Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

An Intrusion Detection System Based on Cloud Computing

An intrusion detection system and cloud computing technology, applied in the field of network security, can solve problems such as failure to meet user application requirements, complex deployment of intrusion detection systems, and increased website operation and maintenance costs, achieving high market application value, easy update and maintenance, and practical strong effect

Active Publication Date: 2021-08-03
HEFEI MINGDE PHOTOELECTRIC TECH LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, one of the main methods for the network intrusion detection system is to deploy a firewall. The firewall has the advantages of simplicity, practicality and high transparency. It can meet certain security requirements without modifying the original network system, but the firewall is only a passive defense. The firewall can only provide two kinds of services: deny and pass, and there are certain security problems and program deficiencies; the other way is to install and deploy an intrusion detection system on the host, which depends on the computing resources and operating system of the host Although it improves the security protection capability of the host to a certain extent, it is far from meeting the complex application requirements of users.
[0003] With the continuous increase of network scale and network application traffic, especially in today's big data era, the network traffic is even greater, and the traditional network intrusion detection system structure has exposed more and more limitations and defects, such as heavy workload , slow response speed, insufficient processing capacity, etc., which increase the burden on the host. In addition, the deployment of intrusion detection systems is more complicated, and it is more difficult to update and maintain. Professional personnel are often required for maintenance, which increases the cost of website operation and maintenance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Intrusion Detection System Based on Cloud Computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0017] see figure 1 As shown, the present invention is an intrusion detection system based on cloud computing, including a user interaction interface, an overall management unit, a data preprocessing unit, an intrusion tolerance unit and a cloud server;

[0018] The user interaction interface is connected to the overall management unit through the cloud service directory module; the user interaction interface is used to provide an interface for users, enterprises a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intrusion detection system based on cloud computing, and relates to the technical field of network security. The invention includes a user interaction interface, an overall management unit, a data preprocessing unit, an intrusion tolerance unit and a cloud server; the user interaction interface is connected to the overall management unit through the cloud service directory module; the overall management unit is respectively connected to the data preprocessing through the data transmission module The unit, the intrusion tolerance unit and the cloud server perform data interaction; the intrusion tolerance unit performs data interaction with the cloud server through the data transmission module. Based on cloud computing technology, the present invention utilizes a data preprocessing unit to filter network data, and simultaneously introduces a cloud server based on a K-means clustering algorithm model to analyze the detection data, thereby effectively improving network intrusion detection efficiency and having relatively high practicability. Strong, with high market application value.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to an intrusion detection system based on cloud computing. Background technique [0002] In recent years, as network-based services have gradually extended to various fields of society and the amount of confidential information in the network has increased significantly, network security technology has become more and more important. How to effectively detect and prevent network intrusion To ensure the security of network data has also begun to attract the attention and attention of people from all walks of life. At present, one of the main methods for the network intrusion detection system is to deploy a firewall. The firewall has the advantages of simplicity, practicality and high transparency. It can meet certain security requirements without modifying the original network system, but the firewall is only a passive defense. The firewall can only provide two kinds of ser...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/24
CPCH04L41/145H04L63/0227H04L63/1416H04L63/1425H04L67/10
Inventor 肖飒
Owner HEFEI MINGDE PHOTOELECTRIC TECH LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products