Big data computer network security protection device and control method thereof

A security protection device and computer network technology, applied in computer security devices, digital data protection, computing, etc., can solve problems such as poor scalability, increased storage and maintenance costs, and low data encryption security, so as to save storage costs and improve Data encryption efficiency and high security performance

Pending Publication Date: 2020-06-12
HUNAN CITY UNIV
View PDF6 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] To sum up, the problems in the existing technology are: the existing big data computer network security protection device has low data encryption security; at th...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data computer network security protection device and control method thereof
  • Big data computer network security protection device and control method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0077] The control method of the big data computer network security protection device provided by the embodiment of the present invention is as follows figure 1 As shown, as a preferred embodiment, the method for performing security protection on a computer network through a network security protection program provided by the embodiment of the present invention includes:

[0078] (1) Obtain multi-dimensional data; the multi-dimensional data includes network vulnerability information, intrusion information, and virus information.

[0079] (2) Preprocessing the acquired multi-dimensional data to generate data to be analyzed.

[0080] (3) Analyze the data to be analyzed and generate an early warning report, which is used to forecast threats.

[0081] (4) Analyzing the data to be analyzed and generating an early warning report includes at least situational awareness, real-time analysis and early warning, or network intrusion attack path and threat source analysis.

[0082] (5) The situation...

Embodiment 2

[0086] The control method of the big data computer network security protection device provided by the embodiment of the present invention is as follows figure 1 As shown, as a preferred embodiment, the method for encrypting network data through an encryption program provided by the embodiment of the present invention includes:

[0087] (I) Configure the data collector parameters, collect the network information data through the data collector and save it in the local storage, and perform feature extraction on the collected network information data.

[0088] (II) The background terminal sends a key acquisition request to the front-end database server, where the key acquisition request includes the characteristic data to be encrypted.

[0089] (III) The background terminal generates key data according to the feature data to be encrypted, and stores the key data in the data monitoring and early warning system.

[0090] The method for storing data in the local storage in step (I) provided ...

Embodiment 3

[0096] The control method of the big data computer network security protection device provided by the embodiment of the present invention is as follows figure 1 As shown, as a preferred embodiment, the method for controlling network access authority through an authority control program provided by the embodiment of the present invention includes:

[0097] 1) The user access address of the target resource is generated in advance through an authorization control program, the user access address is used for public release; the user access address carries at least the original address information and access authority information of the target resource.

[0098] 2) Receive an access request to the target resource, the access request includes the user access address of the target resource.

[0099] 3) Parse out the original address information and access authority information of the target resource from the user access address.

[0100] 4) Obtain the user ID of the current visitor, and deter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network security protection, and discloses a big data computer network security protection device and a control method thereof. The big data computer network security protection device comprises a network vulnerability detection module, a network intrusion detection module, a network virus detection module, a main control module, a network security protection module, a network data encryption module, an access permission control module, a big data processing module, an alarm module and a display module. According to the invention, the collected network data can be effectively prevented from being illegally tampered, and the safety performance is high; the access permission information is not written into the resource database through the access permission control module, so that the storage cost is saved; the user access address can be generated by the application module according to the actual function requirement, and once the application function requirement changes, the application module can automatically regenerate the user access address without notifying the resource storage system, so that the coupling degree between the application module and the resource storage system is effectively reduced.

Description

Technical field [0001] The invention belongs to the technical field of network security protection, and in particular relates to a big data computer network security protection device and a control method thereof. Background technique [0002] Computer network is also called computer communication network. The simplest definition of a computer network is: a collection of autonomous computers connected to each other for the purpose of sharing resources. According to this definition, the early terminal-oriented networks cannot be regarded as computer networks, but can only be called online systems (because many terminals at that time cannot be regarded as autonomous computers). However, as the price of hardware drops, many terminals have a certain degree of intelligence, so "terminals" and "autonomous computers" gradually lose their strict boundaries. If a microcomputer is used as a terminal, according to the above definition, the early terminal-oriented network can also be calle...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F21/55G06F21/56G06F21/60
CPCG06F21/577G06F21/56G06F21/604G06F21/554
Inventor 付媛媛
Owner HUNAN CITY UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products