Cloud and local combined data processing method and device

A data processing and data technology, applied in the field of data security, can solve the problems of lack of mass data and big data analysis technology support, passive business work, single detection and discovery means, etc., to reduce system management and maintenance costs and high coverage , Data collection comprehensive effect

Inactive Publication Date: 2018-01-05
BEIJING QIANXIN TECH
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Not only that, the analysis, traceability, and line extension in business work still rely on locally collected data, most of which are concentrated in traffic data, etc., and the threat parties basically survive in the Internet world, causing business work to be passive
[0009] In the process of realizing the embodiment of the present invention, the inventor found that the existing methods lack technical means for guaranteeing major events and technical means for security analysis, and the means of detection and discovery are still single, and at the same time, there is a lack of mass data and big data analysis technology support

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud and local combined data processing method and device
  • Cloud and local combined data processing method and device
  • Cloud and local combined data processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0063] figure 1 It shows a schematic flowchart of a cloud-local data processing method provided in this embodiment, including:

[0064] S101. Collect data from local Internet egress traffic data, cloud intelligence data, third-party data, and security management data to obtain cloud-local combination data;

[0065] Wherein, the local Internet egress traffic data is local data, and the cloud intelligence data is cloud data.

[0066] The local Internet egress traffic data includes zombie and worm attack data of the key protection unit and / or network full flow restoration logs of the key protection unit.

[0067] For advanced threats, such as APT attacks, this solutio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a cloud and local combined data processing method and device. The method comprises the steps of: performing data acquisition of local internet export flow data, cloud intelligence data, third-party data and grade protection management data, so that cloud and local combined data is obtained; analyzing the cloud and local combined data to obtain an abnormalthreat behaviour; and, performing security service closed-loop warning threat disposal of the abnormal threat behaviour. The device is used for executing the method. In the embodiment of the invention, the local data, the cloud data, the third-party data and the grade protection management data are acquired; therefore, the data acquisition is relatively comprehensive; the coverage rate is relatively high; discovery, detection and security analysis on an important event can be ensured; simultaneously, the security service closed-loop warning threat disposal is carried out for the abnormal threat behaviour; a whole set of staged flexible scheme, which is continuously expanded, is provided; and the management and maintenance cost of a system is reduced.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of data security, and in particular to a data processing method and device combining cloud and locale. Background technique [0002] For a long time, network and information security systems have followed three important guiding models (PDR, P2DR, and IATF) in the design and construction process, all of which emphasize the importance of detection and defense in security systems without exception. For example, defense based on signatures and rules, use MD5 codes to judge the characteristics of viruses and malicious files, rely on rules to do simple blocking, and highly rely on network border devices to protect key information infrastructure. Critical information infrastructure refers to the information infrastructure that may seriously endanger national security, national economy and people's livelihood, and public interests once it is damaged, loses its function, or leaks data. [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 冯利高铭浩
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products