A Network Security Analysis Method in Big Data Environment

A technology of network security analysis and big data, applied in the field of network security analysis under big data environment, to achieve the effect of improving data authenticity and security

Active Publication Date: 2018-11-20
南方电网数字传媒科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a network security analysis method in a big data environment to solve the problems encountered in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The technical solution of this patent will be further described in detail below in conjunction with specific embodiments.

[0040] A network security analysis method in a big data environment, comprising the following steps:

[0041] Step 1: The user sends an identity authentication request to the authentication server through the client;

[0042] Step 2: The authentication server receives the user's identity authentication request, and performs identity authentication on the user; if the user passes the identity authentication, then perform step 3; otherwise, send an alarm message to the client, prohibit the user from accessing the network, and end;

[0043] Step 3: The user sends a big data resource access request to the big data resource download server through the client;

[0044] Step 4: The big data resource download server downloads the big data resource from the network according to the big data resource access request, and sends the downloaded big data resourc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network safety analysis method under a big data environment. The method comprises the steps of: firstly, an authentication server carries out identity authentication on a user and allows or forbid the user to access a network; the user passing the identify authentication can download required bid data resources through a bid data resource downloading server, and the safety rate of the data resources is determined after data safety analysis is carried out on the big data resources; and then according to the safety rate of the data resources, corresponding safety protection measures are carried out on a client end.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network security analysis method in a big data environment. Background technique [0002] Big data is another disruptive technological revolution in the IT industry after cloud computing and the Internet of Things. Cloud computing mainly provides storage and access places and channels for data assets, and data is the real valuable asset. The amount of business transaction information within the enterprise, commodity logistics information in the Internet world, and human-to-human interaction information and location information in the Internet world will far exceed the carrying capacity of the existing enterprise IT architecture and infrastructure. Real-time requirements It will also greatly exceed the existing computing power. The current mainstream big data security analysis methods do not provide comprehensive data security protection and evaluation measures, only ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0861H04L63/205
Inventor 许驰
Owner 南方电网数字传媒科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products