Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and a device for detecting security deployment of big data

A detection method and big data technology, applied in the detection field of big data security deployment, can solve problems such as omissions or errors, inability to know the status of security deployment, abnormality of big data platform, etc., and achieve the effect of ensuring security

Active Publication Date: 2019-04-05
BEIJING GRIDSUM TECH CO LTD
View PDF11 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to ensure the security of the big data platform, there are security functions in the big data platform. However, at present, technicians enable the security service function through the configured security nodes and component services, and cannot know the status of security deployment. In this way, If the environment of the big data cluster nodes does not conform, or there are omissions or errors in the relevant configuration, it will lead to abnormalities in the use of the big data platform

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and a device for detecting security deployment of big data
  • Method and a device for detecting security deployment of big data
  • Method and a device for detecting security deployment of big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0095] Implementation mode 1: if all nodes meet the requirements of the cluster environment, output the detection result of the cluster environment security on the web page of the cluster environment detection;

[0096] If all nodes meet the requirements of the service component, output the detection result of the service component security on the web page of the service component detection;

[0097] If all nodes meet the service status requirements, output the detection result of service status security on the Web page of service status detection.

[0098] Among them, for the first embodiment, such as Figure 3-a , Figure 3-b , Figure 3-c As shown: the detection results of each aspect will be displayed on the display page, and each aspect includes different test items, and the detection results of different test items will also be displayed on the web page.

Embodiment approach 2

[0099] Embodiment 2: If all nodes meet the preset cluster environment requirements, whether all nodes meet the preset service component requirements, and all nodes meet the preset service status requirements, output the detection result of the cluster environment security.

[0100] Regarding the second embodiment, it means that when the three aspects of security deployment testing meet the conditions, the information about the security of the testing result is displayed on the output display page.

[0101] In addition, if the test results in any aspect do not meet the conditions, specific abnormal information is output. Specifically, S105 includes:

[0102] If any node does not meet the preset cluster environment requirements, or any node does not meet the preset service component requirements, or any node does not meet the preset service status requirements, output corresponding abnormal information.

[0103]A detection method for big data security deployment provided by an e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for detecting security deployment of big data, which comprises the following steps of: starting a preset Web service, and acquiring access information of each node ofa cluster to be detected, which is input by a user on a Web service page; Connecting each node in the detected cluster according to the access information of each node in the to-be-detected cluster byoperating a preset batch configuration tool; Under the condition that a test program sending condition is met, sending a preset test program to each node of a to-be-detected cluster through the batchconfiguration tool; Receiving and analyzing feedback information sent by each node, wherein the feedback information is information obtained after each node runs a test program; And analyzing the feedback information to obtain a detection result, and outputting the detection result. Automatic detection of big data security deployment is realized, the manual inspection cost is reduced, the workingefficiency is improved, and a user can know a detection result and an abnormal condition in real time.

Description

technical field [0001] The invention relates to the field of cloud computing security, in particular to a method and device for detecting the security deployment of big data. Background technique [0002] With the rapid development of the Internet, the amount of global data has exploded. In order to cope with massive data, major companies have adopted big data platforms to store and process massive data. [0003] In order to ensure the security of the big data platform, there are security functions in the big data platform. However, at present, technicians enable the security service function through the configured security nodes and component services, and cannot know the status of security deployment. In this way, If the environment of the big data cluster nodes does not conform, or there are omissions or errors in the relevant configuration, it will lead to abnormalities during the use of the big data platform. Contents of the invention [0004] In view of the above pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F11/30G06F11/34H04L29/08
CPCG06F11/3006G06F11/302G06F11/3055G06F11/3452G06F21/6218H04L67/02
Inventor 纪朕
Owner BEIJING GRIDSUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products