Big data and trusted computing based information network security self-defense system

A technology of trusted computing and information network, applied in the field of big data, can solve the problem of unsatisfactory processing effect of discrete attributes, and achieve the effect of preventing information security risks, improving clustering stability, and avoiding idleness

Active Publication Date: 2016-12-07
广东新世立种子技术有限公司
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This algorithm can achieve better clustering effect for co

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data and trusted computing based information network security self-defense system
  • Big data and trusted computing based information network security self-defense system
  • Big data and trusted computing based information network security self-defense system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] Embodiment 1: as figure 1 , figure 2 The shown information network security self-defense system based on big data and trusted computing includes a trusted data collection module 10, a trusted data transmission module 20, a risk analysis feedback module 30, a risk detection module 40, a risk Evaluation module 50, security defense module 60 and early warning module 70, the described credible data collection and storage module 10 is used to collect and encrypt the useful data containing user-related information of the storage terminal, when collecting, the network nodes that collect useful data are collected Authentication, to ensure that the data collection environment is trustworthy, and to establish a trust relationship. The trusted data transmission module 20 is used to realize the encrypted transmission of useful data of each module, so as to ensure that useful data will not be obtained arbitrarily;

[0048] The risk detection module 40 is used to perform real-time ...

Embodiment 2

[0077] Embodiment 2: as figure 1 , figure 2 The shown information network security self-defense system based on big data and trusted computing includes a trusted data collection module 10, a trusted data transmission module 20, a risk analysis feedback module 30, a risk detection module 40, a risk Evaluation module 50, security defense module 60 and early warning module 70, the described credible data collection and storage module 10 is used to collect and encrypt the useful data containing user-related information of the storage terminal, when collecting, the network nodes that collect useful data are collected Authentication, to ensure that the data collection environment is trustworthy, and to establish a trust relationship. The trusted data transmission module 20 is used to realize the encrypted transmission of useful data of each module, so as to ensure that useful data will not be obtained arbitrarily;

[0078] The risk detection module 40 is used to perform real-time ...

Embodiment 3

[0107] Embodiment 3: as figure 1 , figure 2 The shown information network security self-defense system based on big data and trusted computing includes a trusted data collection module 10, a trusted data transmission module 20, a risk analysis feedback module 30, a risk detection module 40, a risk Evaluation module 50, security defense module 60 and early warning module 70, the described credible data collection and storage module 10 is used to collect and encrypt the useful data containing user-related information of the storage terminal, and collect the useful data of the network nodes that collect useful data Authentication, to ensure that the data collection environment is trustworthy and to establish a trust relationship, the trusted data transmission module 20 is used to realize the encrypted transmission of useful data of each module, to ensure that useful data will not be obtained arbitrarily;

[0108] The risk detection module 40 is used to detect the running termin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a big data and trusted computing based information network security self-defense system. The big data and trusted computing based information network security self-defense system comprises a trusted computing based data set storage module, a trusted computing based data transmission module, a risk analysis feedback module, a risk detection module, a risk assessment module, a security defense module and an early warning module. Through brand-new modular combination and an innovative algorithm, the big data analysis and trusted computing technologies are successfully applied to the information network security self-defense system. Starting from the trusted computing based data set storage module and the trusted computing based data transmission module, data assessed by the risk assessment module are trustable; the risk assessment module performs assessment in an authorized secure network environment; a security policy is established on the trusted data and the trusted assessment system; the final behavior is in line with expected design; and the information network defense capability and system credibility are further improved efficiently.

Description

technical field [0001] The invention relates to the field of big data, in particular to an information network security self-defense system based on big data and trusted computing. Background technique [0002] The traditional information security protection system uses firewall technology and intrusion detection technology, which has been unable to prevent deep attacks on the application layer, and cannot realize real-time blocking of attacks. Therefore, in order to ensure the effective security of the network, the intrusion prevention system came into being. The intrusion prevention system checks the data packet byte by byte to prevent attacks between the data link layer and the application layer. When a new attack method is discovered, the intrusion prevention system will create a corresponding new filter. Effectively guarantee the security of the network. However, the security policy of the intrusion prevention system in the prior art is manually configured by the use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/205
Inventor 陈祖斌谢铭胡继军翁小云袁勇邓戈锋莫英红谢菁张鹏唐玲丽黄连月郑俊明曾明霏陈剑皓宋骏豪
Owner 广东新世立种子技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products