Big data analysis method applied to field of information security

A technology of information security and analysis methods, applied in database models, digital data protection, computer security devices, etc., can solve the problems of single information security defense function and inflexible security problems, and achieve the effect of improving efficiency and increasing the scope of security defense.

Inactive Publication Date: 2019-12-06
安徽蓝麦通信股份有限公司
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a big data analysis method applied in the field of information security in order to solve the above-mentioned problems of single information security defense

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The following clearly and completely describes the technical solutions in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0019] A big data analysis method applied in the field of information security, comprising the following steps:

[0020] S1. Establish a network security database: establish a perception data source, determine the data source to be collected, collect various security data such as terminals, borders, services, and applications under the defense chain, collect data that threatens network security, and store it on a big data platform. Form an original security data warehouse, integrate distributed file systems, relational databases, et...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a big data analysis method applied to the field of information security, and belongs to the technical field of information security. The big data analysis method comprises thefollowing steps: S1, establishing a network security database; S2, analyzing network data; S3, carrying out safety management of the data; S4, constructing a safety early warning; and S5, performing alarm processing. The big data analysis method detects whether a security threat occurs in network data analysis by establishing a big data analysis model, wherein the big data analysis model is used for preprocessing acquired data, reorganizing the original data and forming a basic data relation graph through feature extraction and data fusion modes, constructing an attack tree model through the data relation graph so as to speculate the attack behavior of the next step, combining the data statistical characteristics in the attack, designing the data analysis process, method and rule, and deeply mining the preprocessed data by applying the real-time analysis and offline analysis modes, so that the hidden danger information in the data can be detected more quickly, and the security detection efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a big data analysis method applied in the field of information security. Background technique [0002] As a resource, information is of special significance to human beings due to its universality, sharing, value-added, processability and multi-utility. The essence of information security is to protect information resources in information systems or information networks from various types of threats, interference and destruction, that is, to ensure the security of information. According to the definition of the International Organization for Standardization, the meaning of information security mainly refers to the integrity, availability, confidentiality and reliability of information. Information security is an issue that any country, government, department, or industry must attach great importance to, and it is a national security strategy that cannot be ignored. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55G06F21/56G06F21/60G06F16/28
CPCG06F21/55G06F21/566G06F21/602G06F16/28
Inventor 尹桂芳
Owner 安徽蓝麦通信股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products