Big data security visualization interaction analysis system and method

An interactive analysis and big data technology, applied in the field of data security, can solve problems such as data processing stagnation, untimely processing, and meaningless data

Active Publication Date: 2016-08-10
NSOC INFORMATION TECH CO LTD
View PDF4 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, each system of an enterprise will generate tens of thousands of data. Although there are many traditional logs or other professional tools that can help enterprises analyze these data, traditional security product tools cannot bring us efficiency. IPS/IDS, firewall/UTM, AV, and log systems have tens of millions of pieces of information every day, but the processing of data by traditional product tools currently only stays in separate, independent, simple charts and simple lists In the way of que

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data security visualization interaction analysis system and method
  • Big data security visualization interaction analysis system and method
  • Big data security visualization interaction analysis system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0119] See figure 1 The present invention discloses a security visualized interactive analysis system and method based on big data. The system includes: advanced warning center module 1, time axis longitudinal correlation analyzer module 2, related geographic information tracking display module 3, raw data drilling and navigation Unit module 4, safe gathering direction discovery horizontal association analyzer module 5, data acquisition engine module 6, data classification module 7, data storage module 8, rule library processing unit module 9.

[0120] The data collection engine module 6 includes firewalls, IPS / IDS, switches, servers, audit systems, AV / virus, behavior management, software applications, and other types of data collection sensors used to collect massive security big data from various network objects, classification And collected to the data classification module 7.

[0121] The data storage module 8 is used to collect and classify the big safety data collected from ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a large data security visualization interactive analysis system and method. The system includes an advanced early warning center module, a time axis longitudinal correlation analyzer module, a related geographic information tracking display module, an original data drilling and navigation module, and a security gathering module. A horizontal association analyzer module, a data acquisition engine module, a data classification module, a data storage module, and a rule base processing module are found. The present invention splits and interprets the boring and professional result data presented in a single chart, synchronously further excavates the time elements, relationship elements, and geographical location information elements contained in it, and performs synchronous multi-dimensional presentation, enabling non-professional Management decision makers have intuitive and perceptual cognitive ability for safety.

Description

Technical field [0001] The present invention belongs to the technical field of data security, and relates to a big data security analysis system, in particular to a big data security visualized interactive analysis system; meanwhile, the present invention also relates to a big data security visualized interactive analysis method. Background technique [0002] The nature of network security tells us that it has long needed to integrate the idea of ​​big data. If you want to prevent the outbreak of the crisis, you cannot collect random samples, but all data. The health of the enterprise network needs more and broader data to evaluate . Today, when security threats are ubiquitous, this requires enterprises to have the first time insight into network changes, perceive problematic data, and provide effective security strategies, while also providing decision makers with the means to make business decisions quickly in accordance with. At present, each system of an enterprise generate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30
Inventor 张鹏施向阳
Owner NSOC INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products