CN115396238A - Big data security evaluation analysis system and method - Google Patents

Big data security evaluation analysis system and method Download PDF

Info

Publication number
CN115396238A
CN115396238A CN202211330505.5A CN202211330505A CN115396238A CN 115396238 A CN115396238 A CN 115396238A CN 202211330505 A CN202211330505 A CN 202211330505A CN 115396238 A CN115396238 A CN 115396238A
Authority
CN
China
Prior art keywords
data
classification
detection data
central point
safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211330505.5A
Other languages
Chinese (zh)
Other versions
CN115396238B (en
Inventor
陈雅琳
赖成宾
彭远吉
张少校
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongfu Information Co Ltd
Original Assignee
Zhongfu Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongfu Information Co Ltd filed Critical Zhongfu Information Co Ltd
Priority to CN202211330505.5A priority Critical patent/CN115396238B/en
Publication of CN115396238A publication Critical patent/CN115396238A/en
Application granted granted Critical
Publication of CN115396238B publication Critical patent/CN115396238B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/04Processing captured monitoring data, e.g. for logfile generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Environmental & Geological Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a big data security assessment analysis system and method, mainly relates to the technical field of security assessment, and aims to solve the problem that existing big data security assessment is inaccurate. The method comprises the following steps: the acquisition module is used for acquiring the running state data of the detection data to create a data safety information table; the classification module is used for classifying the data in the data safety information table according to a preset classification algorithm to obtain a classification result; calculating the class coefficient of each classification; the statistical module is used for obtaining the category number of each category according to the classification result; the evaluation module is used for determining a security evaluation attribute value corresponding to the detection data according to the security evaluation data of the detection data in the data security information table; and determining the safety degree of the detection data according to the safety evaluation attribute value, the category coefficient and the category number. According to the method, the safety evaluation accuracy of the big data is improved.

Description

Big data security evaluation analysis system and method
Technical Field
The application relates to the technical field of big data security assessment, in particular to a big data security assessment-based analysis system and method.
Background
The big data safety assessment is a support guarantee for ensuring that the big data can safely provide services, aims to verify and assess the effectiveness, performance and the like of all safety strategies, safety products and safety technologies for protecting the big data, and ensures that all used safety protection means can meet the requirement of big data safety protection.
The currently common big data security assessment method comprises the following steps: firstly, vulnerability assessment, a vulnerability scanner and other automation tools scan big data application to find out security vulnerabilities, and then analyze and assess the safety of big data; and secondly, permeability test, which is to use various means to attack the big data application so as to find out the security vulnerability of the big data and further analyze and evaluate the safety of the big data.
However, the prior art solutions also have different degrees of defects while realizing the functions: the first scheme depends on accurate definition and elaboration of a vulnerability database, and is difficult to form comprehensive evaluation on the security of big data; the second scheme focuses on evaluating the security of the network system, and the evaluation on the security of the big data is not comprehensive.
Disclosure of Invention
In view of the above-mentioned deficiencies of the prior art, the present invention provides a system and a method for security assessment and analysis based on big data, so as to solve the above-mentioned technical problems.
In a first aspect, the present application provides a big data security assessment-based analysis system, which includes: the acquisition module is used for acquiring the running state data of the detection data to create a data safety information table; the classification module is used for classifying the data in the data safety information table according to a preset classification algorithm to obtain a classification result; calculating the class coefficient of each classification; the statistical module is used for obtaining the category number of each category according to the classification result; the evaluation module is used for determining a security evaluation attribute value corresponding to the detection data according to the security evaluation data of the detection data in the data security information table; and determining the safety degree of the detection data according to the safety evaluation attribute value, the category coefficient and the category number.
As an embodiment, the classification module further comprises a classification unit; the classification unit is used for vectorizing the detection data to obtain a retrieval data table; acquiring a preset distance interval, and taking any detection data from a retrieval data table as a classification central point; generating a central point set corresponding to the classification central point; sequentially taking any detection data from the retrieval data table as a calculation point, and determining a distance value between the calculation point and the classification central point; when the distance value is smaller than the preset distance interval, adding the detection data corresponding to the distance value to the corresponding central point set, and deleting the detection data from the retrieval data table; when the distance value is larger than the preset distance interval, setting the detection data corresponding to the distance value as a classification central point; acquiring residual retrieval data and all classification central points of the distance values in a preset distance interval; and calculating the calculation distance between the residual retrieval data and each classification central point, so as to add the residual retrieval data to the central point set of the classification central point corresponding to the minimum calculation distance, thereby realizing the classification of the detection data and obtaining the classification result.
As an embodiment, the classification module further comprises a coefficient calculation unit; the system computing unit is used for clustering the central point set to obtain a clustering center; and acquiring preset main attribute values and preset attribute weights corresponding to the clustering centers, and determining the mean value of the products of the preset main attribute values and the preset attribute weights as a class coefficient.
As an embodiment, the security assessment attribute values include at least confidentiality data, integrity data, and availability data, and the assessment module further includes an attribute value calculation unit; the attribute value calculating unit is used for determining the confidentiality grade assignment, the integrity grade assignment and the available grade assignment corresponding to the detection data through a trained decision tree algorithm; and determining the average value of the secret grade assignment, the complete grade assignment and the available grade assignment as the security assessment attribute value.
As an embodiment, the running state data further includes vulnerability risk data and configuration non-compliance item data; the evaluation module also comprises a safety degree calculation unit; the safety degree calculation unit is used for determining vulnerability grade assignment corresponding to vulnerability dangerous data in the detection data through a trained decision tree algorithm, and further determining vulnerability mean values of vulnerability grade assignment of all detection data; determining a risk assessment attribute value according to the proportion value of the configuration non-conforming item data and the vulnerability mean value; and determining the ratio of the risk assessment attribute value to the safety assessment attribute value as the safety degree.
As an embodiment, the system further comprises a prediction module; and the prediction module is used for determining the safety level of the prediction system corresponding to the safety degree according to the preset safety degree database and the safety degree.
In a second aspect, the present application provides a big data security assessment-based analysis method, including: acquiring running state data of the detection data to create a data safety information table; classifying the data in the data safety information table according to a preset classification algorithm to obtain a classification result; calculating the class coefficient of each classification; obtaining the number of categories of each category according to the classification result; according to the safety evaluation data of the detected data in the data safety information table, determining a safety evaluation attribute value corresponding to the detected data; and determining the safety degree of the detection data according to the safety evaluation attribute value, the category coefficient and the category number.
As an embodiment, the classifying the data in the data security information table according to a preset classification algorithm to obtain a classification result specifically includes: vectorizing the detection data to obtain a retrieval data table; acquiring a preset distance interval, and taking any detection data from a retrieval data table as a classification central point; generating a central point set corresponding to the classification central point; sequentially taking any detection data from the retrieval data table as a calculation point, and determining a distance value between the calculation point and the classification central point; when the distance value is smaller than the preset distance interval, adding the detection data corresponding to the distance value to the corresponding central point set, and deleting the detection data from the retrieval data table; when the distance value is larger than the preset distance interval, setting the detection data corresponding to the distance value as a classification central point; acquiring residual retrieval data and all classification central points of the distance values in a preset distance interval; and calculating the calculation distance between the residual retrieval data and each classification central point, so as to add the residual retrieval data to the central point set of the classification central point corresponding to the minimum calculation distance, thereby realizing the classification of the detection data and obtaining a classification result.
As can be appreciated by those skilled in the art, the present invention has at least the following benefits:
the safety evaluation value of the big data application system is analyzed by performing feature extraction, identification and classification on safety data (safety strategies, safety products and safety technologies) used by the big data, then performing statistics on the identified strategies, technologies and the like. The method can effectively solve the problems that only the network system safety can be evaluated and the evaluation is incomplete caused by evaluating the safety of the big data through a vulnerability scanner and a permeability test in the prior art, and can identify and count the safety protection technology used in the whole life cycle from birth to destruction of the big data by using the method, thereby realizing the safe and comprehensive evaluation and analysis of the big data.
Drawings
Some embodiments of the disclosure are described below with reference to the accompanying drawings, in which:
fig. 1 is a schematic diagram of an internal structure of a big data security assessment-based analysis system according to an embodiment of the present application.
Fig. 2 is a flowchart of a security assessment analysis method based on big data according to an embodiment of the present application.
Detailed Description
It should be understood by those skilled in the art that the embodiments described below are only preferred embodiments of the present disclosure, and do not mean that the present disclosure can be implemented only by the preferred embodiments, which are merely intended to explain the technical principles of the present disclosure and not to limit the scope of the present disclosure. All other embodiments, which can be derived by a person skilled in the art from the preferred embodiments provided by the disclosure without inventive step, shall fall within the scope of protection of the disclosure.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of additional identical elements in the process, method, article, or apparatus comprising the element.
The technical solutions proposed in the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Fig. 1 is a big data security assessment analysis system according to an embodiment of the present disclosure. As shown in fig. 1, the system provided in the embodiment of the present application mainly includes: the device comprises an acquisition module, a classification module, a statistic module and an evaluation module.
The acquisition module is any feasible equipment or device capable of acquiring big data and is mainly used for acquiring running state data of detection data to create a data safety information table; it should be noted that the operation state data is all security policy data, protection technology data, vulnerability data, and configuration non-compliance data used in the whole life cycle from birth to destruction of big data.
The classification module is used for classifying data in the data safety information table according to a preset classification algorithm to obtain a classification result; and calculates a class coefficient for each classification.
Specifically, "obtain classification result" may be: vectorizing the detection data through a classification unit in a classification module to obtain a retrieval data table; acquiring a preset distance interval, and taking any detection data from a retrieval data table as a classification central point; generating a central point set corresponding to the classification central point; sequentially taking any detection data from the retrieval data table as a calculation point, and determining a distance value between the calculation point and the classification central point; when the distance value is smaller than the preset distance interval, adding the detection data corresponding to the distance value to the corresponding central point set, and deleting the detection data from the retrieval data table; when the distance value is larger than the preset distance interval, setting the detection data corresponding to the distance value as a classification central point; acquiring residual retrieval data and all classification central points of the distance values in a preset distance interval; and calculating the calculation distance between the residual retrieval data and each classification central point, so as to add the residual retrieval data to the central point set of the classification central point corresponding to the minimum calculation distance, thereby realizing the classification of the detection data and obtaining a classification result. It should be noted that the preset distance interval may be any feasible interval, and those skilled in the art may determine the specific content according to the actual requirement.
Specifically, the class coefficient of each classification is calculated as follows: clustering the central point set through a coefficient calculation unit in the classification module to obtain a clustering center; and acquiring preset main attribute values and preset attribute weights corresponding to the clustering centers, and determining the mean value of the products of the preset main attribute values and the preset attribute weights as a class coefficient. It should be noted that the clustering process may be implemented by any feasible clustering algorithm, and the present application is not limited herein.
The statistical module is any feasible device or apparatus capable of counting the number of sets, and is mainly used for obtaining the number of categories (the central point set) of each category through the classification result (the central point set).
The evaluation module can be any feasible equipment or device capable of performing data evaluation and the like, and is mainly used for determining a security evaluation attribute value corresponding to detection data according to the security evaluation data of the detection data in the data security information table; and determining the safety degree of the detection data according to the safety evaluation attribute value, the category coefficient and the category quantity.
Specifically, the calculation process of the security assessment attribute value may be: determining vulnerability grade assignment corresponding to vulnerability dangerous data in detection data through a trained decision tree algorithm in a safety degree calculation unit in an evaluation module, and further determining a vulnerability average value of vulnerability grade assignment of all detection data; determining a risk assessment attribute value according to the sum of the configuration non-conformity item data ratio and the vulnerability mean value; and determining the ratio of the risk assessment attribute value to the safety assessment attribute value as the safety degree.
In addition, the safety level of the result can be evaluated.
Illustratively, the system further comprises a prediction module; the prediction module is any feasible device or device capable of inquiring the database and the like, and is mainly used for determining the security level of the prediction system corresponding to the security degree according to the preset security degree database and the security degree. It should be noted that the preset security database stores the corresponding relationship between the security level and the security level of the prediction system. The specific content of the preset security database can be set by those skilled in the art according to actual requirements.
In addition, an embodiment of the present application further provides a big data security assessment-based analysis method, and as shown in fig. 2, the method provided in the embodiment of the present application mainly includes the following steps:
and step 210, acquiring the running state data of the detection data to create a data safety information table.
Step 220, classifying the data in the data safety information table according to a preset classification algorithm to obtain a classification result; calculating the class coefficient of each classification; and obtaining the category number of each category according to the classification result.
The data in the data security information table is classified according to a preset classification algorithm to obtain a classification result, which specifically can be: vectorizing the detection data to obtain a retrieval data table; acquiring a preset distance interval, and taking any detection data from a retrieval data table as a classification central point; generating a central point set corresponding to the classification central point; sequentially taking any detection data from the retrieval data table as a calculation point, and determining a distance value between the calculation point and the classification central point; when the distance value is smaller than the preset distance interval, adding the detection data corresponding to the distance value to the corresponding central point set, and deleting the detection data from the retrieval data table; when the distance value is larger than the preset distance interval, setting the detection data corresponding to the distance value as a classification central point; acquiring residual retrieval data and all classification central points of the distance values in a preset distance interval; and calculating the calculation distance between the residual retrieval data and each classification central point, so as to add the residual retrieval data to the central point set of the classification central point corresponding to the minimum calculation distance, thereby realizing the classification of the detection data and obtaining a classification result.
Step 230, determining a security assessment attribute value corresponding to the detected data according to the security assessment data of the detected data in the data security information table; and determining the safety degree of the detection data according to the safety evaluation attribute value, the category coefficient and the category number.
So far, the technical solutions of the present disclosure have been described in connection with the foregoing embodiments, but it is easily understood by those skilled in the art that the scope of the present disclosure is not limited to only these specific embodiments. The technical solutions in the above embodiments can be split and combined, and equivalent changes or substitutions can be made on related technical features by those skilled in the art without departing from the technical principles of the present disclosure, and any changes, equivalents, improvements, and the like made within the technical concept and/or technical principles of the present disclosure will fall within the protection scope of the present disclosure.

Claims (8)

1. A big data based security assessment analysis system, the system comprising:
the acquisition module is used for acquiring the running state data of the detection data to create a data safety information table;
the classification module is used for classifying the data in the data safety information table according to a preset classification algorithm to obtain a classification result; calculating the class coefficient of each classification;
the statistical module is used for obtaining the number of the categories through the classification result;
the evaluation module is used for determining a security evaluation attribute value corresponding to the detection data according to the security evaluation data of the detection data in the data security information table; and determining the safety degree of the detection data according to the safety evaluation attribute value, the category coefficient and the category number.
2. The big data based security assessment analysis system according to claim 1, wherein said classification module further comprises a classification unit;
the classification unit is used for vectorizing the detection data to obtain a retrieval data table; acquiring a preset distance interval, and taking any detection data from a retrieval data table as a classification central point; generating a central point set corresponding to the classification central point; sequentially taking any detection data from the retrieval data table as a calculation point, and determining a distance value between the calculation point and the classification central point; when the distance value is smaller than the preset distance interval, adding the detection data corresponding to the distance value to the corresponding central point set, and deleting the detection data from the retrieval data table; when the distance value is larger than the preset distance interval, setting the detection data corresponding to the distance value as a classification central point; acquiring residual retrieval data and all classification central points of the distance values in a preset distance interval; and calculating the calculation distance between the residual retrieval data and each classification central point, so as to add the residual retrieval data to the central point set of the classification central point corresponding to the minimum calculation distance, thereby realizing the classification of the detection data and obtaining the classification result.
3. The big data based security assessment analysis system according to claim 2, wherein the classification module further comprises a coefficient calculation unit;
the system computing unit is used for clustering the central point set to obtain a clustering center; and acquiring preset main attribute values and preset attribute weights corresponding to the clustering centers, and determining the mean value of the products of the preset main attribute values and the preset attribute weights as a class coefficient.
4. The big-data-based security assessment analysis system according to claim 1, wherein said security assessment attribute values comprise at least confidentiality data, integrity data and availability data,
the evaluation module further comprises an attribute value calculation unit;
the attribute value calculating unit is used for determining secret grade assignment, complete grade assignment and available grade assignment corresponding to the security evaluation attribute value in the detection data through a trained decision tree algorithm; and determining the average value of the secret grade assignment, the complete grade assignment and the available grade assignment as the security assessment attribute value.
5. The big-data-based security assessment analysis system according to claim 1, wherein the operating state data further comprises vulnerability risk data and configuration non-compliance data;
the evaluation module further comprises a safety degree calculation unit;
the safety degree calculation unit is used for determining vulnerability grade assignment corresponding to vulnerability dangerous data in the detection data through a trained decision tree algorithm, and further determining vulnerability mean values of vulnerability grade assignment of all detection data; determining a risk assessment attribute value according to the proportion value and the vulnerability mean value of the configuration non-conforming item data; and determining the ratio of the risk assessment attribute value to the safety assessment attribute value as the safety degree.
6. The big data based security assessment analysis system according to claim 1, further comprising a prediction module;
and the prediction module is used for determining the safety level of a prediction system corresponding to the safety degree according to a preset safety degree database and the safety degree.
7. A big data security assessment analysis method is characterized by comprising the following steps:
acquiring running state data of the detection data to create a data safety information table;
classifying data in the data safety information table according to a preset classification algorithm to obtain a classification result; calculating the class coefficient of each classification; obtaining the number of categories of each category according to the classification result;
determining a security evaluation attribute value corresponding to the detection data according to the security evaluation data of the detection data in the data security information table; and determining the safety degree of the detection data according to the safety evaluation attribute value, the category coefficient and the category quantity.
8. The big data security assessment and analysis method according to claim 7, wherein the data in the data security information table is classified according to a preset classification algorithm to obtain a classification result, and the method specifically comprises the following steps:
vectorizing the detection data to obtain a retrieval data table; acquiring a preset distance interval, and taking any detection data from a retrieval data table as a classification central point; generating a central point set corresponding to the classification central point;
sequentially taking any detection data from the retrieval data table as a calculation point, and determining a distance value between the calculation point and the classification central point; when the distance value is smaller than the preset distance interval, adding the detection data corresponding to the distance value to the corresponding central point set, and deleting the detection data from the retrieval data table; when the distance value is larger than the preset distance interval, setting the detection data corresponding to the distance value as a classification central point;
acquiring residual retrieval data and all classification central points of the distance values in a preset distance interval; and calculating the calculation distance between the residual retrieval data and each classification central point, so as to add the residual retrieval data to the central point set of the classification central point corresponding to the minimum calculation distance, thereby realizing the classification of the detection data and obtaining a classification result.
CN202211330505.5A 2022-10-28 2022-10-28 Big data based security assessment analysis system and method Active CN115396238B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211330505.5A CN115396238B (en) 2022-10-28 2022-10-28 Big data based security assessment analysis system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211330505.5A CN115396238B (en) 2022-10-28 2022-10-28 Big data based security assessment analysis system and method

Publications (2)

Publication Number Publication Date
CN115396238A true CN115396238A (en) 2022-11-25
CN115396238B CN115396238B (en) 2023-03-14

Family

ID=84115041

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211330505.5A Active CN115396238B (en) 2022-10-28 2022-10-28 Big data based security assessment analysis system and method

Country Status (1)

Country Link
CN (1) CN115396238B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106682527A (en) * 2016-12-25 2017-05-17 北京明朝万达科技股份有限公司 Data security control method and system based on data classification and grading
US20170200006A1 (en) * 2014-07-30 2017-07-13 Hewlett Packard Enterprise Development Lp Product risk profile
CN108363717A (en) * 2017-12-29 2018-08-03 天津南大通用数据技术股份有限公司 A kind of recognition detection method and device of data security levels
US20200302296A1 (en) * 2019-03-21 2020-09-24 D. Douglas Miller Systems and method for optimizing educational outcomes using artificial intelligence
CN114611928A (en) * 2022-03-11 2022-06-10 夏拥军 Enterprise information security management level evaluation method and system based on big data analysis

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170200006A1 (en) * 2014-07-30 2017-07-13 Hewlett Packard Enterprise Development Lp Product risk profile
CN106682527A (en) * 2016-12-25 2017-05-17 北京明朝万达科技股份有限公司 Data security control method and system based on data classification and grading
CN108363717A (en) * 2017-12-29 2018-08-03 天津南大通用数据技术股份有限公司 A kind of recognition detection method and device of data security levels
US20200302296A1 (en) * 2019-03-21 2020-09-24 D. Douglas Miller Systems and method for optimizing educational outcomes using artificial intelligence
CN114611928A (en) * 2022-03-11 2022-06-10 夏拥军 Enterprise information security management level evaluation method and system based on big data analysis

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
高磊等: "大数据应用中的个人信息分级保护研究", 《信息安全研究》 *

Also Published As

Publication number Publication date
CN115396238B (en) 2023-03-14

Similar Documents

Publication Publication Date Title
CN111083126A (en) Expert knowledge base-based penetration test risk assessment method and model
CN116366374B (en) Security assessment method, system and medium for power grid network management based on big data
CN110020687B (en) Abnormal behavior analysis method and device based on operator situation perception portrait
CN112711757B (en) Data security centralized management and control method and system based on big data platform
CN115271511A (en) Method for supervising construction engineering quality
CN106027528A (en) WEB horizontal authority automatic identification method and device
CN115622738A (en) RBF neural network-based safety emergency disposal system and method
CN117614743B (en) Phishing early warning method and system thereof
CN110598397A (en) Deep learning-based Unix system user malicious operation detection method
CN113283768A (en) Food detection item extraction method, device, equipment and storage medium
CN115396238B (en) Big data based security assessment analysis system and method
CN111401784B (en) Fire safety grade assessment method
CN112073396A (en) Method and device for detecting transverse movement attack behavior of intranet
CN109918638B (en) Network data monitoring method
CN111782908A (en) WEB violation operation behavior detection method based on data mining cluster analysis
CN114817518B (en) License handling method, system and medium based on big data archive identification
CN116258501A (en) Electronic transaction data online supervision system and method based on big data
CN105487936A (en) Information system security evaluation method for classified protection under cloud environment
CN115795319A (en) Test item detection method and related device based on CNAS detection laboratory
CN116126807A (en) Log analysis method and related device
CN108075918B (en) Internet service change detection method and system
CN114372497A (en) Multi-modal security data classification method and classification system
CN113704825A (en) Database auditing method, device and system and computer storage medium
CN112528293B (en) Security vulnerability early warning method, device, equipment and computer readable storage medium
CN115150202B (en) Internet IT information asset collection and attack detection method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant