CN115589324A - Data security defense emergency system and method based on cloud computing - Google Patents

Data security defense emergency system and method based on cloud computing Download PDF

Info

Publication number
CN115589324A
CN115589324A CN202211288992.3A CN202211288992A CN115589324A CN 115589324 A CN115589324 A CN 115589324A CN 202211288992 A CN202211288992 A CN 202211288992A CN 115589324 A CN115589324 A CN 115589324A
Authority
CN
China
Prior art keywords
log data
security
target log
historical
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211288992.3A
Other languages
Chinese (zh)
Other versions
CN115589324B (en
Inventor
全运平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhou Sihua
Original Assignee
Zhuji Hengjia New Energy Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuji Hengjia New Energy Co ltd filed Critical Zhuji Hengjia New Energy Co ltd
Priority to CN202211288992.3A priority Critical patent/CN115589324B/en
Publication of CN115589324A publication Critical patent/CN115589324A/en
Application granted granted Critical
Publication of CN115589324B publication Critical patent/CN115589324B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/116Details of conversion of file system types or formats
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/14Details of searching files based on file metadata
    • G06F16/148File search processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/1734Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • Library & Information Science (AREA)
  • Alarm Systems (AREA)

Abstract

The invention relates to a data security defense emergency system and a method based on cloud computing, wherein the system comprises a collecting unit which is built on a cloud server and is used for collecting log data of historical heterogeneous security equipment, converting the log data format of the historical heterogeneous security equipment into corresponding target log data and acquiring security events and associated equipment which are obtained after threat information analysis and correspond to the log data of the historical heterogeneous security equipment; the modeling unit is used for extracting characteristic values of historical target log data and then corresponding the original target log data to the safety events thereofRelationship establishment for one-to-one mapping relationship R between characteristic values of target log data and security events 1 Establishing a one-to-one mapping relation R between the characteristic value of the target log data and the associated equipment based on the corresponding relation between the original target log data and the associated equipment 2 And also used for learning and modifying the mapping relation R through historical data 1 And a mapping relation R 2

Description

Data security defense emergency system and method based on cloud computing
Technical Field
The invention particularly relates to a data security defense emergency system and method based on cloud computing.
Background
At present, a network is partitioned and divided into domains, and a security architecture special for the network performs targeted processing on collected log data of security equipment by deploying a firewall, intrusion detection, intrusion prevention, flow analysis, threat tracing and the like in the network so as to realize network security prevention. The network security defense technology has passive defense capability, and cannot realize cross-platform and cross-area security device collaborative defense, so that the network security protection efficiency is low, and for solving the related technologies of the problems, for example, patent document CN11405143A discloses an intelligent collaborative defense technology for heterogeneous security devices, the technology firstly obtains a plurality of log data to be processed of the heterogeneous security devices, respectively performs format conversion on the log data to be processed according to preset data rules to obtain a plurality of target log data, then respectively performs threat analysis on the target log data to obtain security events and related devices corresponding to the target log data, and finally performs collaborative defense on the target log data based on the security events and the related devices, the essence of the technology lies in sharing defense resources, but in practice, the technology still faces two problems: 1. the cooperative defense has high requirement on the computation speed of the computation amount, and the traditional computation machine is hard to be competent; 2. in the cooperative defense, a large amount of associated security devices need to be searched, and many of the related security devices are high in repeatability and inaccurate in searching, so that operation resources are excessively wasted, and the efficiency is reduced.
Disclosure of Invention
The invention aims to provide a data security defense emergency system and a data security defense emergency method based on cloud computing, and aims to solve the problems in the background technology.
In order to solve the technical problems, the invention provides the following technical scheme:
the data security defense emergency system based on cloud computing comprises a collecting unit, a target log data processing unit and a security event and associated equipment, wherein the collecting unit is built on a cloud server and is used for collecting log data of historical heterogeneous security equipment, converting the log data format of the historical heterogeneous security equipment into corresponding target log data and acquiring security events and associated equipment after threat information analysis corresponding to the log data of the historical heterogeneous security equipment; the modeling unit is used for extracting historical target log dataEstablishing a one-to-one mapping relation R between the characteristic value of the target log data and the security event based on the corresponding relation between the original target log data and the security event thereof 1 Establishing a one-to-one mapping relation R between the characteristic value of the target log data and the associated equipment based on the corresponding relation between the original target log data and the associated equipment 2 And also used for learning and modifying the mapping relation R through historical data 1 And a mapping relation R 2 (ii) a A preprocessing unit for calculating a characteristic value corresponding to the log data of a heterogeneous security device after converting the log data format of the heterogeneous security device and before acquiring a corresponding security event and associated devices, and then calculating the characteristic value and R 1 ,R 2 And searching corresponding security events and associated equipment.
Further, a characteristic value is extracted from historical target log data, specifically, a difference value between the target log data and standard frame log data is calculated to obtain new target log data, and then an MD5 value of the new target log data is calculated, wherein the MD5 value is the extracted characteristic value.
Further, calculating a difference value between the target log data and standard frame log data, specifically, filling the target log data into a square matrix according to a preset rule, then filling the standard frame log data into a similar square matrix, calculating Euclidean distances of elements in the same row and column of each of the two square matrices, filling the Euclidean distances of elements in the same row and column of each of the two square matrices into the similar square matrix to obtain a difference filling square matrix, reducing the difference filling square matrix into log data according to the preset rule, wherein the reduced log data is new target log data.
Further, the preprocessing unit needs to convert the format of the log data of the heterogeneous security device to obtain corresponding target log data before calculating the feature value corresponding to the log data of a certain heterogeneous security device, and the method used by the preprocessing unit when calculating the feature value of the target log data is the same as the method used by the modeling unit when calculating the feature value of the target log data.
Further, a processor is included and is configured to execute codes corresponding to the respective functional units on the cloud server.
The data security defense emergency method based on cloud computing comprises the steps that a collecting unit collects log data of historical heterogeneous security equipment, converts the log data format of the historical heterogeneous security equipment into corresponding target log data, and further obtains security events and associated equipment after threat information analysis corresponding to the log data of the historical heterogeneous security equipment; the modeling unit extracts characteristic values of historical target log data, and then establishes a one-to-one mapping relation R between the characteristic values of the target log data and the safety events based on the corresponding relation between the original target log data and the safety events thereof 1 Establishing a one-to-one mapping relation R between the characteristic value of the target log data and the associated equipment based on the corresponding relation between the original target log data and the associated equipment 2 Learning and modifying the mapping relation R by historical data 1 And the mapping relation R 2 (ii) a The preprocessing unit calculates a characteristic value corresponding to log data of a certain heterogeneous safety device after converting the log data format of the heterogeneous safety device and before acquiring a corresponding safety event and associated equipment, and then calculates the characteristic value and R 1 ,R 2 And searching corresponding security events and associated equipment.
Compared with the prior art, the invention has the beneficial effects that:
the cloud server is used as a foundation, so that the first problem in the prior art, namely 'cooperative defense has high requirement on the operation speed of an operation amount, and a traditional operation machine is difficult to be competent'; the security event and the associated equipment are determined by searching the mapping relation R1 and R2, so that the efficiency and the utilization rate of the operation resources are improved, and the second problem in the prior art, namely 'a large number of associated security equipment need to be searched in cooperative defense, wherein a lot of work repeatability is high and the searching is not accurate, the operation resources are excessively wasted, and the efficiency is reduced' is solved.
Drawings
FIG. 1 is a flow chart of the method of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The application discloses a data security defense emergency system based on cloud computing, which comprises a collecting unit, a target log data processing unit and a threat information analysis unit, wherein the collecting unit is built on a cloud server and is used for collecting log data of historical heterogeneous security equipment, converting the log data format of the historical heterogeneous security equipment into corresponding target log data and acquiring security events and associated equipment after threat information analysis corresponding to the log data of the historical heterogeneous security equipment; the modeling unit is used for extracting characteristic values of historical target log data and then establishing a one-to-one mapping relation R between the characteristic values of the target log data and the safety events based on the corresponding relation between the original target log data and the safety events thereof 1 Establishing a one-to-one mapping relation R between the characteristic value of the target log data and the associated equipment based on the corresponding relation between the original target log data and the associated equipment 2 And also used for learning and modifying the mapping relation R through historical data 1 And a mapping relation R 2 (ii) a A preprocessing unit for calculating a characteristic value corresponding to the log data of a heterogeneous security device after converting the log data format of the heterogeneous security device and before acquiring a corresponding security event and associated devices, and then calculating the characteristic value and R 1 ,R 2 And searching corresponding security events and associated equipment. In the implementation, the collecting unit collects the log data of the historical heterogeneous security equipment, converts the log data format of the historical heterogeneous security equipment into corresponding target log data, and also obtains the security event and the associated equipment after threat information analysis corresponding to the log data of the historical heterogeneous security equipment; the modeling unit extracts characteristic values of historical target log data, and then establishes a one-to-one mapping relation R between the characteristic values of the target log data and the safety events based on the corresponding relation between the original target log data and the safety events thereof 1 Establishing a target based on the corresponding relation between the original target log data and the associated equipmentOne-to-one mapping relation R of characteristic values of log data and associated equipment 2 Learning and modifying the mapping relation R through historical data 1 And a mapping relation R 2 (ii) a The preprocessing unit calculates a characteristic value corresponding to log data of a certain heterogeneous safety device after converting the log data format of the heterogeneous safety device and before acquiring a corresponding safety event and associated equipment, and then calculates the characteristic value and R 1 ,R 2 And searching corresponding security events and associated equipment.
Preferably, a characteristic value is extracted from the historical target log data, specifically, a difference value between the target log data and standard frame log data is calculated to obtain a new target log data, and then an MD5 value of the new target log data is calculated, where the MD5 value is the extracted characteristic value.
Preferably, the difference between the target log data and a standard frame log data is calculated, specifically, the target log data is filled into a square matrix according to a preset rule, then the standard frame log data is also filled into a similar square matrix, the euclidean distance between each of the same row and column elements of the two square matrices is calculated, the euclidean distance between each of the same row and column elements of the two square matrices is filled into the similar square matrix to obtain a difference filling square matrix, the difference filling square matrix is reduced into a log data according to the preset rule, and the reduced log data is new target log data.
Preferably, the preprocessing unit needs to convert the format of the log data of the heterogeneous security device to obtain corresponding target log data before calculating the feature value corresponding to the log data of a certain heterogeneous security device, and a method used by the preprocessing unit when calculating the feature value of the target log data is the same as a method used by the modeling unit when calculating the feature value of the target log data.
Preferably, a processor is further included, and the processor is configured to execute codes corresponding to the respective functional units on the cloud server.
The application also discloses a data security defense emergency method based on cloud computing, which comprises the steps of collecting log data of historical heterogeneous security equipment by a collecting unit and enabling the historical heterogeneous security equipment to be usedConverting the log data format into corresponding target log data, and acquiring security events and associated equipment after threat information analysis corresponding to the log data of historical heterogeneous security equipment; the modeling unit extracts characteristic values of historical target log data, and then establishes a one-to-one mapping relation R between the characteristic values of the target log data and the safety events based on the corresponding relation between the original target log data and the safety events thereof 1 Establishing a one-to-one mapping relation R between the characteristic value of the target log data and the associated equipment based on the corresponding relation between the original target log data and the associated equipment 2 Learning and modifying the mapping relation R through historical data 1 And a mapping relation R 2 (ii) a The preprocessing unit calculates a characteristic value corresponding to log data of a certain heterogeneous safety device after converting the log data format of the heterogeneous safety device and before acquiring a corresponding safety event and associated equipment, and then calculates the characteristic value and R 1 ,R 2 And searching corresponding security events and associated equipment.
In a specific implementation, the application discloses a data security defense emergency system based on cloud computing, which comprises a collecting unit, a target log data processing unit and a security event processing unit, wherein the collecting unit is built on a cloud server and is used for collecting log data of historical heterogeneous security equipment, converting the log data format of the historical heterogeneous security equipment into corresponding target log data, and acquiring security events and associated equipment after threat information analysis corresponding to the log data of the historical heterogeneous security equipment; the modeling unit is used for extracting characteristic values of historical target log data and then establishing a one-to-one mapping relation R between the characteristic values of the target log data and the safety events based on the corresponding relation between the original target log data and the safety events thereof 1 Establishing a one-to-one mapping relation R between the characteristic value of the target log data and the associated equipment based on the corresponding relation between the original target log data and the associated equipment 2 And also used for learning and modifying the mapping relation R through historical data 1 And a mapping relation R 2 (ii) a A preprocessing unit, configured to calculate a feature value corresponding to log data of a heterogeneous security device after format conversion of the log data of the heterogeneous security device and before obtaining a corresponding security event and an associated device, and then calculate a feature value corresponding to the log data of the heterogeneous security deviceBy the characteristic value and R 1 ,R 2 Searching for a corresponding security event and associated equipment; extracting a characteristic value of historical target log data, specifically calculating a difference value between the target log data and standard frame log data to obtain new target log data, and then calculating an MD5 value of the new target log data, wherein the MD5 value is the extracted characteristic value; calculating a difference value between target log data and standard frame log data, specifically, filling the target log data into a square matrix according to a preset rule, then filling the standard frame log data into a similar square matrix, calculating Euclidean distances of same-row and same-column elements of each of two square matrices, filling the Euclidean distances of same-row and same-column elements of each of two square matrices into the similar square matrix to obtain a filled difference square matrix, reducing the filled difference square matrix into log data according to the preset rule, wherein the reduced log data is new target log data; the preprocessing unit needs to convert the format of the log data of the heterogeneous security device to obtain corresponding target log data before calculating the characteristic value corresponding to the log data of a certain heterogeneous security device, and the method used by the preprocessing unit when calculating the characteristic value of the target log data is the same as the method used by the modeling unit when calculating the characteristic value of the target log data. The method solves the first problem in the prior art that 'cooperative defense has high requirement on the computation speed of the operand and the traditional computation machine is hard to be competent' on the basis of a cloud server; the security events and the associated equipment are determined by searching the mapping relation R1 and R2, so that the efficiency and the utilization rate of the operation resources are improved, and the second problem in the prior art, namely 'a large number of associated security equipment need to be searched in cooperative defense, wherein a large number of work repeatability is high and the searching is not accurate, the operation resources are excessively wasted, and the efficiency is reduced' is solved.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (6)

1. The data security defense emergency system based on cloud computing is characterized by comprising a collecting unit, a target log data processing unit and a threat information analysis unit, wherein the collecting unit is built on a cloud server and is used for collecting log data of historical heterogeneous security equipment, converting the log data format of the historical heterogeneous security equipment into corresponding target log data and acquiring security events and associated equipment after threat information analysis corresponding to the log data of the historical heterogeneous security equipment; the modeling unit is used for extracting characteristic values of historical target log data and then establishing a one-to-one mapping relation R between the characteristic values of the target log data and the safety events based on the corresponding relation between the original target log data and the safety events thereof 1 Establishing a one-to-one mapping relation R between the characteristic value of the target log data and the associated equipment based on the corresponding relation between the original target log data and the associated equipment 2 And also used for learning and modifying the mapping relation R through historical data 1 And a mapping relation R 2 (ii) a A preprocessing unit for calculating a characteristic value corresponding to the log data of a heterogeneous security device after converting the log data format of the heterogeneous security device and before acquiring a corresponding security event and associated devices, and then calculating the characteristic value and R 1 ,R 2 And searching corresponding security events and associated equipment.
2. The cloud-computing-based data security defense emergency system according to claim 1, wherein characteristic values are extracted from historical target log data, specifically, a difference value between the target log data and standard frame log data is calculated to obtain a new target log data, and then an MD5 value of the new target log data is calculated, wherein the MD5 value is the extracted characteristic value.
3. The cloud-computing-based data security defense emergency system according to claim 1, wherein the difference between the target log data and a standard frame log data is calculated, specifically, the target log data is filled into a square matrix according to a preset rule, then the standard frame log data is filled into a similar square matrix, the euclidean distance between each of the same row and column elements of the two square matrices is calculated, the euclidean distance between each of the same row and column elements of the two square matrices is filled into the similar square matrix to obtain a difference filled square matrix, the difference filled square matrix is restored into a log data according to the preset rule, and the restored log data is new target log data.
4. The cloud-computing-based data security defense emergency system according to claim 1, wherein the preprocessing unit needs to convert the format of the log data of the heterogeneous security device to obtain corresponding target log data before computing the corresponding characteristic value of the log data of a certain heterogeneous security device, and a method used by the preprocessing unit in computing the characteristic value of the target log data is the same as a method used by the modeling unit in computing the characteristic value of the target log data.
5. The cloud computing-based data security defense emergency system according to claim 1, characterized in that a processor is included, and the processor is used for executing codes corresponding to the functional units on the cloud server.
6. The data security defense emergency method based on cloud computing is characterized by comprising the steps that a collecting unit collects log data of historical heterogeneous security equipment, converts the log data format of the historical heterogeneous security equipment into corresponding target log data, and acquires security events and associated equipment after threat information analysis corresponding to the log data of the historical heterogeneous security equipment; the modeling unit extracts characteristic values of historical target log data, and then establishes a one-to-one mapping relation R between the characteristic values of the target log data and the safety events based on the corresponding relation between the original target log data and the safety events thereof 1 Establishing a one-to-one mapping relation R between the characteristic value of the target log data and the associated equipment based on the corresponding relation between the original target log data and the associated equipment 2 By historical data scienceLearning and modifying the mapping relation R 1 And a mapping relation R 2 (ii) a The preprocessing unit calculates a characteristic value corresponding to log data of a heterogeneous security device after converting the log data format of the heterogeneous security device and before acquiring a corresponding security event and associated devices, and then calculates the characteristic value and R according to the characteristic value 1 ,R 2 And searching corresponding security events and associated equipment.
CN202211288992.3A 2022-10-20 2022-10-20 Cloud computing-based data security defense emergency system and method Active CN115589324B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211288992.3A CN115589324B (en) 2022-10-20 2022-10-20 Cloud computing-based data security defense emergency system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211288992.3A CN115589324B (en) 2022-10-20 2022-10-20 Cloud computing-based data security defense emergency system and method

Publications (2)

Publication Number Publication Date
CN115589324A true CN115589324A (en) 2023-01-10
CN115589324B CN115589324B (en) 2024-06-04

Family

ID=84781030

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211288992.3A Active CN115589324B (en) 2022-10-20 2022-10-20 Cloud computing-based data security defense emergency system and method

Country Status (1)

Country Link
CN (1) CN115589324B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190098027A1 (en) * 2016-12-14 2019-03-28 Ping An Technology(Shenzhen) Co., Ltd. Joint defence method and apparatus for network security, and server and storage medium
CN114205146A (en) * 2021-12-10 2022-03-18 北京天融信网络安全技术有限公司 Processing method and device for multi-source heterogeneous security log
CN114205143A (en) * 2021-12-09 2022-03-18 国家电网有限公司信息通信分公司 Intelligent cooperative defense method and system for heterogeneous security equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190098027A1 (en) * 2016-12-14 2019-03-28 Ping An Technology(Shenzhen) Co., Ltd. Joint defence method and apparatus for network security, and server and storage medium
CN114205143A (en) * 2021-12-09 2022-03-18 国家电网有限公司信息通信分公司 Intelligent cooperative defense method and system for heterogeneous security equipment
CN114205146A (en) * 2021-12-10 2022-03-18 北京天融信网络安全技术有限公司 Processing method and device for multi-source heterogeneous security log

Also Published As

Publication number Publication date
CN115589324B (en) 2024-06-04

Similar Documents

Publication Publication Date Title
CN110210621B (en) Improved target detection method based on residual error network
CN113961434A (en) Method and system for monitoring abnormal behaviors of distributed block chain system users
CN106557401A (en) A kind of dynamic threshold establishing method and system of information technoloy equipment monitor control index
CN113204465B (en) Micro-service extraction method based on execution tracking
CN116468392A (en) Method, device, equipment and storage medium for monitoring progress of power grid engineering project
CN112804348A (en) Method for judging repeatability of reported data of edge computing node by cloud monitoring center
CN107733738A (en) A kind of computer network cloud management system
CN115439753A (en) Steep river bank identification method and system based on DEM
CN112486676B (en) Data sharing and distributing device based on edge calculation
CN115589324A (en) Data security defense emergency system and method based on cloud computing
CN109639659A (en) A kind of implementation method of the WEB application firewall based on machine learning
CN109246248A (en) The credible and secure shared system of data and method based on block chain technology
CN113569956A (en) Mountain fire disaster investigation and identification method based on AI algorithm
CN112380126A (en) Web system health prediction device and method
CN112187834A (en) Block chain network node service system based on safe storage
CN106844608A (en) Detection and the method for switch data, device and electronic equipment
CN114254131B (en) Network security emergency response knowledge graph entity alignment method
CN110516101A (en) It is a kind of based on big data excavate forestry one open figure method for building up and device
CN114970694A (en) Network security situation assessment method and model training method thereof
US20240187446A1 (en) Method and system for detecting complex multi-step attack in electric power system
CN113723414A (en) Mask face shelter segmentation method and device
CN113452783A (en) Digital PAAS open platform system of block chain cloud architecture and implementation method
Liu et al. Device behavior identification in encrypted home security camera traffic
CN117632773B (en) Data interaction anomaly detection method and detection port based on computer terminal
CN116227268B (en) Method, device, equipment and medium for determining thermal parameters of turbine blade of engine

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20240510

Address after: 100010 Zuoanmen Neizuoanyiyuan 1-5-1301, Dongcheng District, Beijing

Applicant after: Zhou Sihua

Country or region after: China

Address before: 311800 Room 301, East of Complex, No. 380, Zhongyang Road, Diankou Town, Zhuji City, Shaoxing City, Zhejiang Province

Applicant before: Zhuji Hengjia New Energy Co.,Ltd.

Country or region before: China

GR01 Patent grant
GR01 Patent grant