CN117909978A - Analysis management method and system based on big data security - Google Patents

Analysis management method and system based on big data security Download PDF

Info

Publication number
CN117909978A
CN117909978A CN202410289835.7A CN202410289835A CN117909978A CN 117909978 A CN117909978 A CN 117909978A CN 202410289835 A CN202410289835 A CN 202410289835A CN 117909978 A CN117909978 A CN 117909978A
Authority
CN
China
Prior art keywords
code
data
ota
protection
optimization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410289835.7A
Other languages
Chinese (zh)
Other versions
CN117909978B (en
Inventor
彭娟
夏泽波
崔业超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Yinshu Information Technology Co ltd
Original Assignee
Fujian Yinshu Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Yinshu Information Technology Co ltd filed Critical Fujian Yinshu Information Technology Co ltd
Priority to CN202410289835.7A priority Critical patent/CN117909978B/en
Publication of CN117909978A publication Critical patent/CN117909978A/en
Application granted granted Critical
Publication of CN117909978B publication Critical patent/CN117909978B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/13File access structures, e.g. distributed indices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/561Virus type analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to an analysis management method and system based on big data security, the method includes obtaining network protection information of a big data service channel port, adding first protection log data into a virus library, compressing the first protection code data in an OTA optimizing library, creating an OTA optimizing folder for storing the first protection code data in the OTA optimizing library, and carrying out association binding on the OTA optimizing folder and the virus library by using an OTA over-the-air downloading technology; identifying attack means codes by using a matching tree mechanism, screening and matching the first protection log data with second protection log data with the same kind of purpose in a virus library, and identifying second protection code data corresponding to the second protection log data; selecting an OTA optimization code in the second protection code data, and converting the OTA optimization code into OTA optimization data by combining a virtualization data updating technology and a paas architecture technology; and optimizing the first protection code data in the OTA optimization folder through the OTA optimization data.

Description

Analysis management method and system based on big data security
Technical Field
The invention relates to the technical field of data security, in particular to an analysis management method and system based on big data security.
Background
In the big data age, the value of data is increasingly prominent, and the data security problem is also becoming serious. The large data platform is used as a core for data processing and storage, and the security of the large data platform is directly related to the stability of the whole data ecology and the availability of the data. The traditional data security management method is subject to massive data, complex network environments and continuously evolving attack means, and is easy to catch and break through, so that the increasingly-growing security requirements are difficult to meet.
Firstly, the conventional method often cannot acquire and process the network protection information of the big data service channel port in real time, so that hysteresis exists in the safety response. This hysteresis is especially deadly in the face of rapidly propagating malicious code and zero-day attacks, and can cause immeasurable losses.
Secondly, when the conventional method is used for coping with complex attack means, accurate identification and defense are often difficult due to lack of an effective code identification and matching mechanism. This not only reduces the accuracy of the security protection, but also increases the risk of data leakage and system paralysis.
Furthermore, the conventional method has limitations in optimizing and updating data security protection. Because the latest security protection strategy and code optimization scheme cannot be timely obtained, the security protection capability of the large data platform is difficult to continuously improve.
Disclosure of Invention
The invention mainly aims to provide an analysis management method and system based on big data security, which are used for realizing the security protection and the optimization updating of a big data service channel port by acquiring network protection information of the big data service channel port in real time, utilizing a matching tree mechanism to identify attack means codes and combining an OTA optimization technology and a PaaS architecture technology.
In order to achieve the above object, the present invention provides an analysis management method based on big data security, which is used in a data platform and is communicatively connected with a plurality of big data service channel ports through the data platform, the method includes:
Acquiring network protection information of a big data service channel port, wherein the network protection information comprises first protection log data and first protection code data;
at the same moment, adding the first protection log data into a virus library, and recording the attacked information, the protection success information and the attack means code in the first protection log data through the virus library;
At the same moment, the first protection code data is compressed in an OTA optimizing library, an OTA optimizing folder for storing the first protection code data is created in the OTA optimizing library, and the OTA optimizing folder and a virus library are associated and bound by using an OTA over-the-air downloading technology;
Identifying the attack means codes by using a matching tree mechanism, screening and matching the first protection log data with second protection log data with the same kind of purpose in a virus library, and identifying second protection code data corresponding to the second protection log data;
Selecting an OTA optimization code in the second protection code data, and converting the OTA optimization code into OTA optimization data by combining a virtualization data updating technology and a paas architecture technology;
and optimizing the first protection code data in the OTA optimization folder through the OTA optimization data, and then generating an OTA update request and sending the OTA update request to the corresponding big data service channel port.
Further, the step of identifying the attack means code by using a matching tree mechanism, screening and matching the first protection log data with second protection log data with the same kind of purpose in a virus library, and identifying the second protection code data corresponding to the second protection log data includes:
Identifying the attack means code in the first protection code data to identify the code type, the application field and the source code of the attack means code;
Performing first-step classification according to the application field by using a matching tree mechanism, determining a storage folder in the same field from a virus library, and performing second-step classification from the folder by using a code type to mark approximate case codes matched with the code type in the folder, wherein the matched approximate case codes comprise one or more items;
And forming a call instruction for the approximate case code, so that the approximate case code is output as the second protection code data according to the call instruction.
Further, the step of classifying the storage folders in the same domain from the virus library according to the application domain by using a matching tree mechanism in the first step, and classifying the storage folders in the same domain according to the code type in the second step to mark out approximate case codes matched with the code type in the folders comprises the following steps:
Using the attack means code as a first node of a matching tree;
using a commit query language which is classified downwards in a first step by taking the specific language DSL in the code domain of the attack means as a first node, and using the application domain to query corresponding folders in the same domain in a virus library through commit query, wherein the folders comprise one or a plurality of items as second nodes;
Performing language rewrite on the commit query language by combining the code language of the folder, writing the commit query language into an ANTLR4 language, querying corresponding approximate case codes from one or a plurality of second nodes by utilizing code types through the ANTLR4 language, and taking the approximate case codes of one or a plurality of items as a third node;
And forming a virus update query tree corresponding to the first protection code through the first node, the second node and the third node, wherein the virus update query tree is used for updating optimization and data call of a virus library.
Further, selecting an OTA optimization code in the second protection code data, and combining a virtualized data updating technology and paas architecture technology to convert the OTA optimization code into OTA optimization data, wherein the method comprises the following steps of:
Matching the attacked information, the protection success information and the second protection code data to select an OTA optimization code for optimizing the first protection code data from the second protection code data;
Editing the configuration file of the OTA optimization code by using the paas architecture, so that the first protection code data and the second protection code data are framed in the same paas architecture;
And carrying out network bridging on the OTA optimization codes edited by the configuration file by utilizing a pre-deployed KVM virtual module, so as to be used for deploying the OTA optimization codes on the first protection code data of the OTA optimization folder.
Further, the step of optimizing the first protection code data in the OTA optimization folder by the OTA optimization data, and then generating an OTA update request and sending the OTA update request to the corresponding big data service channel port includes:
deploying the OTA optimization code on a corresponding code position of first protection code data of an OTA optimization folder;
If the first protection code data is judged to be changed and updated, generating an OTA update request by the OTA optimization folder;
And sending the OTA update request to a big data service channel port, and updating codes of the corresponding big data service channel port according to the change of the first protection code data if the big data service channel port receives the OTA update request.
The invention also provides an analysis management system based on big data security, which comprises:
the system comprises an acquisition unit, a data processing unit and a data processing unit, wherein the acquisition unit is used for acquiring network protection information of a big data service channel port, and the network protection information comprises first protection log data and first protection code data;
The first storage unit is used for adding the first protection log data to a virus library at the same moment, and recording the attacked information, the protection success information and the attack means code in the first protection log data through the virus library;
the second storage unit is used for compressing the first protection code data in an OTA optimizing library at the same moment, creating an OTA optimizing folder for storing the first protection code data in the OTA optimizing library, and performing association binding on the OTA optimizing folder and a virus library by using an OTA over-the-air downloading technology;
The code matching unit is used for identifying the attack means codes by utilizing a matching tree mechanism, screening and matching the first protection log data with second protection log data with the same kind of purposes in a virus library, and identifying second protection code data corresponding to the second protection log data;
The framework unit is used for selecting an OTA optimization code in the second protection code data, and converting the OTA optimization code into OTA optimization data by combining a virtualization data updating technology and a paas architecture technology;
And the optimization updating unit is used for optimizing the first protection code data in the OTA optimization folder through the OTA optimization data, and then generating an OTA updating request and sending the OTA updating request to the corresponding big data service channel port.
Further, the code matching unit includes:
The identification module is used for identifying the attack means code in the first protection code data so as to identify the code type, the application field and the source code of the attack means code;
The matching tree module is used for carrying out first-step classification according to the application field by utilizing a matching tree mechanism, determining a storage folder in the same field from a virus library, and carrying out second-step classification from the folder through a code type so as to mark approximate case codes matched with the code type in the folder, wherein the matched approximate case codes comprise one or more items;
and the calling module is used for forming a calling instruction for the approximate case code so as to output the approximate case code as the second protection code data according to the calling instruction.
Further, the matching tree module includes:
A first node sub-module, which uses the attack means code as a first node of a matching tree;
A second node submodule, configured to use a commit query language classified in a first step downwards by using a specific language DSL in the code domain of the attack means as a first node, and use the application domain to query a corresponding folder in the same domain in a virus library through commit query, where the folder includes one or several items as a second node;
The third node submodule is used for carrying out language rewriting on the commit query language in combination with the code language of the folder, writing the commit query language into an ANTLR4 language, querying corresponding approximate case codes from one or a plurality of second nodes by utilizing the code types through the ANTLR4 language, and taking the approximate case codes of one or a plurality of second nodes as a third node;
And the query tree module is used for forming a virus update query tree corresponding to the first protection code through the first node, the second node and the third node, wherein the virus update query tree is used for updating optimization and data calling of a virus library.
The invention also provides a computer device, which comprises a memory and a processor, wherein the memory stores a computer program, and the processor realizes the steps of the analysis management method based on big data security when executing the computer program.
The present invention also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the above-described big data security based analysis management method.
The analysis management method and system based on big data security provided by the invention have the following beneficial effects:
(1) By acquiring and processing the network protection information of the big data service channel port in real time, the invention can respond to various security threats in real time, and effectively reduce the security risk caused by response lag.
(2) By utilizing an advanced matching tree mechanism to identify the attack means code, the invention can more accurately identify and defend complex attacks, thereby improving the precision of safety protection and reducing false alarm and missing report rate.
(3) By combining an OTA (Over-the-Air) optimization technology and a PaaS (Platform AS A SERVICE) architecture technology, the invention realizes the dynamic optimization and updating of the security protection strategy, so that the system can flexibly cope with the continuously evolving security threat and has good expandability.
(4) By means of real-time monitoring and dynamic adjustment of the safety protection strategy, the safety of a large data platform can be obviously improved, and the integrity, confidentiality and usability of data are effectively protected.
(5) The automatic safety analysis and management reduces the manual intervention requirement, reduces the operation and maintenance cost and improves the safety management efficiency.
Drawings
FIG. 1 is a flow chart of a big data security based analysis management method according to an embodiment of the invention;
FIG. 2 is a block diagram of an analysis management system based on big data security in an embodiment of the present invention;
Fig. 3 is a block diagram schematically illustrating a structure of a computer device according to an embodiment of the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Referring to fig. 1, a flow chart of an analysis management method based on big data security according to the present invention is provided, and the analysis management method based on big data security is used in a data platform and is communicatively connected with a plurality of big data service channel ports through the data platform, and the method includes:
s1, acquiring network protection information of a big data service channel port, wherein the network protection information comprises first protection log data and first protection code data;
S2.1, adding the first protection log data to a virus library at the same moment, and recording attacked information, protection success information and attack means codes in the first protection log data through the virus library;
S2.2, at the same moment, the first protection code data are compressed in an OTA optimizing library, an OTA optimizing folder for storing the first protection code data is created in the OTA optimizing library, and the OTA optimizing folder and a virus library are associated and bound by using an OTA over-the-air downloading technology;
S3, identifying the attack means codes by using a matching tree mechanism, screening and matching the first protection log data with second protection log data with the same kind of purposes in a virus library, and identifying second protection code data corresponding to the second protection log data;
S4, selecting an OTA optimization code in the second protection code data, and converting the OTA optimization code into OTA optimization data by combining a virtualization data updating technology and a paas architecture technology;
And S5, optimizing the first protection code data in the OTA optimization folder through the OTA optimization data, and then generating an OTA update request and sending the OTA update request to the corresponding big data service channel port.
Specifically, the step of identifying the attack means code by using a matching tree mechanism, screening and matching the first protection log data with second protection log data with the same kind of purpose in a virus library, and identifying the second protection code data corresponding to the second protection log data includes:
Identifying the attack means code in the first protection code data to identify the code type, the application field and the source code of the attack means code;
Performing first-step classification according to the application field by using a matching tree mechanism, determining a storage folder in the same field from a virus library, and performing second-step classification from the folder by using a code type to mark approximate case codes matched with the code type in the folder, wherein the matched approximate case codes comprise one or more items;
And forming a call instruction for the approximate case code, so that the approximate case code is output as the second protection code data according to the call instruction.
Further, the step of classifying the storage folders in the same domain from the virus library according to the application domain by using a matching tree mechanism in the first step, and classifying the storage folders in the same domain according to the code type in the second step to mark out approximate case codes matched with the code type in the folders comprises the following steps:
Using the attack means code as a first node of a matching tree;
using a commit query language which is classified downwards in a first step by taking the specific language DSL in the code domain of the attack means as a first node, and using the application domain to query corresponding folders in the same domain in a virus library through commit query, wherein the folders comprise one or a plurality of items as second nodes;
Performing language rewrite on the commit query language by combining the code language of the folder, writing the commit query language into an ANTLR4 language, querying corresponding approximate case codes from one or a plurality of second nodes by utilizing code types through the ANTLR4 language, and taking the approximate case codes of one or a plurality of items as a third node;
And forming a virus update query tree corresponding to the first protection code through the first node, the second node and the third node, wherein the virus update query tree is used for updating optimization and data call of a virus library.
In the specific embodiment of the present invention,
In the process of constructing the matching tree, the known attack means code is first used as the root node or the first node of the matching tree. This means that the construction of the entire matching tree will be spread around these specific attack codes so that potential attack behaviour similar to these codes can be identified quickly and accurately later.
Next, the construction of the matching tree is further refined using Domain Specific Language (DSL) associated with the attack means code. DSL is a computer language that is generally simpler, easier to understand and use than a general purpose programming language for a particular field or problem. Here, DSL is converted into a commit query language for querying the virus library for folders in the same domain as the attack means code. These folders may contain other code or information related to the means of attack and are important references for building a matching tree.
The queried folder is considered to be the second node of the matching tree. These folders may contain one or more pieces of content related to the attack means code that will play a key role in the subsequent construction of the matching tree. By taking the folder as the second node, the depth and breadth of the matching tree can be further expanded, and the identification capability of the matching tree on potential attacks can be improved.
In order to more effectively query cases from folders that are similar to attack means codes, the commit query language needs to be rewritten. Here, the ANTLR4 language is selected for overwriting. ANTLR4 is a powerful parser generator that can generate corresponding parsers and lexical parsers from input grammar rules. By rewriting the commit query language to the ANTLR4 language, cases similar to the attack means code can be more accurately queried using the resolution capability of ANTLR 4.
Using the rewritten ANTLR4 query language, a similar approximate case code to the attack means code can be queried from the second node (i.e., folder) according to the code type. These approximate case codes are considered the third node of the matching tree, which provides more detail and depth to the matching tree, helping to more accurately identify potential aggression.
Finally, by combining the first node (attack means code), the second node (folder), and the third node (approximate case code), a complete virus update query tree is formed. The query tree can help us to quickly and accurately identify potential threats similar to known attack means, and can also be used for updating optimization and data calling of a virus library. By continuously updating and optimizing the virus library, the safety protection capability of a big data platform can be improved, and the integrity and usability of data are ensured.
In one embodiment, selecting an OTA optimization code in the second protection code data, and transforming the OTA optimization code into OTA optimization data by combining a virtualization data update technique and a paas architecture technique, includes:
Matching the attacked information, the protection success information and the second protection code data to select an OTA optimization code for optimizing the first protection code data from the second protection code data;
Editing the configuration file of the OTA optimization code by using the paas architecture, so that the first protection code data and the second protection code data are framed in the same paas architecture;
And carrying out network bridging on the OTA optimization codes edited by the configuration file by utilizing a pre-deployed KVM virtual module, so as to be used for deploying the OTA optimization codes on the first protection code data of the OTA optimization folder.
In the specific implementation process:
performing configuration file editing on the OTA optimization code through the PaaS architecture: the PaaS (Platform AS A SERVICE) architecture provides an integrated environment for developing and deploying applications. In this step, the system uses the PaaS architecture to edit the configuration file of the OTA optimization code. The purpose of this is to ensure that the first and second guard code data can be framed in the same PaaS architecture, thereby enabling seamless integration and co-operation.
Network bridging is performed by using a pre-deployed KVM virtual module: KVM (kernel-based Virtual Machine) is a virtualization technology that allows multiple virtual machines to run on the same physical server. In this step, the system utilizes the pre-deployed KVM virtual module for network bridging. This means that the OTA optimization code will be deployed in a virtualized environment and can communicate with other system components through network bridging. This has the advantage that flexible resource allocation can be achieved, different security domains can be isolated and the overall reliability of the system can be improved.
Deploying the OTA optimization code on the first protection code data of the OTA optimization folder: the final step is to deploy the OTA optimization code through configuration file editing and network bridging to the first protection code data in the OTA optimization folder. By the aid of the method, the first protection code data can be timely updated and optimized, and accordingly safety protection capability of the system is improved. Meanwhile, by integrating the OTA optimization code with the first protection code data, the system can respond to new security threats more quickly and take corresponding protection measures.
And optimizing the first protection code data in the OTA optimization folder through the OTA optimization data, and generating an OTA update request and sending the OTA update request to the corresponding big data service channel port, wherein the step comprises the following steps:
deploying the OTA optimization code on a corresponding code position of first protection code data of an OTA optimization folder;
If the first protection code data is judged to be changed and updated, generating an OTA update request by the OTA optimization folder;
And sending the OTA update request to a big data service channel port, and updating codes of the corresponding big data service channel port according to the change of the first protection code data if the big data service channel port receives the OTA update request.
Referring to fig. 2, an analysis management system based on big data security according to the present invention includes:
the system comprises an acquisition unit, a data processing unit and a data processing unit, wherein the acquisition unit is used for acquiring network protection information of a big data service channel port, and the network protection information comprises first protection log data and first protection code data;
The first storage unit is used for adding the first protection log data to a virus library at the same moment, and recording the attacked information, the protection success information and the attack means code in the first protection log data through the virus library;
the second storage unit is used for compressing the first protection code data in an OTA optimizing library at the same moment, creating an OTA optimizing folder for storing the first protection code data in the OTA optimizing library, and performing association binding on the OTA optimizing folder and a virus library by using an OTA over-the-air downloading technology;
The code matching unit is used for identifying the attack means codes by utilizing a matching tree mechanism, screening and matching the first protection log data with second protection log data with the same kind of purposes in a virus library, and identifying second protection code data corresponding to the second protection log data;
The framework unit is used for selecting an OTA optimization code in the second protection code data, and converting the OTA optimization code into OTA optimization data by combining a virtualization data updating technology and a paas architecture technology;
And the optimization updating unit is used for optimizing the first protection code data in the OTA optimization folder through the OTA optimization data, and then generating an OTA updating request and sending the OTA updating request to the corresponding big data service channel port.
Specifically, the code matching unit includes:
The identification module is used for identifying the attack means code in the first protection code data so as to identify the code type, the application field and the source code of the attack means code;
The matching tree module is used for carrying out first-step classification according to the application field by utilizing a matching tree mechanism, determining a storage folder in the same field from a virus library, and carrying out second-step classification from the folder through a code type so as to mark approximate case codes matched with the code type in the folder, wherein the matched approximate case codes comprise one or more items;
and the calling module is used for forming a calling instruction for the approximate case code so as to output the approximate case code as the second protection code data according to the calling instruction.
Specifically, the matching tree module includes:
A first node sub-module, which uses the attack means code as a first node of a matching tree;
A second node submodule, configured to use a commit query language classified in a first step downwards by using a specific language DSL in the code domain of the attack means as a first node, and use the application domain to query a corresponding folder in the same domain in a virus library through commit query, where the folder includes one or several items as a second node;
The third node submodule is used for carrying out language rewriting on the commit query language in combination with the code language of the folder, writing the commit query language into an ANTLR4 language, querying corresponding approximate case codes from one or a plurality of second nodes by utilizing the code types through the ANTLR4 language, and taking the approximate case codes of one or a plurality of second nodes as a third node;
And the query tree module is used for forming a virus update query tree corresponding to the first protection code through the first node, the second node and the third node, wherein the virus update query tree is used for updating optimization and data calling of a virus library.
Referring to fig. 3, in an embodiment of the present invention, there is further provided a computer device, which may be a server, and an internal structure thereof may be as shown in fig. 3. The computer device includes a processor, a memory, a display screen, an input device, a network interface, and a database connected by a system bus. Wherein the computer is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used to store the corresponding data in this embodiment. The network interface of the computer device is used for communicating with an external terminal through a network connection. Which computer program, when being executed by a processor, carries out the above-mentioned method.
It will be appreciated by those skilled in the art that the architecture shown in fig. 3 is merely a block diagram of a portion of the architecture in connection with the present inventive arrangements and is not intended to limit the computer devices to which the present inventive arrangements are applicable.
An embodiment of the present invention also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the above method. It is understood that the computer readable storage medium in this embodiment may be a volatile readable storage medium or a nonvolatile readable storage medium.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium provided by the present invention and used in embodiments may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual speed data rate SDRAM (SSRSDRAM), enhanced SDRAM (ESDRAM), synchronous link (SYNCHLINK) DRAM (SLDRAM), memory bus (rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that comprises the element.
The foregoing description is only of the preferred embodiments of the present invention and is not intended to limit the scope of the invention, and all equivalent structures or equivalent processes using the descriptions and drawings of the present invention or direct or indirect application in other related technical fields are included in the scope of the present invention.

Claims (10)

1. The analysis management method based on big data security is used in a data platform and is in communication connection with a plurality of big data service channel ports through the data platform, and is characterized by comprising the following steps:
Acquiring network protection information of a big data service channel port, wherein the network protection information comprises first protection log data and first protection code data;
at the same moment, adding the first protection log data into a virus library, and recording the attacked information, the protection success information and the attack means code in the first protection log data through the virus library;
At the same moment, the first protection code data is compressed in an OTA optimizing library, an OTA optimizing folder for storing the first protection code data is created in the OTA optimizing library, and the OTA optimizing folder and a virus library are associated and bound by using an OTA over-the-air downloading technology;
Identifying the attack means codes by using a matching tree mechanism, screening and matching the first protection log data with second protection log data with the same kind of purpose in a virus library, and identifying second protection code data corresponding to the second protection log data;
Selecting an OTA optimization code in the second protection code data, and converting the OTA optimization code into OTA optimization data by combining a virtualization data updating technology and a paas architecture technology;
and optimizing the first protection code data in the OTA optimization folder through the OTA optimization data, and then generating an OTA update request and sending the OTA update request to the corresponding big data service channel port.
2. The analysis and management method based on big data security according to claim 1, wherein the step of identifying the attack means code by using a matching tree mechanism, screening and matching the first protection log data with second protection log data of the same kind of purpose in the virus library, and identifying the second protection code data corresponding to the second protection log data includes:
Identifying the attack means code in the first protection code data to identify the code type, the application field and the source code of the attack means code;
Performing first-step classification according to the application field by using a matching tree mechanism, determining a storage folder in the same field from a virus library, and performing second-step classification from the folder by using a code type to mark approximate case codes matched with the code type in the folder, wherein the matched approximate case codes comprise one or more items;
And forming a call instruction for the approximate case code, so that the approximate case code is output as the second protection code data according to the call instruction.
3. The analysis management method based on big data security according to claim 2, wherein the step of performing a first step of classification according to application fields by using a matching tree mechanism, determining a storage folder in the same field from a virus library, and performing a second step of classification from the folder by code types to map out approximate case codes matched with the code types in the folder, comprises:
Using the attack means code as a first node of a matching tree;
using a commit query language which is classified downwards in a first step by taking the specific language DSL in the code domain of the attack means as a first node, and using the application domain to query corresponding folders in the same domain in a virus library through commit query, wherein the folders comprise one or a plurality of items as second nodes;
Performing language rewrite on the commit query language by combining the code language of the folder, writing the commit query language into an ANTLR4 language, querying corresponding approximate case codes from one or a plurality of second nodes by utilizing code types through the ANTLR4 language, and taking the approximate case codes of one or a plurality of items as a third node;
And forming a virus update query tree corresponding to the first protection code through the first node, the second node and the third node, wherein the virus update query tree is used for updating optimization and data call of a virus library.
4. The analysis and management method based on big data security according to claim 1, wherein the step of selecting an OTA optimization code in the second protection code data and transforming the OTA optimization code into OTA optimization data by combining a virtualized data update technique and a paas architecture technique comprises:
Matching the attacked information, the protection success information and the second protection code data to select an OTA optimization code for optimizing the first protection code data from the second protection code data;
Editing the configuration file of the OTA optimization code by using the paas architecture, so that the first protection code data and the second protection code data are framed in the same paas architecture;
And carrying out network bridging on the OTA optimization codes edited by the configuration file by utilizing a pre-deployed KVM virtual module, so as to be used for deploying the OTA optimization codes on the first protection code data of the OTA optimization folder.
5. The big data security based analysis management method according to claim 1, wherein the step of optimizing the first protection code data in the OTA optimization folder by the OTA optimization data, and then generating an OTA update request and sending the OTA update request to the corresponding big data service channel port includes:
deploying the OTA optimization code on a corresponding code position of first protection code data of an OTA optimization folder;
If the first protection code data is judged to be changed and updated, generating an OTA update request by the OTA optimization folder;
And sending the OTA update request to a big data service channel port, and updating codes of the corresponding big data service channel port according to the change of the first protection code data if the big data service channel port receives the OTA update request.
6. An analysis management system based on big data security, comprising:
the system comprises an acquisition unit, a data processing unit and a data processing unit, wherein the acquisition unit is used for acquiring network protection information of a big data service channel port, and the network protection information comprises first protection log data and first protection code data;
The first storage unit is used for adding the first protection log data to a virus library at the same moment, and recording the attacked information, the protection success information and the attack means code in the first protection log data through the virus library;
the second storage unit is used for compressing the first protection code data in an OTA optimizing library at the same moment, creating an OTA optimizing folder for storing the first protection code data in the OTA optimizing library, and performing association binding on the OTA optimizing folder and a virus library by using an OTA over-the-air downloading technology;
The code matching unit is used for identifying the attack means codes by utilizing a matching tree mechanism, screening and matching the first protection log data with second protection log data with the same kind of purposes in a virus library, and identifying second protection code data corresponding to the second protection log data;
The framework unit is used for selecting an OTA optimization code in the second protection code data, and converting the OTA optimization code into OTA optimization data by combining a virtualization data updating technology and a paas architecture technology;
And the optimization updating unit is used for optimizing the first protection code data in the OTA optimization folder through the OTA optimization data, and then generating an OTA updating request and sending the OTA updating request to the corresponding big data service channel port.
7. The big data security based analysis management system of claim 6, wherein the code matching unit comprises:
The identification module is used for identifying the attack means code in the first protection code data so as to identify the code type, the application field and the source code of the attack means code;
The matching tree module is used for carrying out first-step classification according to the application field by utilizing a matching tree mechanism, determining a storage folder in the same field from a virus library, and carrying out second-step classification from the folder through a code type so as to mark approximate case codes matched with the code type in the folder, wherein the matched approximate case codes comprise one or more items;
and the calling module is used for forming a calling instruction for the approximate case code so as to output the approximate case code as the second protection code data according to the calling instruction.
8. The big data security based analytics management system of claim 7, wherein the matching tree module comprises:
A first node sub-module, which uses the attack means code as a first node of a matching tree;
A second node submodule, configured to use a commit query language classified in a first step downwards by using a specific language DSL in the code domain of the attack means as a first node, and use the application domain to query a corresponding folder in the same domain in a virus library through commit query, where the folder includes one or several items as a second node;
The third node submodule is used for carrying out language rewriting on the commit query language in combination with the code language of the folder, writing the commit query language into an ANTLR4 language, querying corresponding approximate case codes from one or a plurality of second nodes by utilizing the code types through the ANTLR4 language, and taking the approximate case codes of one or a plurality of second nodes as a third node;
And the query tree module is used for forming a virus update query tree corresponding to the first protection code through the first node, the second node and the third node, wherein the virus update query tree is used for updating optimization and data calling of a virus library.
9. A computer device comprising a memory and a processor, the memory having stored therein a computer program, characterized in that the processor, when executing the computer program, implements the steps of the big data security based analysis management method of any of claims 1 to 5.
10. A computer-readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the big data security based analysis management method of any of claims 1 to 5.
CN202410289835.7A 2024-03-14 2024-03-14 Analysis management method and system based on big data security Active CN117909978B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410289835.7A CN117909978B (en) 2024-03-14 2024-03-14 Analysis management method and system based on big data security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410289835.7A CN117909978B (en) 2024-03-14 2024-03-14 Analysis management method and system based on big data security

Publications (2)

Publication Number Publication Date
CN117909978A true CN117909978A (en) 2024-04-19
CN117909978B CN117909978B (en) 2024-06-28

Family

ID=90684207

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410289835.7A Active CN117909978B (en) 2024-03-14 2024-03-14 Analysis management method and system based on big data security

Country Status (1)

Country Link
CN (1) CN117909978B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050108562A1 (en) * 2003-06-18 2005-05-19 Khazan Roger I. Technique for detecting executable malicious code using a combination of static and dynamic analyses
CN105897728A (en) * 2016-04-27 2016-08-24 江苏警官学院 Anti-virus system based on SDN (Software Defined Network)
CN106778268A (en) * 2016-11-28 2017-05-31 广东省信息安全测评中心 Malicious code detecting method and system
CN110135157A (en) * 2019-04-04 2019-08-16 国家计算机网络与信息安全管理中心 Malware homology analysis method, system, electronic equipment and storage medium
CN111400724A (en) * 2020-05-08 2020-07-10 中国人民解放军国防科技大学 Operating system vulnerability detection method, system and medium based on code similarity analysis
CN111726357A (en) * 2020-06-18 2020-09-29 北京优特捷信息技术有限公司 Attack behavior detection method and device, computer equipment and storage medium
CN113076543A (en) * 2021-03-22 2021-07-06 四川大学 Construction method for vulnerability exploitation knowledge base in social network
CN113971288A (en) * 2021-10-18 2022-01-25 广东科学技术职业学院 Big data technology-based smart campus security management and control platform
CN115001839A (en) * 2022-06-21 2022-09-02 南通荣合计算机科技有限公司 Information security protection system and method based on Internet big data
KR20230103275A (en) * 2021-12-31 2023-07-07 주식회사 샌즈랩 Apparatus for processing cyber threat information, method for processing cyber threat information, and medium for storing a program processing cyber threat information
CN116842515A (en) * 2023-07-04 2023-10-03 华中科技大学 Source code classification model robustness enhancement method, system and processor
CN116992440A (en) * 2022-04-18 2023-11-03 深圳市腾讯网域计算机网络有限公司 Code matching method, device, electronic equipment and storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050108562A1 (en) * 2003-06-18 2005-05-19 Khazan Roger I. Technique for detecting executable malicious code using a combination of static and dynamic analyses
CN105897728A (en) * 2016-04-27 2016-08-24 江苏警官学院 Anti-virus system based on SDN (Software Defined Network)
CN106778268A (en) * 2016-11-28 2017-05-31 广东省信息安全测评中心 Malicious code detecting method and system
CN110135157A (en) * 2019-04-04 2019-08-16 国家计算机网络与信息安全管理中心 Malware homology analysis method, system, electronic equipment and storage medium
CN111400724A (en) * 2020-05-08 2020-07-10 中国人民解放军国防科技大学 Operating system vulnerability detection method, system and medium based on code similarity analysis
CN111726357A (en) * 2020-06-18 2020-09-29 北京优特捷信息技术有限公司 Attack behavior detection method and device, computer equipment and storage medium
CN113076543A (en) * 2021-03-22 2021-07-06 四川大学 Construction method for vulnerability exploitation knowledge base in social network
CN113971288A (en) * 2021-10-18 2022-01-25 广东科学技术职业学院 Big data technology-based smart campus security management and control platform
KR20230103275A (en) * 2021-12-31 2023-07-07 주식회사 샌즈랩 Apparatus for processing cyber threat information, method for processing cyber threat information, and medium for storing a program processing cyber threat information
CN116992440A (en) * 2022-04-18 2023-11-03 深圳市腾讯网域计算机网络有限公司 Code matching method, device, electronic equipment and storage medium
CN115001839A (en) * 2022-06-21 2022-09-02 南通荣合计算机科技有限公司 Information security protection system and method based on Internet big data
CN116842515A (en) * 2023-07-04 2023-10-03 华中科技大学 Source code classification model robustness enhancement method, system and processor

Also Published As

Publication number Publication date
CN117909978B (en) 2024-06-28

Similar Documents

Publication Publication Date Title
US10581879B1 (en) Enhanced malware detection for generated objects
CN107317724B (en) Data acquisition system and method based on cloud computing technology
CN111984228B (en) Interface document processing method and device, computer equipment and storage medium
CN110022311B (en) Attack graph-based automatic generation method for cloud outsourcing service data leakage safety test case
CN103778373A (en) Virus detection method and device
CN106250104A (en) A kind of remote operating system for server, method and device
CN108322458B (en) Web application intrusion detection method, system, computer equipment and storage medium
CN111881473A (en) Privacy file protection method and device, computer equipment and readable storage medium
CN113486350B (en) Method, device, equipment and storage medium for identifying malicious software
CN103679027A (en) Searching and killing method and device for kernel level malware
CN114285626B (en) Honeypot attack chain construction method and honeypot system
CN117909978B (en) Analysis management method and system based on big data security
CN111625296B (en) Method for protecting program by constructing code copy
CN109040089B (en) Network policy auditing method, equipment and computer readable storage medium
CN117093320A (en) Gasket layer for intercepting calls between upper and lower layers of a container image
CN113489773B (en) Data access method, device, equipment and medium
CN113518055B (en) Data security protection processing method and device, storage medium and terminal
CN109492144B (en) Association relation analysis method, device and storage medium for software system
CN113992371A (en) Method and device for generating threat tag of flow log and electronic equipment
CN107741956B (en) Log searching method based on web container configuration file
CN113162951B (en) Threat detection method, threat model generation method, threat detection device, threat model generation device, electronic equipment and storage medium
CN112394940B (en) Method, device and computer equipment for converting code grammar
CN118363586B (en) Method, device, computer equipment and storage medium for taking feature number in strong real time
CN114553930B (en) System integration method, device, computer equipment and storage medium
CN117034278A (en) Vulnerability detection method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant