Big data implementation system and method based on network security

A technology of network security and big data, which is applied in the field of big data implementation system based on network security, can solve problems such as heavy workload, data loss, and network congestion during data, to reduce cost investment, ensure safety and integrity, and improve Effect of data security input level

Inactive Publication Date: 2016-08-17
云神科技投资股份有限公司
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] At present, with the development of computer technology and the Internet, many governments and enterprises are building big data, and the construction of big data plays a very important role in the development direction of enterprises, the improvement of government management level and service methods, However, in the existing big data processing, the data is often collected together and then classified, resulting in a large workload in the later stage. Due to the huge amount of data, the network is blocked when receiving data, and there is a problem of data loss.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data implementation system and method based on network security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] A big data implementation system and method based on network security, such as figure 1 As shown, a big data processing platform and a distributed computer group connected to the big data processing platform are provided, and a data collector, an intelligent collection device, a redundant data cleaning system, and a big data management system are arranged in the big data processing platform , a data tractor, a big data server, a data comparator, a big data storage pool, a big data operation log recorder and a big data safe storage system, the distributed computer group and the data collector are all connected to the Internet, and the data collection The device is sequentially connected to the intelligent acquisition equipment, the redundant data cleaning system and the big data management system, the big data management system is connected to the big data server through the data tractor, and the big data server is connected to the big data storage pool through the data c...

Embodiment 2

[0076] This embodiment is further optimized on the basis of the above embodiments, further to better realize the network security implementation system of the present invention, such as figure 1 As shown, the following structure is particularly arranged: the distributed computer group is provided with a first-layer switch, a first-layer firewall, a second-layer switch, an intrusion detection engine, an anti-DDoS system, and an enterprise network architecture, and the first The layer switch is connected to the first layer firewall, the second layer switch, the intrusion detection engine and the anti-DDoS system in turn, the second layer switch and the anti-DDoS system are connected to the enterprise network architecture, and the first layer switch is connected to the Internet.

[0077] The architecture of the distributed computer group has the following characteristics:

[0078] It can protect against DDoS attacks, hackers, viruses, worms and other common security threats on th...

Embodiment 3

[0082] This embodiment is further optimized on the basis of the above embodiments, further to better realize the network security implementation system of the present invention, such as figure 1 As shown, it is specially set to the following structure: a local area network user architecture and a wide area network user architecture are arranged in the enterprise network architecture, and the local area network user architecture is connected with the second-layer switch and the wide area network user architecture respectively, and the said wide area network user architecture is connected with the Anti-DDoS system is connected.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a big data implementation system and method based on network security. A big data processing platform and a distributed computer group connected with the big data processing platform are arranged. The big data processing platform is internally provided with a data collector, an intelligent acquisition device, a redundant data cleaning system, a big data management system, a data traction device, a big data server, a data comparator, a big data storage pool, a big data operation log recorder and a big data secure storage system. The big data server transmits small class big data into the big data storage pool to be stored through the data comparator with the hardware security protection function, and in the process that the small class big data is uploaded to the big data storage pool through the data comparator, the data comparator calls data stored in the big data security storage system to be compared with the small class big data which is uploaded. Cost investment is reduced, the level of data security transmission can be further improved, and integrity of data is ensured during uploading or issuing.

Description

technical field [0001] The present invention relates to technical fields such as big data, network security, etc., specifically, a system and method for implementing big data based on network security. Background technique [0002] Network security means that the hardware and software of the network system and the data in the system are protected from being damaged, changed, or leaked due to accidental or malicious reasons, the system runs continuously and reliably, and the network service is not interrupted. [0003] Main features: [0004] 1. Confidentiality, the characteristic that information is not disclosed to or exploited by unauthorized users, entities or processes. [0005] 2. Integrity, the characteristic that data cannot be changed without authorization. That is, the characteristics that information remains unmodified, undamaged and lost during storage or transmission. [0006] 3. Availability, features that can be accessed by authorized entities and used as re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/20H04L63/02H04L63/0218H04L63/0281H04L63/123H04L63/1408H04L63/1458
Inventor 于欣
Owner 云神科技投资股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products