A timing-based cloud computing intelligent security system
A security system and cloud computing technology, applied in the field of cloud computing security to achieve the effect of defending against malicious attacks and ensuring system security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0025] The reference picture is figure 1 , figure 2 . A timing-based cloud computing intelligent security system, comprising: a cache module 1, an analysis module 2, a simulation module 3, and an interception module 4, the cache module 1 is connected to the analysis module 2, and the analysis module 2 is connected to the simulation module Module 3, the simulation module 3 is connected to the interception module 4, the cache module 1 caches the data flow, the analysis module 2 analyzes the data flow, and the simulation module 3 simulates the data flow according to the analysis result Impact on the system, the interception module 4 intercepts the data stream according to the simulation results of the simulation module 3, the cache module 1 includes a number of virtual cache spaces, the virtual cache spaces are marked with a time series sequence, and the cache module 1 according to The timing signal of the data stream splits the data stream and stores the data stream in a virt...
Embodiment 2
[0031] The reference picture is figure 1 , image 3 . With regard to Embodiment 1, the difference of this embodiment lies in:
[0032] As a preferred mode of the present invention, the analysis module 2 includes a clock signal identification block 21, and the identification block 21 identifies the clock signal and compares it with the overall timing signal to make a role corresponding to the data node in the data stream Position judgment and judgment on the overall orientation of the data flow.
[0033] As a preferred mode of the present invention, the interception module 4 includes an identification block 41, and the identification block 41 identifies the timing signal of the current data flow and the clock signal of the current data flow to confirm the data flow and perform intercept.
[0034] As a preferred mode of the present invention, the interception module 4 also includes an identification block 42, the virtual cache space includes a disaster recovery space, and th...
Embodiment 3
[0037] The reference picture is figure 1 , Figure 4 . With regard to Embodiment 1, the difference of this embodiment lies in:
[0038] As a preferred mode of the present invention, it also includes a log management module 5, the log management module 5 is respectively connected to the cache module 1, the analysis module 2, the simulation module 3 and the interception module 4, and the log management module 5 is aimed at all The cache module 1, the analysis module 2, the simulation module 3 and the interception module 4 perform log records on the processing of the data flow and the data flow ontology.
[0039] As a preferred mode of the present invention, the log management module 5 performs log feedback of the cache module 1, the simulation module 3 and the interception module 4 according to the data stream processing process, simulation process and guidance process based on time series information in the log records.
[0040] As a preferred manner of the present invention...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


