CN113973005A - Data processing system for computer software development - Google Patents

Data processing system for computer software development Download PDF

Info

Publication number
CN113973005A
CN113973005A CN202111104497.8A CN202111104497A CN113973005A CN 113973005 A CN113973005 A CN 113973005A CN 202111104497 A CN202111104497 A CN 202111104497A CN 113973005 A CN113973005 A CN 113973005A
Authority
CN
China
Prior art keywords
data
processing system
database
receiving end
analysis
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111104497.8A
Other languages
Chinese (zh)
Inventor
向鹏飞
张庭城
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Pengcheng Information Technology Co ltd
Original Assignee
Hunan Pengcheng Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Pengcheng Information Technology Co ltd filed Critical Hunan Pengcheng Information Technology Co ltd
Priority to CN202111104497.8A priority Critical patent/CN113973005A/en
Publication of CN113973005A publication Critical patent/CN113973005A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/024Standardisation; Integration using relational databases for representation of network management data, e.g. managing via structured query language [SQL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data processing system for computer software development, which relates to the technical field of software development, and comprises a data processing system in a software program, wherein the data processing system comprises a data collection module: the data transmission module is used for collecting and acquiring data: the data processing module is used for safely transmitting data, establishing a corresponding database, and processing the data in the database for analysis and processing; the data transmission module comprises a data sending end and a data receiving end, data are transmitted between the data sending end and the data receiving end in an encryption mode, a software program sends data instructions for increasing and deleting and checking to the database to modify the content of the database, misuse detection is adopted to carry out encryption protection on the database, a data analysis model is adopted to analyze and process the data, and the data analysis model is applied in practice.

Description

Data processing system for computer software development
Technical Field
The invention belongs to the technical field of software development, and particularly relates to a data processing system for computer software development.
Background
In the era of the internet of things, the internet of things is an extension of the internet, terminals of the internet are computers, all running programs are data processing and data transmission in the computers and the network, except the computers, no other terminal is involved, the internet of things is the nature of the internet, the terminals are no longer computers, but embedded computer systems and sensors matched with the embedded computer systems, the inevitable result of the development of computer technology is that the computers for human service present various forms, such as wearing equipment, environment monitoring equipment, virtual reality equipment and the like, the internet of things is called as long as hardware or products are connected with the internet and data interaction occurs, so that data in the internet of things becomes particularly important, the data refers to symbols for recording and identifying objective events, and are physical symbols or combinations of the physical symbols for recording the properties, the states, the interrelations and the like of objective objects, it is a recognizable and abstract symbol, which not only refers to the number in the narrow sense, but also refers to the character, letter, the combination of the number symbols, the figure, the image, the video, the audio, etc. with certain meaning, and also refers to the abstract representation of the attribute, the quantity, the position and the mutual relation of the objective things, in the computer science, the data is the general name of the medium of all the symbols which can be input into the computer and processed by the computer program, and is the general name of the number, the letter, the symbol and the analog quantity, etc. with certain meaning, the object of the computer storage and process is very extensive, the data is the representation form and the carrier of the information, which can be the symbol, the character, the number, the voice, the image, the video, etc., and the information is the connotation of the data, the information is loaded on the data, the meaningful interpretation is made to the data, the data and the information are inseparable, information is expressed in dependence on data, which animates the embodied information. The data is a symbol, is physical, and the information is data which is obtained after processing the data and has influence on decision, and is logical and conceptual; data is a representation of information, which is a meaningful representation of data. The data is an expression and a carrier of the information, the information is the connotation of the data and is a relation between form and quality, the data has no meaning, the data is the information only when the data affects the entity behavior, and a data processing system is needed when any software is involved in data processing.
The data processing system for embedded software evaluation management proposed by CN103106135A includes a processor, a data collector, a real-time database and a comparator, where the data collector is used as a signal input of the data processing system to collect relevant data of the processor running embedded software, a signal output end of the data collector is connected to corresponding signal input ends of the real-time database and the comparator respectively, another signal input end of the comparator is connected to a signal output end of the real-time database, and a signal output end of the comparator is connected to a corresponding signal input end of the processor.
In the process of data transmission and data storage, the existing data processing system has no protective measures or has low protective measure level, so that data is easily and maliciously modified by illegal users, the data analysis and processing result is inaccurate, and economic loss is caused.
Disclosure of Invention
The invention aims to provide a data processing system for computer software development, which solves the problem of poor data transmission and data storage encryption effects in the existing software development data processing system.
In order to solve the technical problems, the invention is realized by the following technical scheme:
the invention relates to a data processing system for computer software development, which comprises a data processing system in a software program, wherein the data processing system comprises a data collection module: the data transmission module is used for collecting and acquiring data: the data processing module is used for safely transmitting data, establishing a corresponding database and analyzing and processing the data in the database;
the data transmission module comprises a data sending end and a data receiving end, and data is encrypted and transmitted between the data sending end and the data receiving end;
the software program sends out data instructions for increasing, deleting, modifying and checking the database content, adopts misuse detection to carry out encryption protection on the database, adopts a data analysis model to analyze and process data, concentrates and extracts information hidden in disordered data, further finds out the internal rules of the data, and applies the internal rules to practice.
Preferably, the way of processing the disordered data and acquiring the intrinsic laws and characteristics of the data in the data analysis model comprises the following ways:
and (3) data dimension reduction: for reducing the dimensionality involved in data computation and modeling;
and (3) data regression: researching data analysis of the variable X on the dependent variable Y, and finding out the relevance and the induction data of the data;
data clustering: the cluster analysis method is a mode of dividing a plurality of statistical data with similar characteristics into consistent types and converting the consistent types into corresponding types;
data classification: analyzing the type and the category of the data according to measurement and analysis of a training set of a known type;
data association: finding useful association rules in a large number of sets of multivariate data, and also for mining relationships between various data based on time series;
time series of data: the time series is used for researching an algorithm of the data changing along with the time;
abnormal data detection: abnormal data in a data set is called abnormal points, abnormal values or isolated points, and is typically characterized in that the characteristics or rules of the data are inconsistent with most data and show abnormal characteristics, the noise value of the data is found through abnormal data detection,
preferably, the content information in the big data is obtained through corresponding data analysis operation, the deep information of the corresponding data is obtained, and the running of the software is realized according to the deep information
Preferably, the data in the data collection module comprises data entered by a peripheral device and internal data continuously generated in the software running process, browsing data generated by each user in the browsing process in the software running process and corresponding time data further generate mass data, the data becomes information after generating a certain function, and the information is used as productivity to facilitate the generation of economic benefits.
Preferably, the data transmitting end is connected with the database, the data receiving end is connected with the display device, the data is encrypted by adopting an asymmetric encryption algorithm when being transmitted from the data transmitting end to the data receiving end, and the data is encrypted in data transmission through the asymmetric encryption algorithm, so that the safety of data transmission is ensured, malicious monitoring and illegal modification in the data transmission process are effectively prevented, the software operation error is further prevented, and the safety of software operation is improved.
Preferably, the data sending end generates a pair of first public and private keys, the first public key is public to the outside, the first private key is retained by the data sending end, the data receiving end generates a pair of second public and private keys, the second public key is public to the outside, the second private key is retained by the data receiving end, the public keys and the private keys are opposite to each other, the data encrypted by each public key can only be decrypted by the corresponding private key, and the tamper resistance of the data is greatly ensured.
Preferably, the data receiving end sends a data obtaining request instruction to the data sending end, the data request instruction, the request instruction contains a data mark which needs to be obtained by a data receiving end, the request instruction is encrypted by a first public key, the data sending end obtains the encrypted request instruction and decrypts the data instruction by a first private key, searching corresponding data from the database according to the data mark in the request instruction, and encrypting the data through a second private key, and sends it to the data receiving end, which decrypts the data according to the second private key, displays the data, encrypts the data according to the public key, the public key is internally stored with a private signature of a data acquisition party, the private signature is internally provided with corresponding information characteristics, all sent information is completely retained, and data transmission records are inquired in time through the retained information, so that the safety of data transmission is ensured.
Preferably, the database is an SQL database, and is protected by a firewall and misuse detection, the misuse detection is performed by applying a known attack method according to a defined illegal intrusion pattern, the illegal intrusion pattern utilizes the vulnerability of the system, the characteristics of the illegal intrusion pattern are determined by analyzing the characteristics, conditions, arrangements and inter-event relations of the intrusion process, whether the illegal intrusion occurs in the database is detected by judging whether the intrusion patterns occur, if so, the illegal intrusion occurs, the security of the database is ensured by protecting the database, software running data is stored in the database, the data leakage is avoided, and the economic loss caused by software is avoided.
Preferably, the data analysis model is an entity model of a statistical data view, the model generally refers to an entity model of a category such as statistical analysis or big data mining, deep learning, artificial intelligence technology, and the like, and the data analysis model is used for analyzing and processing mass data in the database, acquiring corresponding information through data model processing, and acquiring corresponding economic benefits through information.
Preferably, the required result is obtained after the analysis data is processed through the data analysis model, and the computer software performs corresponding operation according to the data analysis result.
Preferably, the processing system runs on a computer, a database in the processing system is stored in a computer memory, all instructions in the data processing system are processed by a computer CPU, data transmission in the data processing system is transmitted by a bus, a computer receiving end and a display data analysis result are displayed by a display, and normal running of software is guaranteed through computer hardware equipment, so that stable running of the data processing system is guaranteed.
The invention has the following beneficial effects:
1. the data is encrypted and transmitted by the asymmetric encryption algorithm when being transmitted in the database and the display terminal, so that the confidentiality and the safety of data transmission in the data processing system are ensured, the data is effectively prevented from being illegally changed and illegally checked in the data transmission process, the abnormal operation of the data processing system is avoided, and the loss caused by software operation is avoided.
2. According to the invention, through establishing a protection method mainly based on misuse detection, whether the database is subjected to illegal invasion again is judged by judging whether the invasion event characteristics of the previous database occur again, so that the database is efficiently prevented from being invaded illegally, the safety of the database is ensured, the database processing system normally operates, and the data encryption protection measures are carried out in places where data are easy to leak, so that the safe operation of the data processing system is effectively ensured, and further, the software program is enabled to operate safely.
3. According to the invention, the big data is analyzed and processed, the information hidden in the disordered data is concentrated and extracted, the internal rule of the data is further found, the deep information of the big data is analyzed and processed, and corresponding measures are taken according to the information, so that the maximum economic benefit is obtained with the minimum investment, and the result of data analysis and processing is fully utilized.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a system block diagram of a data processing system for computer software development in accordance with the present invention;
FIG. 2 is a flow chart of the operation of a data transfer module in a data processing system for computer software development according to the present invention;
FIG. 3 is a system block diagram of a data processing module in a data processing system for computer software development in accordance with the present invention;
FIG. 4 is a system block diagram of a data acquisition module in a data processing system for computer software development in accordance with the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments, and all other embodiments obtained by a person of ordinary skill in the art without creative efforts based on the embodiments of the present invention belong to the protection scope of the present invention.
In the description of the present invention, it is to be understood that the terms "upper", "middle", "outer", "inner", "lower", "around", and the like, indicate orientations or positional relationships, are used merely to facilitate the description of the present invention and to simplify the description, and do not indicate or imply that the referenced components or elements must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be taken as limiting the present invention.
Referring to fig. 1-4, the present invention is a data processing system for computer software development, including a data processing system in a software program, the data processing system including a data collection module: the data transmission module is used for collecting and acquiring data: the data processing module is used for safely transmitting data, establishing a corresponding database, and processing the data in the database for analysis and processing;
the data transmission module comprises a data sending end and a data receiving end, and data is encrypted and transmitted between the data sending end and the data receiving end;
the software program sends out data commands of increasing, deleting, modifying and checking to the database, the content of the database is modified, misuse detection is adopted to carry out encryption protection on the database, a data analysis model is adopted to analyze and process the data, information hidden in disordered data is concentrated and extracted, the internal rules of the data are found out, and the data are applied in practice.
The mode of processing disordered data and acquiring the internal rules and characteristics of the data in the data analysis model comprises the following modes:
and (3) data dimension reduction: for reducing the dimensionality involved in data computation and modeling;
and (3) data regression: researching data analysis of the variable X on the dependent variable Y, and finding out the relevance and the induction data of the data;
data clustering: the cluster analysis method is a mode of dividing a plurality of statistical data with similar characteristics into consistent types and converting the consistent types into corresponding types;
data classification: analyzing the type and the category of the data according to measurement and analysis of a training set of a known type;
data association: finding useful association rules in a large number of sets of multivariate data, and also for mining relationships between various data based on time series;
time series of data: the time series is used for researching an algorithm of the data changing along with the time;
abnormal data detection: abnormal data in a data set is called abnormal points, abnormal values or isolated points, and is typically characterized in that the characteristics or rules of the data are inconsistent with most data and show abnormal characteristics, the noise value of the data is found through abnormal data detection,
acquiring content information in big data through corresponding data analysis operation, acquiring corresponding data deep information, and realizing software operation according to the deep information
The data in the data collection module comprises data input by peripheral equipment and internal data continuously generated in software operation, browsing data and corresponding time data generated by each user in the browsing process in the software operation further generate mass data, the data is changed into information after a certain action is generated, and the information is used as productivity to facilitate economic benefit.
The data transmission system comprises a data transmitting end, a data receiving end, a data base and a display device, wherein the data transmitting end is connected with the data base, the data receiving end is connected with the display device, data are encrypted by an asymmetric encryption algorithm when being transmitted from the data transmitting end to the data receiving end, the data are encrypted in data transmission through the asymmetric encryption algorithm, the safety of data transmission is guaranteed, malicious monitoring and illegal modification in the data transmission process are effectively prevented, further, software operation errors are prevented, and the safety of software operation is improved.
The data receiving end generates a pair of second public and private keys, the second public key is open to the outside, the second private key is retained by the data receiving end, the public keys and the private keys are opposite to each other, the data encrypted by each public key can be decrypted only through the corresponding private key, and the data can be greatly prevented from being tampered.
The data receiving end sends a data acquisition request instruction to the data sending end, the data request instruction contains a data mark which needs to be acquired by the data receiving end, the request instruction is encrypted through a first public key, the data sending end acquires the encrypted request instruction and decrypts the data instruction through a first private key, corresponding data are searched from a database according to the data mark in the request instruction, the data are encrypted through a second private key and sent to the data receiving end, the data receiving end decrypts the data according to the second private key and displays the data, the data are encrypted according to the public key, a private signature of a data acquisition party is stored in the public key, corresponding information characteristics are stored in the private signature, all sent information is stored, data transmission records are inquired in time through the stored information, and then the safety of data transmission is ensured.
The database is an SQL database, a firewall and misuse detection are adopted for protection, misuse detection is realized by applying a known attack method, according to a defined illegal invasion mode, the illegal invasion mode utilizes the vulnerability of a system, the characteristics of the illegal invasion mode are determined by analyzing the characteristics, conditions, arrangement and inter-event relation of an invasion process, whether illegal invasion occurs in the database is detected by judging whether the invasion modes occur, if so, the illegal invasion occurs, the safety of the database is ensured by protecting the database, software operation data are stored in the database, the data leakage is avoided, and the economic loss caused by software is avoided.
The data analysis model is an entity model of a statistical data view angle, generally refers to entity models of the types of statistical analysis or big data mining, deep learning, artificial intelligence technology and the like, and is used for analyzing and processing mass data in a database, acquiring corresponding information through data model processing, and acquiring corresponding economic benefits through the information.
Wherein, the data analysis model comprises the following steps: for reducing the dimensionality involved in data computation and modeling, data regression: researching data analysis of the variable X on the dependent variable Y, finding out relevance and induced data of the data, and clustering the data: the cluster analysis method is a mode of dividing a plurality of statistical data with similar characteristics into consistent types and finally converting the consistent types into a plurality of classes, and data classification: analyzing the type and the category of new statistical data according to measurement and analysis of a training set of a known type, and associating the data: useful association rules are found in a large number of sets of multivariate data, and are also used to mine the relationships between various data based on time series: the inter-sequence is an algorithm for studying the time-dependent changes of data, abnormal data detection: abnormal data in the data set are called abnormal points, abnormal values or isolated points, the characteristic features are that the features or rules of the data are inconsistent with most of the data and show abnormal features, the noise value of the data is found out through abnormal data detection, content information in the big data is obtained through corresponding data analysis operation, corresponding data deep information is obtained, and the operation of software is realized according to the deep information.
The computer software performs corresponding operations according to the data analysis result.
The processing system runs on a computer, a database in the processing system is stored in a computer memory, all instructions in the data processing system are processed by a computer CPU, data transmission in the data processing system is transmitted by a bus, a computer receiving end and a display data analysis result are displayed by a display, normal running of software is guaranteed through computer hardware equipment, and stable running of the data processing system is guaranteed.
While the preferred embodiments of the present invention have been disclosed for illustrative purposes only, and not for purposes of limiting the same to all details, it is to be understood that numerous modifications and variations may be made in the details of the present disclosure, which were chosen and described in order to best explain the principles of the invention and the practical application, thereby enabling others skilled in the art to best understand and utilize the invention, the invention being limited only by the claims and their full scope and equivalents.

Claims (10)

1. A data processing system for computer software development, comprising a data processing system running within a software program, the data processing system comprising a data collection module: the data transmission module is used for collecting and acquiring data: the data processing module is used for safely transmitting data, establishing a corresponding database and analyzing and processing the data in the database;
the data transmission module comprises a data sending end and a data receiving end, and data is encrypted and transmitted between the data sending end and the data receiving end;
the software program sends out data instructions for increasing, deleting, modifying and checking the database content, adopts misuse detection to carry out encryption protection on the database, adopts a data analysis model to analyze and process the data, concentrates and extracts the information hidden in the disordered data, further finds out the internal rules and characteristics of the data and applies to the reality.
2. The data processing system for computer software development according to claim 1, wherein the manner of processing the scrambled data and obtaining the intrinsic regularity and characteristics of the data in the data analysis model comprises the following manner:
and (3) data dimension reduction: for reducing the dimensionality involved in data computation and modeling;
and (3) data regression: researching data analysis of the variable X on the dependent variable Y, and finding out the relevance and the induction data of the data;
data clustering: the cluster analysis method is a mode of dividing a plurality of statistical data with similar characteristics into consistent types and converting the consistent types into corresponding types;
data classification: analyzing the type and the category of the data according to measurement and analysis of a training set of a known type;
data association: finding useful association rules in a large number of sets of multivariate data, and also for mining relationships between various data based on time series;
time series of data: the time series is used for researching an algorithm of the data changing along with the time;
abnormal data detection: abnormal data in the data set is called abnormal points, abnormal values or isolated points, and is typically characterized in that the characteristics or rules of the data are inconsistent with most data and show abnormal characteristics, and the noise value of the data is found through abnormal data detection.
3. A data processing system for computer software development according to claim 1, wherein the data in the data collection module includes data entered by a peripheral and intrinsic data generated continuously during software execution.
4. The data processing system for computer software development according to claim 1, wherein the data sending end is connected to the database, the data receiving end is connected to the display device, and the data is encrypted by using an asymmetric encryption algorithm when the data is sent from the data sending end to the data receiving end.
5. The data processing system for computer software development according to claim 3, wherein the data sending end generates a pair of first public and private keys, the first public key is open to the outside, the first private key is retained by the data sending end, the data receiving end generates a pair of second public and private keys, the second public key is open to the outside, and the second private key is retained by the data receiving end.
6. The data processing system of claim 4, wherein the data receiving end sends a data obtaining request command to the data sending end, the request command contains a data mark that the data receiving end needs to obtain, the request command is encrypted by the first public key, the data sending end obtains the encrypted request command and decrypts the data command by the first private key, corresponding data is searched from the database according to the data mark in the request command, the data is encrypted by the second private key and sent to the data receiving end, and the data receiving end decrypts the data according to the second private key and displays the data.
7. The data processing system of claim 1, wherein the database is a SQL database, and is protected by a firewall and misuse detection, the misuse detection is performed by applying a known attack method according to a defined illegal intrusion pattern, the illegal intrusion pattern utilizes the vulnerability of the system, the characteristics of the illegal intrusion pattern are determined by analyzing the characteristics, conditions, arrangements and relationships between events of the intrusion process, and whether the database is illegally intruded is detected by judging whether the intrusion patterns occur.
8. A data processing system for computer software development according to claim 1, wherein the data analysis model is a statistical data perspective entity model, the model being a statistical analysis, big data mining, deep learning, artificial intelligence technique entity model, the data analysis model being for analyzing and processing a large amount of data within a database.
9. The data processing system of claim 8, wherein the computer software performs the corresponding operation according to the data analysis result after processing the analysis data through the data analysis model to obtain the required result.
10. The data processing system for computer software development according to claim 9, wherein the processing system runs on a computer, the database in the processing system is stored in a computer memory, all instructions in the data processing system are processed by a computer CPU, data transmission in the data processing system is transmitted by a bus, and a computer receiving end and display data analysis results are displayed by a display.
CN202111104497.8A 2021-09-22 2021-09-22 Data processing system for computer software development Pending CN113973005A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111104497.8A CN113973005A (en) 2021-09-22 2021-09-22 Data processing system for computer software development

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111104497.8A CN113973005A (en) 2021-09-22 2021-09-22 Data processing system for computer software development

Publications (1)

Publication Number Publication Date
CN113973005A true CN113973005A (en) 2022-01-25

Family

ID=79586683

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111104497.8A Pending CN113973005A (en) 2021-09-22 2021-09-22 Data processing system for computer software development

Country Status (1)

Country Link
CN (1) CN113973005A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030188189A1 (en) * 2002-03-27 2003-10-02 Desai Anish P. Multi-level and multi-platform intrusion detection and response system
US20060191010A1 (en) * 2005-02-18 2006-08-24 Pace University System for intrusion detection and vulnerability assessment in a computer network using simulation and machine learning
US20140156588A1 (en) * 2012-11-30 2014-06-05 Symantec Corporation Systems and methods for performing customized large-scale data analytics
US20170206339A1 (en) * 2014-07-23 2017-07-20 Siemens Healthcare Gmbh Method and data processing system for data collection for a clinical study
WO2018088985A1 (en) * 2016-11-09 2018-05-17 Limited Liability Company "Innovation Development Hub" Information and telecommunication monitoring system, method of data monitoring and processing, and computer-readable data carrier
CN109992961A (en) * 2019-03-07 2019-07-09 北京华安普特网络科技有限公司 Detection system and method for the anti-hacker attacks of Database Systems
CN110213283A (en) * 2019-06-11 2019-09-06 山东管理学院 A kind of trade economy information interconnected network transmission method
CN110691064A (en) * 2018-09-27 2020-01-14 国家电网有限公司 Safety access protection and detection system for field operation terminal
CN112910923A (en) * 2021-03-04 2021-06-04 麦荣章 Intelligent financial big data processing system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030188189A1 (en) * 2002-03-27 2003-10-02 Desai Anish P. Multi-level and multi-platform intrusion detection and response system
US20060191010A1 (en) * 2005-02-18 2006-08-24 Pace University System for intrusion detection and vulnerability assessment in a computer network using simulation and machine learning
US20140156588A1 (en) * 2012-11-30 2014-06-05 Symantec Corporation Systems and methods for performing customized large-scale data analytics
US20170206339A1 (en) * 2014-07-23 2017-07-20 Siemens Healthcare Gmbh Method and data processing system for data collection for a clinical study
WO2018088985A1 (en) * 2016-11-09 2018-05-17 Limited Liability Company "Innovation Development Hub" Information and telecommunication monitoring system, method of data monitoring and processing, and computer-readable data carrier
CN110691064A (en) * 2018-09-27 2020-01-14 国家电网有限公司 Safety access protection and detection system for field operation terminal
CN109992961A (en) * 2019-03-07 2019-07-09 北京华安普特网络科技有限公司 Detection system and method for the anti-hacker attacks of Database Systems
CN110213283A (en) * 2019-06-11 2019-09-06 山东管理学院 A kind of trade economy information interconnected network transmission method
CN112910923A (en) * 2021-03-04 2021-06-04 麦荣章 Intelligent financial big data processing system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
李芳: "提升入侵检测系统效率的设计与实现", 山西煤炭管理干部学院学报, no. 04, 25 November 2015 (2015-11-25), pages 213 - 215 *
许颖;孙琦: "计算机数据库入侵检测技术的应用分析", 电子技术与软件工程, no. 15, 28 July 2016 (2016-07-28), pages 235 - 236 *
鲜永菊: "入侵检测", 31 August 2009, 西安电子科技大学出版社, pages: 3 *

Similar Documents

Publication Publication Date Title
Biermann et al. A comparison of intrusion detection systems
US7564969B2 (en) Methodology, system and computer readable medium for detecting file encryption
Singh et al. User behavior profiling using ensemble approach for insider threat detection
CN114003903B (en) Network attack tracing method and device
Salem et al. Masquerade attack detection using a search-behavior modeling approach
Toffalini et al. Detection of masqueraders based on graph partitioning of file system access events
Kim et al. Byte frequency based indicators for crypto-ransomware detection from empirical analysis
CN112817877B (en) Abnormal script detection method and device, computer equipment and storage medium
Ketepalli et al. Data Preparation and Pre-processing of Intrusion Detection Datasets using Machine Learning
Leckie et al. Metadata for anomaly-based security protocol attack deduction
CN111639355A (en) Data security management method and system
CN112215622A (en) Risk prevention and control method and system based on order information
Pang et al. Mineauth: Mining behavioural habits for continuous authentication on a smartphone
CN113973005A (en) Data processing system for computer software development
CN116028953A (en) Data encryption method based on privacy calculation
Kovalchuk et al. A practical proposal for ensuring the provenance of hardware devices and their safe operation
Xu et al. A fast detection method of network crime based on user portrait
Li et al. DPIF: a framework for distinguishing unintentional quality problems from potential shilling attacks
Malek et al. User Behaviour based Intrusion Detection System Overview
Zhang et al. PMP: Privacy-aware matrix profile against sensitive pattern inference for time series
Ganz et al. Detecting Backdoors in Collaboration Graphs of Software Repositories
Babu et al. Network intrusion detection using machine learning algorithms
Rajput et al. Data mining based database intrusion detection system: a survey
Zhu et al. Bs-net: A behavior sequence network for insider threat detection
CN117557270B (en) Mobile terminal secure payment management method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination