Network security system based on cloud computing and artificial intelligence

A network security system and artificial intelligence technology, applied in the field of network security systems based on cloud computing and artificial intelligence, can solve the problems of single judgment, lack of judgment accuracy, and inability to realize the setting of analysis units.

Active Publication Date: 2020-03-13
广西大学行健文理学院
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Artificial intelligence is a branch of computer science that attempts to understand the essence of intelligence and produce a new intelligent machine that can respond in a manner similar to human intelligence. Research in this field includes robotics, language recognition, image recognition, Natural language processing and expert systems, etc. Since the birth of artificial intelligence, the theory and technology have become increasingly mature, and the application field has also continued to expand. It can be imagined that the technological products brought by artificial intelligence in the future will be the "container" of human wisdom. Artificial intelligence It can simulate the information process of human consciousness and thinking. Artificial intelligence is not human intelligence, but it can think like human beings, and it may exceed human intelligence. With the development of society, network technology is becoming more and more perfect, but the network There are some security problems in technology. Many people obtain other people's information through the Internet and communicate with them through SMS, so as to obtain the fruits of other people's labor.
[0003] The existing patent announcement number is CN108965253A, a network security system based on artificial intelligence. The network security system based on artificial intelligence, through the cloud computing anti-tracking system set up, can carry out anti-tracking on Trojan horse viruses through cloud computing technology, through The artificial intelligence monitoring system set up is used to monitor the network environment through AI artificial intelligence technology. Through the set up big data analysis platform, it is possible to analyze whether the network environment where the data exists is safe through big data. Through the set up security environment monitoring module, It is used to monitor the network where the data exists, through the set fraud data interception system, it is used to intercept the fraud data, through the set Trojan virus isolation system, it is used to isolate the Trojan virus, and through the set vulnerability data detection The module is used to detect and process vulnerability data, and is used to protect and isolate data through the set data protection isolation system. The structure is scientific and reasonable, and it is safe and convenient to use, which provides great help to people. The intelligent network security system cannot realize the setting of the analysis unit and accurately analyze the data information. At the same time, after the data analysis, only a single data is used to judge, thus lacking the accuracy of the judgment. Therefore, we propose a cloud-based Computing and Artificial Intelligence for Cybersecurity Systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security system based on cloud computing and artificial intelligence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0041] see figure 1 As shown, the present invention is a network security system based on cloud computing and artificial intelligence, including a data acquisition module, a network analysis module, a processor, an interception unit, a judgment module, an alarm unit and an intelligent device;

[0042] The collection module is used to collect data information, the data information includes transaction information and communication information, the transaction inform...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security system based on cloud computing and artificial intelligence. The system comprises a data acquisition module, a network analysis module, a processor, an interception unit, a judgment module, an alarm unit and intelligent equipment; the acquisition module is used for acquiring data information, wherein the data information comprises transaction informationand communication information, and the transaction information comprises transaction amount data, transaction time data, transaction object data and transaction frequency data. According to the invention, the network analysis module is arranged to combine and calculate the transaction amount data, the transaction time data, the transaction object data, the transaction frequency data, the communication time data, the communication frequency data, the communication content data and the communication object age data; therefore, the average value and the difference value of the data are obtained,the analysis of the data information is more comprehensive and accurate, the judgment is prevented from being influenced by data information analysis errors, the time is saved, and the working efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of artificial intelligence networks, in particular to a network security system based on cloud computing and artificial intelligence. Background technique [0002] Artificial intelligence is a branch of computer science that attempts to understand the essence of intelligence and produce a new intelligent machine that can respond in a manner similar to human intelligence. Research in this field includes robotics, language recognition, image recognition, Natural language processing and expert systems, etc. Since the birth of artificial intelligence, the theory and technology have become increasingly mature, and the application field has also continued to expand. It can be imagined that the technological products brought by artificial intelligence in the future will be the "container" of human wisdom. Artificial intelligence It can simulate the information process of human consciousness and thinking. Artificial...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24G06Q40/04
CPCG06Q40/04H04L41/0631H04L41/142H04L63/1433H04L63/1466H04L63/306
Inventor 谢聪谢萌张世明邓舒婷赵晚昭
Owner 广西大学行健文理学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products