Data center operation and maintenance safety system

A data center and security system technology, applied in the field of information security, can solve problems such as low reference value of abnormal event alarms, false web page information, rigid fixed rules, etc., and achieve the effect of automatic full collection, guarantee of safety, and high collection efficiency

Active Publication Date: 2020-08-28
ZHEJIANG QIZHI TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

3. WWW deception, the webpage being visited has been tampered with by hackers, and the information on the webpage is false! For example, the hacker rewrites the URL of the webpage that the user wants to browse to point to the hacker's own server. When the user browses the target webpage, it actually sends a request to the hacker's server.
4. Node attack, after the attacker breaks through a device, he often uses this device as a base to attack other devices
The problems of this abnormal event alarm mechanism are: 1. The fixed rules are rigid and unable to keep pace with the times
However, it is possible that the account needs to enter the data center for a temporary work task, and has been approved by the workflow engine to form an allowed operation, but the allowed operation is not a fixed rule, therefore, a legally allowed operation When the account logs in to the data center during the valid period specified by the non-fixed rules, the account dimension will send out an account abnormal event alarm
2. Alarms are only issued from a single dimension, and abnormal events in a single dimension cannot constitute abnormal behavior or attack behavior
The problems caused by these reasons mainly include: 1. High false positive rate. 2. Single-dimension abnormal event alarm. There is no information in other dimensions other than the information in this dimension. Therefore, it is impossible to judge whether the abnormal event is caused by an attack behavior. Abnormal event alarm low reference value
The high rate of false alarms and the low reference value of alarms lead to operation and maintenance personnel habitually ignoring abnormal event alarms, resulting in the alarm being useless

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data center operation and maintenance safety system
  • Data center operation and maintenance safety system
  • Data center operation and maintenance safety system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] abnormal behavior

[0043] The abnormal behavior mentioned in the present invention refers to the operation behavior that does not match the content of the white list, including but not limited to abnormal behavior caused by hacker attacks, abnormal behavior caused by misoperation of internal operation and maintenance personnel, etc.

[0044] gateway

[0045] Everyone knows that to walk from one room to another, one must pass through a door. Likewise, gateways send messages from one network to another. Information must also pass through a "pass", which is the gateway. As the name implies, a gateway is a "gateway" that connects a network to another network, that is, a network gate. The gateway mentioned in the present invention refers to the door to enter the data center.

[0046] workflow engine

[0047] The so-called workflow engine refers to workflow as a part of the application system, and it provides core solutions such as determining information transmis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A data center operation and maintenance safety system is characterized by comprising a data acquisition layer, a data analysis layer and an application layer, wherein the data acquisition layer comprises a transversely-expanded data acquisition device, the data acquisition device acquires data, and the data acquired by the data acquisition layer is collected in the data analysis layer; the data analysis layer comprises transversely-extended analysis engines, and all the analysis engines share data from the data acquisition layer; and the application layer comprises an application module whichexpands transversely. The data center operation and maintenance safety system has the advantages that the collection layer, the analysis layer and the application layer are transversely extensible, the application modules of the application layer longitudinally integrate the collection layer and the analysis layer, and various safety applications can be continuously and quickly developed accordingto user requirements.

Description

technical field [0001] The invention relates to the field of information security, in particular to a security system for data center operation and maintenance. Background technique [0002] This section is only for the convenience of understanding the content of the present invention, and should not be regarded as prior art. [0003] According to the different users of the network, the network can be divided into extranet (Internet) and intranet (local area network). The intranet can be divided into office network and production network. The network behavior of office Internet access is relatively developed, and virus and network intrusion incidents are prone to occur. If office users and production users are in the same network, viruses and intrusion events that occur on the office network will quickly spread to the production network with almost no obstacles, posing a great threat to production security. Therefore, the office network and production network are also req...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/08
Inventor 吴强
Owner ZHEJIANG QIZHI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products