A big data intelligent analysis system based on network space security

A network space and intelligent analysis technology, applied in the field of network security, can solve the problems of low effectiveness and accuracy of big data security intelligent analysis, insufficient big data security business presentation and monitoring and early warning forms, single source of big data, etc., to achieve protection The effect of the client's core assets

Inactive Publication Date: 2019-06-14
安徽谛听信息科技有限公司
View PDF7 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

How to efficiently integrate urban and regional multi-source cyberspace security big data information resources to solve the problem of single source of urban cyberspace security big data, low effectiveness and accuracy of big data security intelligent analysis, la

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A big data intelligent analysis system based on network space security

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0087] Example 1: Event Correlation

[0088] Event correlation supports the search of event characteristics, can save and visualize the search track, helps to restore the event attack process, and discover the source of the attack, and at the same time realizes statistics on the characteristics of all security events that have occurred within a certain period of time. The event features include basic features (such as cross-site scripting (XSS) attacks, SQL injection attacks, automated threats), communication features (such as various communication protocols such as http, https, ftp, etc.). Event correlation can be divided into rule-based event correlation, single event correlation, multi-event correlation, event search, event attack process restoration, etc. To be introduced below.

[0089] a. Rule-based event correlation:

[0090] The system has a built-in visual rule editor, and users can define association rules based on logical expressions and statistical conditions, an...

example 2

[0109] Example 2: Sample Association

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a big data intelligent analysis system based on network space security. The big data intelligent analysis system comprises a unified interface module, a data acquisition module,a data processing module, a distributed storage module, a data analysis module and an interactive presentation application module. On the basis of a big data technology, data characteristics of continuous increase, complex types, various sources and the like of data in safety analysis are solved, and enterprise threats such as advanced continuous malicious attacks and internal violation behaviorscan be effectively detected by using a user and entity behavior analysis technology at the same time.

Description

technical field [0001] The invention relates to the field of network security, in particular to a big data intelligent analysis system based on network space security. Background technique [0002] In 2016, the state released the "Evaluation Indicators for New Smart Cities", and network security was written into the evaluation indicators as a first-level indicator, reflecting the importance and strategic position of network security. In the planning, design and construction of new smart cities, cyberspace security has become an important factor restricting urban development and an important component of new smart city construction. [0003] However, urban cyberspace security incidents emerge in endlessly; information resource integration cloud platform security protection issues are prominent; industry data sharing and fusion lead to data security; cyberspace security responsibility boundaries are not clear. Emerging information technologies such as the Internet of Things, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/215G06F16/27G06F16/2458H04L29/06
Inventor 甘小伟赵义
Owner 安徽谛听信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products