Network security implementation system and method based on big data platform
A technology of big data platform and network security, which is applied in the field of network security implementation system based on big data platform, and can solve problems such as heavy workload, network congestion during data time, data loss, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0069] Network security implementation system based on big data platform, such as figure 1 As shown, a big data processing platform and a distributed computer group connected to the big data processing platform are provided. The big data processing platform is provided with a data collector, an intelligent collection device, a redundant data cleaning system, and a big data management system. , Data puller, big data server, data comparator, big data storage pool, big data operation log recorder and big data security storage system, the distributed computer cluster and data collector are all connected to the Internet, the data collection The device is connected to the intelligent collection equipment, the redundant data cleaning system and the big data management system in turn. The big data management system is connected to the big data server through the data tractor, and the big data server is connected to the big data storage pool through the data comparator. Connected, the b...
Embodiment 2
[0076] This embodiment is further optimized on the basis of the above embodiment, and further to better implement the network security implementation system of the present invention, such as figure 1 As shown, the following structure is particularly set: the distributed computer cluster is provided with a first-tier switch, a first-tier firewall, a second-tier switch, an intrusion detection engine, an anti-DDoS system, and an enterprise network architecture. The layer switches are connected to the first layer firewall, the second layer switches, the intrusion detection engine and the anti-DDoS system in turn. The second layer switches and the anti-DDoS system are all connected to the enterprise network architecture, and the first layer switches are connected to the Internet.
[0077] The architecture of the distributed computer cluster has the following characteristics:
[0078] It can protect against DDoS attacks, hacker intrusions, viruses, worms and other common Internet securit...
Embodiment 3
[0082] This embodiment is further optimized on the basis of the above embodiment, and further to better implement the network security implementation system of the present invention, such as figure 1 As shown, the following structure is particularly set: the enterprise network structure is provided with a local area network user structure and a wide area network user structure, the local area network user structure is respectively connected to the second layer switch and the wide area network user structure, and the wide area network user structure is connected to The anti-DDoS system is connected.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
