Unlock instant, AI-driven research and patent intelligence for your innovation.

System for detecting network intrusion of next generation key information infrastructure based on cloud computing

A technology of infrastructure network and intrusion detection system, which is applied in the direction of transmission system, digital transmission system, data exchange network, etc., can solve the problems of not supporting joint analysis of multi-host data, reducing the workload of the user end, etc., to reduce the dimensionality, The effect of improving the detection rate and improving the speed of detection

Inactive Publication Date: 2018-09-04
GUANGXI POWER GRID CORP
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the problem that the traditional intrusion detection system handles heavy data load and does not support multi-host data joint analysis, the present invention proposes a next-generation key information infrastructure network intrusion detection system based on cloud computing. Cloud computing has flexibility and rapid scalability , high reliability, security and other characteristics, using cloud computing for network intrusion detection can support multi-process concurrent processing, effectively reducing the processing time, improving the processing accuracy, and greatly reducing the workload of the client

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System for detecting network intrusion of next generation key information infrastructure based on cloud computing
  • System for detecting network intrusion of next generation key information infrastructure based on cloud computing
  • System for detecting network intrusion of next generation key information infrastructure based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The present invention is further described in conjunction with the following examples.

[0013] see figure 1 , a cloud computing-based next-generation key information infrastructure network intrusion detection system in this embodiment includes a client module 1, a communication module 2 and a cloud module 3, and the client module 1 includes a user operation interface 11, a data collection Unit 12, data processing unit 13 and risk management unit 14, the user operation interface 11 is used to provide users with the functions of logging in, shutting down and starting the system, and the data collection unit 12 is used to collect data packets from the network, and collect The obtained data packets are analyzed and processed, thereby separating the data information, and the data processing unit 13 is used to standardize the separated data information, and perform dimensionality reduction on the standardized processed data information, and use the communication module 2 to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system for detecting network intrusion of a next generation key information infrastructure based on cloud computing comprises a client module, a communication module and a cloud module; wherein theclient module is used for acquiring data packages from a network, analyzing and processing the data packages to extract data information, performing standardized processing and dimension reducing processing for the extracted data information, and transmitting the processed data information to the cloud module through the communication module to perform intrusion detection and storage; the cloud module is used for detecting the received data information after dimension reducing processing to judge whether there is an intrusion behavior, and transmitting a judged result to the client module through the communication module. The system of the invention has the beneficial effects that: a support vector machine and a particle swarm optimization algorithm are introduced into the intrusion detection technology, dimension reduction processing and redundant information elimination processing are performed for network intrusion data through adoption of a gray relative analysis method, thereby reducing the dimension number of input of the support vector machine, effectively raising detection rate of intrusion detection, and improving detection speed at the same time.

Description

technical field [0001] The invention relates to the field of key information infrastructure security detection, and in particular to a next-generation key information infrastructure network intrusion detection system based on cloud computing. Background technique [0002] With the gradual extension of network-based services to various fields of society and the substantial increase in the amount of confidential information in the network, network security technology has become more and more important. How to effectively detect and prevent network intrusion to protect network data Its security has also begun to receive the attention and attention of people from all walks of life. The traditional network defense is a firewall. The firewall has the advantages of simplicity, practicality and high transparency. It can meet certain security requirements without modifying the original network system. However, the firewall is only a network security tool for passive defense. The fire...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24H04L29/08
CPCH04L41/0631H04L41/142H04L63/02H04L63/14H04L63/1416H04L67/10
Inventor 谢铭陈祖斌翁小云张鹏袁勇杭聪马虹哲黎新黄俊杰
Owner GUANGXI POWER GRID CORP