |
CN116980162A (en) | Cloud audit data detection method, device, equipment, medium and program product | |
CN112528306A (en) | Data access method based on big data and artificial intelligence and cloud computing server | |
CN112653697A (en) | Access request processing method based on cloud computing and block chain and cloud service center | |
CN112686667A (en) | Data processing method based on big data and block chain and cloud service platform | |
CN112486969A (en) | Data cleaning method applied to big data and deep learning and cloud server | |
CN116049822A (en) | Application program supervision method, system, electronic device and storage medium | |
CN112330312B (en) | Data processing method based on block chain payment and facial recognition and big data platform | |
CN114168949A (en) | Application software anomaly detection method and system applied to artificial intelligence | |
CN113590180A (en) | Detection strategy generation method and device | |
CN113326269A (en) | Asset identification method, equipment, device and computer readable storage medium | |
CN112465503B (en) | Information security protection method based on internet finance and biological recognition and cloud platform | |
CN118094640B (en) | Data security transmission monitoring system and method based on AI federal learning | |
CN112070500B (en) | Block chain payment processing method based on digital financial service and cloud computing center | |
CN116628637A (en) | Unauthorized software identification method and device, electronic equipment, medium and product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20210903 |
|
WW01 | Invention patent application withdrawn after publication |