Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security system based on big data and method thereof

A network security system and big data technology, applied in the transmission system, electrical components, etc., can solve the problems of insufficient detection and prevention capabilities, inability to know or predict the intruder's attack target or means, and inability to obtain decryption through normal channels Data and other issues, to achieve the effect of continuous security protection

Inactive Publication Date: 2018-11-16
JIUJIANG VOCATIONAL & TECHN COLLEGE
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing network security defense measures, such as firewalls, IDS, encryption technology, etc., have a common feature of denial-type defense strategies, that is, specify a series of access measures according to current needs, and deny access if they do not meet the specified security policies. If the data entering the firewall does not comply with the rules of the firewall, it will not be allowed to pass through, and the decrypted data cannot be obtained through normal channels without the key stream
Although the defense mechanism of this method is powerful, the ability of discovery and prevention is not enough, and the attack target or method of the intruder cannot be accurately known or predicted. Therefore, we propose a network security system and method based on big data and put it into use. , to solve the above problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security system based on big data and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0022] see figure 1 , the present invention provides a technical solution: a network security system based on big data, including a data packet interception processing module, a wireless communication module, a message processing module, a message generation module, a master control module, an online status monitoring module, and a firewall configuration module , process monitoring module, dynamic analysis module, host log monitoring module, identity authentic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security system based on big data in the field of network security technology and a method thereof. The system comprises a data packet interception processing module,a wireless communication module, an information processing module, an information generating module, a master control module, an online state monitoring module, a firewall configuring module, a process monitoring module, a dynamic analyzing module, a host log monitoring module, an identity identification module and a system encryption module. According to the system and the method, by means of adata packet interception function which is supplied through connecting the network with the monitoring module, technology such as invasion detection, security auditing and virus detection based on a host computer can be integrated on the terminal. In a security control center, after connecting information of all controlled terminals is integrated, invasion detection and security auditing based onthe network can be applied, thereby supplying comprehensive, integral and continuous security protection to the terminal.

Description

technical field [0001] The invention discloses a network security system and method based on big data, specifically in the technical field of network security. Background technique [0002] With the development of network technology, the traditional LAN structure has the disadvantage of relatively fragile network security. The security, stability, multi-function and rapidity of enterprise network have become the most concerned issues of enterprise managers. The openness, interactivity, and decentralization of the Internet make the information sharing, flexibility, and speed that human beings yearn for meet the needs. With the deepening of informatization and the rapid development of the Internet, people's work, study and lifestyle are undergoing tremendous changes. Facing the severe situation of information security, the existing network security system has many weak links in prediction, response, prevention and recovery capabilities. [0003] Existing network security def...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0227H04L63/0428H04L63/0876H04L63/1425H04L63/1441
Inventor 胡志锋李卫升
Owner JIUJIANG VOCATIONAL & TECHN COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products