Data anti-intrusion method based on big data and artificial intelligence and big data server

A technology of artificial intelligence and big data, applied in electrical components, transmission systems, etc., can solve the problems of firewall being breached, data intrusion, difficult firewall adaptive upgrade and optimization, etc., to avoid being breached, ensure reliability, and improve intrusion. The effect of defensive performance

Active Publication Date: 2021-04-06
上海德吾信息科技有限公司
View PDF11 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the common data intrusion prevention technology is difficult to realize the adaptive upgrade and optimization of the firewall, which makes the firewall may be breached in the later operation process, thus causing the risk of data intrusion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data anti-intrusion method based on big data and artificial intelligence and big data server
  • Data anti-intrusion method based on big data and artificial intelligence and big data server
  • Data anti-intrusion method based on big data and artificial intelligence and big data server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach A

[0034] Embodiment A, according to the preset configuration information between response time consumption and interception mode, each group of intrusion interception records is split into at least two interception event sets with differences in response time consumption. For example, the configuration information may be a mapping relationship between response time consumption and interception mode.

Embodiment approach B

[0035] Embodiment B, by counting the time-consuming response and interception mode of each interception event set in the intrusion interception records within the preset time period, the configuration information between the time-consuming response and the interception mode is determined; according to the determined configuration information, each The group intrusion interception record is split into at least two interception event sets with differences in response time. For example, the preset time period can be designed according to actual conditions, such as several seconds or several minutes, which is not limited here.

[0036] In the actual implementation process, there may be multiple ways to determine the interception behavior data. In order to ensure that the interception behavior data can be quickly and accurately determined in different business scenarios, thereby improving the update efficiency of the firewall, according to the method described in step S330 Describe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a data anti-intrusion method based on big data and artificial intelligence and a big data server, which can analyze different intrusion interception records, determine an interception event set corresponding to each group of intrusion interception records, and determine at least one group of interception behavior data; therefore, the intrusion attack category of the to-be-analyzed interception event is analyzed. The number of the to-be-analyzed interception events can be multiple, and different intrusion attack categories can be determined as many as possible so as to update the firewall based on the intrusion attack categories and the intrusion interception records. According to the method, the intrusion interception record can be analyzed in an interception operation level, so that intrusion attacks and firewall interception running states are analyzed, intelligent adaptation upgrading and optimization of the firewall can be realized, an interception mechanism of the firewall is prevented from being in an invariable state for a long time, the intrusion defense performance of the firewall can be improved, the interception mechanism of the firewall is prevented from being broken in the later operation process, and the reliability of data intrusion protection is ensured.

Description

technical field [0001] The present application relates to the technical field of big data and artificial intelligence, and specifically relates to a data intrusion prevention method and a big data server based on big data and artificial intelligence. Background technique [0002] The rapid development of computer technology has promoted the application of big data in many business levels. Nowadays, big data services have penetrated into almost every field, but with it comes the problem of data security. For example, the security issues of a large amount of business data or user data in the databases of major application systems or cloud platforms, and the issues of anti-theft and anti-tampering of important data / private data are the focus of people's attention. [0003] As one of the most widely used data intrusion prevention technologies, firewall plays a very important role in the data intrusion prevention mechanism. As the first line of defense against intrusion, the re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0209H04L63/1425H04L63/20
Inventor 曹佳乐
Owner 上海德吾信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products