Network security enforcement system and method based on big data platform

A big data platform and network security technology, which is applied in the field of network security implementation system based on big data platform, can solve the problems of network congestion, data loss, heavy workload, etc., to reduce cost investment and ensure safety and integrity , Improve the effect of data security transmission level

Active Publication Date: 2016-04-20
SICHUAN UNIV
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] At present, with the development of computer technology and the Internet, many governments and enterprises are building big data, and the construction of big data plays a very important role in the development direction of enterprises, the improvement of government management level

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security enforcement system and method based on big data platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] A network security implementation system based on a big data platform, such as figure 1 As shown, a big data processing platform and a distributed computer group connected to the big data processing platform are provided, and a data collector, an intelligent collection device, a redundant data cleaning system, and a big data management system are arranged in the big data processing platform , a data tractor, a big data server, a data comparator, a big data storage pool, a big data operation log recorder and a big data safe storage system, the distributed computer group and the data collector are all connected to the Internet, and the data collection The device is sequentially connected to the intelligent acquisition equipment, the redundant data cleaning system and the big data management system, the big data management system is connected to the big data server through the data tractor, and the big data server is connected to the big data storage pool through the data c...

Embodiment 2

[0076] This embodiment is further optimized on the basis of the above embodiments, further to better realize the network security implementation system of the present invention, such as figure 1 As shown, the following structure is particularly arranged: the distributed computer group is provided with a first-layer switch, a first-layer firewall, a second-layer switch, an intrusion detection engine, an anti-DDoS system, and an enterprise network architecture, and the first The layer switch is connected to the first layer firewall, the second layer switch, the intrusion detection engine and the anti-DDoS system in turn, the second layer switch and the anti-DDoS system are connected to the enterprise network architecture, and the first layer switch is connected to the Internet.

[0077] The architecture of the distributed computer group has the following characteristics:

[0078] It can protect against DDoS attacks, hackers, viruses, worms and other common security threats on th...

Embodiment 3

[0082] This embodiment is further optimized on the basis of the above embodiments, further to better realize the network security implementation system of the present invention, such as figure 1 As shown, it is specially set to the following structure: a local area network user architecture and a wide area network user architecture are arranged in the enterprise network architecture, and the local area network user architecture is connected with the second-layer switch and the wide area network user architecture respectively, and the said wide area network user architecture is connected with the Anti-DDoS system is connected.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security enforcement system and method based on a big data platform. The network security enforcement system is provided with a big data processing platform and a distributed computer group in connection with the big data processing platform. The big data processing platform is internally provided with a data collector, an intelligent collection device, a redundant data cleaning system, a big data management system, a data tractor, a big data server, a data contrast device, a big data storage pool, a big data operation log recorder and a big data safe storage system, wherein the big data server transmits a sub class of big data to the big data storage pool for storage through the data contrast device with a hardware security protection function; in a process of uploading the sub class of big data to the big data storage pool through the data contrast device, the data contrast device calls data stored in the big data safe storage system to perform comparison with the uploaded sub class of big data. The system and method can reduce cost investment, meanwhile further improve data safe transmission levels, and guarantee data integrity of uplinking or issuing.

Description

technical field [0001] The present invention relates to technical fields such as big data, network security, etc., specifically, a network security implementation system and method based on a big data platform. Background technique [0002] Network security means that the hardware and software of the network system and the data in the system are protected from being damaged, changed, or leaked due to accidental or malicious reasons, the system runs continuously and reliably, and the network service is not interrupted. [0003] Main features: [0004] 1. Confidentiality, the characteristic that information is not disclosed to or exploited by unauthorized users, entities or processes. [0005] 2. Integrity, the characteristic that data cannot be changed without authorization. That is, the characteristics that information remains unmodified, undamaged and lost during storage or transmission. [0006] 3. Availability, features that can be accessed by authorized entities and u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/08H04L63/1408H04L63/1433
Inventor 杨进王红军李勤张欣张建东
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products