Unlock instant, AI-driven research and patent intelligence for your innovation.

Network security implementation system and method based on big data platform

A technology of big data platform and network security, which is applied in the field of network security implementation system based on big data platform, and can solve problems such as heavy workload, network congestion during data time, data loss, etc.

Active Publication Date: 2018-06-15
SICHUAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] At present, with the development of computer technology and the Internet, many governments and enterprises are building big data, and the construction of big data plays a very important role in the development direction of enterprises, the improvement of government management level and service methods, However, in the existing big data processing, the data is often collected together and then classified, resulting in a large workload in the later stage. Due to the huge amount of data, the network is blocked when receiving data, and there is a problem of data loss.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security implementation system and method based on big data platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] Network security implementation system based on big data platform, such as figure 1 As shown, a big data processing platform and a distributed computer group connected to the big data processing platform are provided. The big data processing platform is provided with a data collector, an intelligent collection device, a redundant data cleaning system, and a big data management system. , Data puller, big data server, data comparator, big data storage pool, big data operation log recorder and big data security storage system, the distributed computer cluster and data collector are all connected to the Internet, the data collection The device is connected to the intelligent collection equipment, the redundant data cleaning system and the big data management system in turn. The big data management system is connected to the big data server through the data tractor, and the big data server is connected to the big data storage pool through the data comparator. Connected, the b...

Embodiment 2

[0076] This embodiment is further optimized on the basis of the above embodiment, and further to better implement the network security implementation system of the present invention, such as figure 1 As shown, the following structure is particularly set: the distributed computer cluster is provided with a first-tier switch, a first-tier firewall, a second-tier switch, an intrusion detection engine, an anti-DDoS system, and an enterprise network architecture. The layer switches are connected to the first layer firewall, the second layer switches, the intrusion detection engine and the anti-DDoS system in turn. The second layer switches and the anti-DDoS system are all connected to the enterprise network architecture, and the first layer switches are connected to the Internet.

[0077] The architecture of the distributed computer cluster has the following characteristics:

[0078] It can protect against DDoS attacks, hacker intrusions, viruses, worms and other common Internet securit...

Embodiment 3

[0082] This embodiment is further optimized on the basis of the above embodiment, and further to better implement the network security implementation system of the present invention, such as figure 1 As shown, the following structure is particularly set: the enterprise network structure is provided with a local area network user structure and a wide area network user structure, the local area network user structure is respectively connected to the second layer switch and the wide area network user structure, and the wide area network user structure is connected to The anti-DDoS system is connected.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security enforcement system and method based on a big data platform. The network security enforcement system is provided with a big data processing platform and a distributed computer group in connection with the big data processing platform. The big data processing platform is internally provided with a data collector, an intelligent collection device, a redundant data cleaning system, a big data management system, a data tractor, a big data server, a data contrast device, a big data storage pool, a big data operation log recorder and a big data safe storage system, wherein the big data server transmits a sub class of big data to the big data storage pool for storage through the data contrast device with a hardware security protection function; in a process of uploading the sub class of big data to the big data storage pool through the data contrast device, the data contrast device calls data stored in the big data safe storage system to perform comparison with the uploaded sub class of big data. The system and method can reduce cost investment, meanwhile further improve data safe transmission levels, and guarantee data integrity of uplinking or issuing.

Description

Technical field [0001] The present invention relates to the technical fields of big data, network security, etc., specifically, a network security implementation system and method based on a big data platform. Background technique [0002] Network security means that the hardware and software of the network system and the data in the system are protected from damage, modification, or leakage due to accidental or malicious reasons. The system operates continuously, reliably and normally, and network services are not interrupted. [0003] Main features: [0004] 1. Confidentiality, the feature that information is not disclosed to or used by unauthorized users, entities or processes. [0005] 2. Integrity, the feature that data cannot be changed without authorization. That is, the information remains unmodified, undamaged or lost during storage or transmission. [0006] 3. Usability, the feature that can be accessed by authorized entities and used on demand. That is, can you access the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/08H04L63/1408H04L63/1433
Inventor 杨进王红军李勤张欣张建东
Owner SICHUAN UNIV