Cloud computation intelligent safety system based on time domain
A security system and cloud computing technology, applied in the field of cloud computing security, to achieve the effect of defending against malicious attacks and ensuring system security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0022] The reference picture is figure 1 , figure 2 . A cloud computing intelligent security system based on time domain, comprising: a security platform module 1, a behavior analysis module 2, a disaster recovery module 3, a statistical analysis module 4, a response module 5, the security platform module 1 is connected to the behavior analysis module 2. The behavior analysis module 2 is respectively connected to the disaster recovery module 3 and the statistical analysis module 4, the reaction module 5 is connected to the statistical analysis module 4, the security platform module 1, the behavior analysis module 2, and the disaster recovery module 3 and the statistical analysis module 4 are respectively provided with time-domain data, the safe platform module 1 accommodates the platform storage space, and the safe platform module 1 divides the platform storage space into several split spaces, and the safe platform module 1 takes the time domain as a benchmark Carry out the...
Embodiment 2
[0030] The reference picture is figure 1 , figure 2 . With regard to Embodiment 1, the difference of this embodiment lies in:
[0031] As a preferred mode of the present invention, the security system also includes a log management module 6, the log management module 6 is respectively connected to the behavior analysis module 2 and the disaster recovery module 3, and the log management module 6 according to the identified The data flow information obtained by the module under time domain conditions and the data disaster recovery information of the disaster recovery module 3 are recorded in logs.
[0032] As a preferred mode of the present invention, the log management module 6 has a recognition function, and the recognition function is divided into object recognition, content recognition and time domain recognition, and the object recognition and content recognition are used in the log management module. The data disaster recovery corresponding to the disaster recovery mod...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

