CN116506186A - Big data layering analysis method for network security level protection evaluation data - Google Patents
Big data layering analysis method for network security level protection evaluation data Download PDFInfo
- Publication number
- CN116506186A CN116506186A CN202310479125.6A CN202310479125A CN116506186A CN 116506186 A CN116506186 A CN 116506186A CN 202310479125 A CN202310479125 A CN 202310479125A CN 116506186 A CN116506186 A CN 116506186A
- Authority
- CN
- China
- Prior art keywords
- data
- layer
- analysis
- network security
- security level
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000011156 evaluation Methods 0.000 title claims abstract description 106
- 238000004458 analytical method Methods 0.000 title claims abstract description 80
- 238000007405 data analysis Methods 0.000 claims abstract description 23
- 238000012545 processing Methods 0.000 claims abstract description 21
- 238000000034 method Methods 0.000 claims abstract description 15
- 238000004140 cleaning Methods 0.000 claims abstract description 13
- 238000004590 computer program Methods 0.000 claims description 23
- 238000003860 storage Methods 0.000 claims description 16
- 238000013499 data model Methods 0.000 claims description 10
- 238000011068 loading method Methods 0.000 claims description 4
- 230000008520 organization Effects 0.000 claims description 4
- 238000005065 mining Methods 0.000 claims description 3
- 238000012502 risk assessment Methods 0.000 claims description 3
- 238000004519 manufacturing process Methods 0.000 claims 1
- 238000007418 data mining Methods 0.000 description 12
- 238000004220 aggregation Methods 0.000 description 8
- 230000002776 aggregation Effects 0.000 description 8
- 238000010276 construction Methods 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 6
- 238000007726 management method Methods 0.000 description 5
- 238000009826 distribution Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000004141 dimensional analysis Methods 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 238000007781 pre-processing Methods 0.000 description 2
- 230000009897 systematic effect Effects 0.000 description 2
- 241000533950 Leucojum Species 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000013070 change management Methods 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 238000013144 data compression Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000011049 filling Methods 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000010606 normalization Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000001303 quality assessment method Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000003786 synthesis reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/21—Design, administration or maintenance of databases
- G06F16/215—Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
- G06F16/254—Extract, transform and load [ETL] procedures, e.g. ETL data flows in data warehouses
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/28—Databases characterised by their database models, e.g. relational or object models
- G06F16/283—Multi-dimensional databases or data warehouses, e.g. MOLAP or ROLAP
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/28—Databases characterised by their database models, e.g. relational or object models
- G06F16/284—Relational databases
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S10/00—Systems supporting electrical power generation, transmission or distribution
- Y04S10/50—Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
The application relates to the field of big data analysis methods, in particular to a big data layering analysis method of network security level protection evaluation data, which comprises the following steps: based on a set data operation layer, cleaning data in the data operation layer to form a data warehouse layer, wherein the data warehouse layer comprises dimension domains and data of the data domains; processing and summarizing the data in the data warehouse layer to generate a data service layer; and in the data service layer, generating data of a theme zone, wherein the data is used for carrying out data analysis of different requirements on network security level protection evaluation data. The method and the device protect the evaluation data at the network security level to conduct layered big data analysis, and have the effect of improving the application value of the evaluation data.
Description
Technical Field
The invention relates to the field of big data analysis methods, in particular to a big data layering analysis method of network security level protection evaluation data.
Background
The information security level protection refers to the hierarchical implementation of security protection on information systems for private information, public information and public information of national secrets, legal persons and other organizations and citizens, and storing, transmitting and processing the information, the implementation of hierarchical management on security products used in the information systems, and the hierarchical response and disposal on information security events occurring in the information systems. The information system is a system or network which is formed by a computer and related and matched equipment and facilities and stores, transmits and processes information according to certain application targets and rules. Information refers to digitized information that is stored, transmitted, and processed in an information system.
In order to protect national information security, the information system is required to carry out corresponding grade protection evaluation by the iso-protection 2.0. The grade protection evaluation is that an evaluation organization is entrusted by related units according to national information security grade protection system regulation, and scientific means and methods are applied according to related management standards and technical standards. And detecting and evaluating the protection condition of an information system for processing specific application by adopting a safety technology evaluation and safety management evaluation mode, judging the coincidence degree of the technology and management level of the tested system and the requirement of the safety level, giving a conclusion whether the safety level meets the preset safety level or not based on the coincidence degree, and providing a safety correction proposal for a safety non-coincidence item.
The evaluation work can generate evaluation data, the evaluation data can show geometric grade increase along with the deep development of the evaluation work, and the related data analysis is carried out on the evaluation data, so that great social and commercial values can be dug. The existing data analysis method is inconvenient to extract valuable data from a large amount of measurement and evaluation data by performing single-level data mining analysis, and the application value of the measurement and evaluation data is low.
Disclosure of Invention
In order to analyze the layering big data of the network security level protection evaluation data, the application provides a big data layering analysis method of the network security level protection evaluation data.
In a first aspect, the method for hierarchical analysis of big data of network security level protection evaluation data provided by the present application adopts the following technical scheme:
based on a set data operation layer, cleaning data in the data operation layer to form a data warehouse layer, wherein the data warehouse layer comprises dimension domains and data of the data domains; processing and summarizing the data in the data warehouse layer to generate a data service layer; and in the data service layer, generating data of a theme zone, wherein the data is used for carrying out data analysis of different requirements on network security level protection evaluation data.
By adopting the technical scheme, hierarchical construction of the grade protection evaluation data is carried out according to the multi-bin hierarchical construction method, the data mining analysis efficiency and range of the evaluation data are improved, a more scientific hierarchical analysis method for the evaluation big data is established, the data mining analysis is better carried out on the network security grade protection evaluation data, and the application value of the evaluation data is improved.
By dividing the data according to different layers, the data can be better mined and analyzed, so that the application value of the evaluation data is improved. By establishing a hierarchical analysis method, the security of network security level protection evaluation data is ensured, the data mining analysis efficiency and range of the evaluation data are improved, and a more complete and systematic solution is provided for the processing and analysis of the level protection evaluation data.
Preferably, the data warehouse comprises a DWD detail layer, a DWS summary layer and a DWM aggregation layer, and the data flow directions of the DWD detail layer, the DWS summary layer and the DWM aggregation layer are from the DWD detail layer to the DWS summary layer to the DWM aggregation layer.
Preferably, in the data service layer, data of a topic field is generated, and the data analysis of different requirements topics is performed on the network security level protection evaluation number, including the following steps: establishing a theme zone related to the evaluation data; extracting and processing the data of the evaluation data; constructing a data model; and carrying out multidimensional analysis and mining on the data by using a data analysis tool, finding out association relations, rules and data trends in the data, and generating an analysis list based on analysis results so as to carry out data analysis and application.
Preferably, the data sources of the data operation layer include: index library, instruction library and evaluation center database of business system.
Preferably, the dimension field includes a region dimension, an industry dimension, a grade dimension, an organization difficulty and a risk height dimension.
Preferably, the data field includes an evaluation item, an evaluation object, risk analysis data, non-conforming item data, and an evaluation result.
Preferably, the data service layer stores data in ES, mysql for use by an on-line system, providing data products and data for use in data analysis.
In a second aspect, the present application discloses a big data hierarchical analysis system for network security level protection evaluation data, and the big data hierarchical analysis method for network security level protection evaluation data includes: the data warehouse establishing module is used for cleaning the data in the data operation layer based on the set data operation layer to form a data warehouse layer; and the data service layer establishing module is used for processing and summarizing the data in the data warehouse layer to generate a data service layer. And the analysis module is used for generating data of the subject domain, the dimension domain and the data domain in the data service layer and carrying out hierarchical analysis of the data operation layer and the data warehouse level data service layer on the network security level protection evaluation data.
By adopting the technical scheme, hierarchical construction of the grade protection evaluation data is carried out according to the multi-bin hierarchical construction method, the data mining analysis efficiency and range of the evaluation data are improved, a more scientific hierarchical analysis method for the evaluation big data is established, the data mining analysis is better carried out on the network security grade protection evaluation data, and the application value of the evaluation data is improved. By dividing the data according to different layers, the data can be better mined and analyzed, so that the application value of the evaluation data is improved. By establishing a hierarchical analysis method, the security of network security level protection evaluation data is ensured, the data mining analysis efficiency and range of the evaluation data are improved, and a more complete and systematic solution is provided for the processing and analysis of the level protection evaluation data.
In a third aspect, the present application discloses a terminal device, including a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor adopts the above-mentioned big data hierarchical analysis method of network security level protection evaluation data when loading and executing the computer program.
By adopting the technical scheme, the big data layering analysis method of the network security level protection evaluation data generates the computer program, and the computer program is stored in the memory to be loaded and executed by the processor, so that the terminal equipment is manufactured according to the memory and the processor, and the user can conveniently use the terminal equipment.
In a fourth aspect, the present application discloses a computer readable storage medium, which adopts the following technical scheme: the computer readable storage medium stores a computer program, and when the computer program is loaded and executed by a processor, the big data layering analysis method of the network security level protection evaluation data is adopted.
By adopting the technical scheme, the big data layering analysis method of the network security level protection evaluation data is used for generating the computer program, and the computer program is stored in the computer readable storage medium to be loaded and executed by the processor, and the computer program is convenient to read and store through the computer readable storage medium.
Drawings
Fig. 1 is a flowchart of steps S1-S3 of a big data hierarchical analysis method of network security level protection evaluation data according to the present application.
Fig. 2 is a logic block diagram of a direction of an identification data flow in a big data hierarchical analysis method of network security level protection evaluation data according to the present application.
Fig. 3 is a flowchart of steps S10-S13 of a big data hierarchical analysis method of network security level protection evaluation data according to the present application.
Fig. 4 is a flowchart of steps S20-S22 of a big data hierarchical analysis method of network security level protection evaluation data according to the present application.
Fig. 5 is a flowchart of steps S30-S33 of a big data hierarchical analysis method of network security level protection evaluation data according to the present application.
Detailed Description
The present application is described in further detail below in conjunction with figures 1-5.
The embodiment of the application discloses a big data layering analysis method of network security level protection evaluation data, referring to fig. 1 and 2, the big data layering analysis method of network security level protection evaluation data comprises the following steps:
and S1, cleaning data in the data operation layer based on the set data operation layer to form a data warehouse layer, wherein the data warehouse layer comprises dimension domains and data of the data domains.
The data operation layer stores a data table of a data warehouse source system to be used as a source of data warehouse processing data. In this application, the dimension field may include: regional dimension, industry dimension, grade dimension, organization difficulty, and risk height dimension. The data field in the application may include an evaluation item, an evaluation object, risk analysis data, non-conforming item data, and an evaluation result.
Specifically, the data table of the data warehouse source system is stored as it is to establish a data operation layer as a data preparation area, which is also called a source layer or ODS layer (Operation Data Store raw data layer), and the ODS layer is a source of data processed by a subsequent data warehouse. Wherein, the source of the ODS layer data is an index library, a guide library and an evaluation center database of the business system. The ODS layer stores a service system, API data, log data, and offline files.
The data warehouse includes a DWD detail layer (Data Warehouse Details, data detail layer), a DWS summary layer (Data Warehouse Service, service data layer), and a DWM aggregation layer (Data Warehouse Middle, data middle layer); the DWD detail layer is an isolation layer of a business and data warehouse layer and is used for performing data cleaning and normalization operation, removing empty data or dirty data, outliers and the like. And (3) carrying out slight aggregation operation on the basis of the DWD detail layer, and calculating corresponding statistical indexes. The DWS summary layer integrates and assembles a data service layer of a theme on the basis of the DWM aggregation layer.
The data flow directions of the DWD detail layer, the DWS summary layer and the DWM aggregation layer are DWD detail layer to DWS summary layer to DWM aggregation layer. The ODS layer, the data warehouse and the ADS layer data flow are ODS layer to data warehouse to ADS layer.
Referring to fig. 3, step S1 includes steps S10-S13, which are described in detail below,
s10: and cleaning the data in the data operation layer to ensure the accuracy and the integrity of the data.
And cleaning the original data, including deduplication, missing value filling, outlier processing and the like, so as to ensure the accuracy and the integrity of the data.
S11: integrating data in the data operation layer and establishing a data model.
Integrating the cleaned data, extracting, converting and loading the data from different data sources into a data warehouse through an ETL tool to form a unified data model, and designing the data model according to service requirements and analysis purposes, wherein the data model comprises dimension tables, fact tables, relation modes and the like so as to provide multidimensional analysis and query of the data.
S12: and storing the cleaned data and establishing a data model.
The data after cleaning and modeling is stored in a data warehouse, and the data storage scheme adopted by the method can be column storage, compression storage and the like so as to improve the efficiency of data retrieval and query.
S13: data in the data warehouse is obtained for monitoring and managing the data.
The data in the data warehouse is monitored and managed, including data quality assessment, data change management, data backup and the like, so as to ensure the reliability and the safety of the data and manage the data quality.
And S2, processing and summarizing the data in the data warehouse layer to generate a data service layer.
The data processing comprises preprocessing operations such as data selection, cleaning, synthesis, merging, data formatting and the like, abnormal data such as repeated data, evaluation items which are not applicable to basic requirements and the like are removed, and the data is enabled to conform to a standardized format so as to carry out standardized operations. Through the data processing of the data operation layer, the quality and the accuracy of the data can be ensured, and meanwhile, the availability and the operability of the data can be improved. The data sources of the data operation layer include: index library, instruction library and evaluation center database of business system.
And integrating the data after data processing into a data service layer, wherein the data exists in the data service layer in the form of a wide table. The data service layer is also called a data application layer (Application Data Service), abbreviated as ADS layer, and mainly provides data for data products and data analysis, and stores the data in ES and mysql for online systems.
And carrying out data processing on the data in the data warehouse layer, and summarizing and integrating the data into a data service layer for service inquiry, OLAP analysis and data distribution.
The service inquiry refers to inquiring evaluation data according to the service requirement of a user, and the inquiry result is obtained through data mining, so that the inquiry result can effectively help information security management personnel to obtain required data. And establishing a multi-dimensional analysis model by an OLAP technology, and reflecting all information such as data, personnel, equipment and the like related to the equal-protection evaluation in a dimensional model, wherein the multi-dimensional analysis comprises cross analysis of transverse dimensions and submerging analysis of longitudinal dimensions, and valuable information can be obtained by finding problems on a macroscopic level and submerging through transverse cross comparison and longitudinal layer-by-layer.
Data is provided to other systems or users through data distribution at the data service layer. For example, the data in the data service layer can be exported as an Excel table or a CSV file, and the data is transmitted through an FTP or API interface.
The steps of data distribution include steps S21-S23, referring to fig. 4, as follows,
and S20, selecting a proper transmission protocol and a proper mode by determining a data source and a target.
The transmission protocol and manner may be one of FTP, HTTP, SCP, SFTP.
S21, setting authority and security policy, and configuring data transmission parameters.
The transmission parameters are parameters such as bandwidth limitation, data compression, etc.
S22, starting data transmission, monitoring transmission progress and recording logs.
And S3, generating data of a theme zone in the data service layer, wherein the data are used for carrying out data analysis of different requirements on the network security level protection evaluation data.
Referring to fig. 5, step S3 includes steps S30 to S33, specifically as follows:
s30: and establishing a theme zone related to the evaluation data.
And determining the topic domain and a corresponding index system according to the data demand and the service demand. For example, it may be determined that the subject domain is network security level protection evaluation data, and the index system includes device information, attack information, protection information, and the like. The topic domains are usually a collection of data topics that are closely related, and these data topics can be divided into different topic domains according to the focus of the service, so that the use and analysis are convenient.
S31: extracting and processing the data of the evaluation data;
and according to the determined subject field, extracting, converting and loading data by using an ETL tool to acquire a data set with higher consistency, accuracy and completeness, and cleaning and preprocessing the data for subsequent analysis and application.
S32: constructing a data model;
according to the data requirements and the data characteristics, a corresponding data model is established, wherein the data model comprises a star model, a snowflake model and the like so as to support multidimensional analysis and inquiry.
S33: and carrying out multidimensional analysis and mining on the evaluation data by using a data analysis tool, finding out the association relation, the rule and the data trend in the evaluation data, and generating an analysis list based on the analysis result so as to carry out data analysis and application. The analysis list can be in various report forms, graphs and the like.
In the application, the application layer data analysis dimension domain is an industry unit dimension, and the industry unit dimension is an industry unit overview analysis, such as unit total number, unit number summarization analysis of each district in jurisdiction, industry system dimension, region dimension and administrative region dimension, equipment dimension, system dimension, security layer dimension, evaluation point dimension, evaluation item dimension, customer importance dimension and project amount dimension, so as to perform security portrait analysis work from the classification angle of security evaluation data.
The implementation principle of the big data layering analysis method of the network security level protection evaluation data in the embodiment of the application is as follows: the hierarchical construction of the grade protection evaluation data is carried out according to the multi-bin hierarchical construction method, the data mining analysis efficiency and range of the evaluation data are improved, a more scientific hierarchical analysis method for the large evaluation data is established, the data mining analysis is better carried out on the network security grade protection evaluation data, and the application value of the evaluation data is improved.
The embodiment of the application also discloses a big data layering analysis system of network security level protection evaluation data, comprising: the data warehouse establishing module is used for cleaning the data in the data operation layer based on the set data operation layer to form a data warehouse layer, wherein the data warehouse layer comprises a dimension domain and the data of the data domain; and the data service layer establishing module is used for processing and summarizing the data in the data warehouse layer to generate the data service layer. And the analysis module is used for generating data of the theme zone in the data service layer and carrying out data analysis of different requirements on the network security level protection evaluation data.
The implementation principle of the big data layering analysis method of the network security level protection evaluation data in the embodiment of the application is as follows: the data warehouse establishing module, the data service layer establishing module and the analyzing module are used for realizing hierarchical construction of the grade protection evaluation data according to the multi-bin hierarchical construction method, improving the data mining analysis efficiency and range of the evaluation data, establishing a more scientific hierarchical analysis method for the evaluation big data, better carrying out data mining analysis on the network security grade protection evaluation data and improving the application value of the evaluation data.
The embodiment of the application also discloses a terminal device, which comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor adopts the big data layering analysis method of the network security level protection evaluation data of the embodiment when executing the computer program.
The terminal device may be a computer device such as a desktop computer, a notebook computer, or a cloud server, and the terminal device includes, but is not limited to, a processor and a memory, for example, the terminal device may further include an input/output device, a network access device, a bus, and the like.
The processor may be a Central Processing Unit (CPU), or of course, according to actual use, other general purpose processors, digital Signal Processors (DSP), application Specific Integrated Circuits (ASIC), ready-made programmable gate arrays (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc., and the general purpose processor may be a microprocessor or any conventional processor, etc., which is not limited in this application.
The memory may be an internal storage unit of the terminal device, for example, a hard disk or a memory of the terminal device, or may be an external storage device of the terminal device, for example, a plug-in hard disk, a Smart Memory Card (SMC), a secure digital card (SD), or a flash memory card (FC) equipped on the terminal device, or the like, and may be a combination of the internal storage unit of the terminal device and the external storage device, where the memory is used to store a computer program and other programs and data required by the terminal device, and the memory may be used to temporarily store data that has been output or is to be output, which is not limited in this application.
The big data layering analysis method of the network security level protection evaluation data of the embodiment is stored in the memory of the terminal device through the terminal device, and is loaded and executed on the processor of the terminal device, so that the user can use the method conveniently.
The embodiment of the application also discloses a computer readable storage medium, and the computer readable storage medium stores a computer program, wherein when the computer program is executed by a processor, the big data layering analysis method of the network security level protection assessment data of the embodiment is adopted.
The computer program may be stored in a computer readable medium, where the computer program includes computer program code, where the computer program code may be in a source code form, an object code form, an executable file form, or some middleware form, etc., and the computer readable medium includes any entity or device capable of carrying the computer program code, a recording medium, a usb disk, a removable hard disk, a magnetic disk, an optical disk, a computer memory, a read-only memory (ROM), a Random Access Memory (RAM), an electrical carrier signal, a telecommunication signal, a software distribution medium, etc., where the computer readable medium includes, but is not limited to, the above components.
The large data hierarchical analysis method of the network security level protection evaluation data of the embodiment is stored in the computer readable storage medium through the computer readable storage medium, and is loaded and executed on a processor, so that the storage and the application of the large data hierarchical analysis method of the network security level protection evaluation data are facilitated.
The foregoing description of the preferred embodiments of the present application is not intended to limit the scope of the application, in which any feature disclosed in this specification (including abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise. That is, each feature is one example only of a generic series of equivalent or similar features, unless expressly stated otherwise.
Claims (10)
1. The big data layering analysis method of the network security level protection evaluation data is characterized by comprising the following steps of:
based on a set data operation layer, cleaning data in the data operation layer to form a data warehouse layer, wherein the data warehouse layer comprises dimension domains and data of the data domains;
processing and summarizing the data in the data warehouse layer to generate a data service layer;
and in the data service layer, generating data of a theme zone, wherein the data is used for carrying out data analysis of different requirements on network security level protection evaluation data.
2. The method according to claim 1, wherein the data warehouse includes a DWD detail layer, a DWS summary layer, and a DWM aggregate layer, and the data flow directions of the DWD detail layer, the DWS summary layer, and the DWM aggregate layer are DWD detail layer to DWS summary layer to DWM aggregate layer.
3. The big data hierarchical analysis method of network security level protection evaluation data according to claim 1 or 2, wherein in the data service layer, data of a topic domain is generated, and the method is used for performing data analysis of different requirements topics on the network security level protection evaluation data, and comprises the following steps:
establishing a theme zone related to the evaluation data;
extracting and processing the data of the evaluation data;
constructing a data model;
and carrying out multidimensional analysis and mining on the evaluation data by using a data analysis tool, finding out association relations, rules and data trends in the evaluation data, and generating an analysis list based on analysis results so as to carry out data analysis and application.
4. The method for hierarchical analysis of big data of network security level protection assessment data according to claim 1, wherein the data sources of the data operation layer include: index library, instruction library and evaluation center database of business system.
5. The method for hierarchical analysis of big data of network security level protection assessment data according to claim 1, wherein the dimension fields include a regional dimension, an industry dimension, a level dimension, an organization difficulty, and a risk height dimension.
6. The method for hierarchical analysis of big data of network security level protection assessment data according to claim 1, wherein the data field includes an assessment item, an assessment object, risk analysis data, non-compliance item data, and an assessment result.
7. The method of claim 1, wherein the data service layer stores data for use by an on-line system in ES, mysql, providing data for data production and data analysis.
8. The big data hierarchical analysis system of network security level protection evaluation data, characterized in that the big data hierarchical analysis method of network security level protection evaluation data according to any one of claims 1 to 7 is used, comprising:
the data warehouse establishing module is used for cleaning data in the data operation layer based on the set data operation layer to form a data warehouse layer, wherein the data warehouse layer comprises dimension domains and data of the data domains;
the data service layer establishing module is used for processing and summarizing the data in the data warehouse layer to generate a data service layer;
and the analysis module is used for generating data of the topic domain in the data service layer and carrying out data analysis of different requirements on the network security level protection evaluation data.
9. Terminal equipment comprising a memory, a processor and a computer program stored in the memory and capable of running on the processor, characterized in that the processor, when loading and executing the computer program, adopts the big data layering analysis method of the network security level protection assessment data according to any one of claims 1-7.
10. A computer readable storage medium having a computer program stored therein, wherein the computer program, when loaded and executed by a processor, employs the big data hierarchical analysis method of network security level protection evaluation data according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310479125.6A CN116506186A (en) | 2023-04-27 | 2023-04-27 | Big data layering analysis method for network security level protection evaluation data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310479125.6A CN116506186A (en) | 2023-04-27 | 2023-04-27 | Big data layering analysis method for network security level protection evaluation data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116506186A true CN116506186A (en) | 2023-07-28 |
Family
ID=87317903
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310479125.6A Pending CN116506186A (en) | 2023-04-27 | 2023-04-27 | Big data layering analysis method for network security level protection evaluation data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116506186A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117880329A (en) * | 2024-03-12 | 2024-04-12 | 福建时代星云科技有限公司 | Multi-gateway access method for Internet of things equipment |
-
2023
- 2023-04-27 CN CN202310479125.6A patent/CN116506186A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117880329A (en) * | 2024-03-12 | 2024-04-12 | 福建时代星云科技有限公司 | Multi-gateway access method for Internet of things equipment |
CN117880329B (en) * | 2024-03-12 | 2024-05-28 | 福建时代星云科技有限公司 | Multi-gateway access method for Internet of things equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104756106A (en) | Characterizing data sources in a data storage system | |
Rozsnyai et al. | Discovering event correlation rules for semi-structured business processes | |
CN112000656A (en) | Intelligent data cleaning method and device based on metadata | |
CN116506186A (en) | Big data layering analysis method for network security level protection evaluation data | |
CN113094385A (en) | Data sharing fusion platform and method based on software definition open toolset | |
CN114003920A (en) | Security assessment method and device for system data, storage medium and electronic equipment | |
CN116662371A (en) | Cross-domain data fusion method | |
CN114880405A (en) | Data lake-based data processing method and system | |
KR100903726B1 (en) | System for Evaluating Data Quality Management Maturity | |
CN111737244A (en) | Data quality inspection method, device, computer system and storage medium | |
US10803124B2 (en) | Technological emergence scoring and analysis platform | |
CN114398669A (en) | Joint credit scoring method and device based on privacy protection calculation and cross-organization | |
WO2016200618A1 (en) | Data retention framework | |
CN116483822B (en) | Service data early warning method, device, computer equipment and storage medium | |
US11227288B1 (en) | Systems and methods for integration of disparate data feeds for unified data monitoring | |
CN112631889A (en) | Portrayal method, device and equipment for application system and readable storage medium | |
CN116910023A (en) | Data management system | |
US20200258093A1 (en) | Compliance standards mapping | |
CN116010480A (en) | Time sequence database auditing method and system | |
CN111427871B (en) | Data processing method, device and equipment | |
CN106649880B (en) | Power statistics management system and method | |
CN110969444A (en) | Enterprise bidding qualification analysis method and device | |
Abdallah et al. | A Data Collection Quality Model for Big Data Systems | |
CN115293452A (en) | User behavior prediction method and device, computer equipment and storage medium | |
CN117057425B (en) | Rule-type knowledge analysis method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |