Unlock instant, AI-driven research and patent intelligence for your innovation.

Information safety anomaly sensing platform based on data mining and analysis of big data

An information security and data mining technology, applied in the field of big data, can solve problems such as malicious information tampering, replacement and leakage, and attacks on unknown transaction information, and achieve the effect of reducing risks and ensuring security

Active Publication Date: 2021-06-04
珠海市鸿瑞信息技术股份有限公司
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of science and technology, information security issues are becoming more and more prominent, especially in the process of e-commerce transactions. The main problem faced by e-commerce transactions is that transaction information is subject to unknown attacks during transmission, and information is maliciously tampered and replaced. and leaks, with the popularization of electronic transactions, the insecurity factors in the transaction process are increasing day by day. When information security is abnormal, it needs to be detected in time. The attack methods encountered during information transmission are of little use, and cannot help technicians solve information security problems in a timely manner. The ultimate goal of perceiving information security anomalies is to fundamentally solve information security problems. When anomalies occur in information security, it is helpful to analyze and confirm the attack methods encountered in the transaction process first, which is beneficial to prevent and avoid different types of attacks in a targeted manner. In addition, after the security anomalies are detected, the abnormal processing can be performed synchronously, which can effectively ensure information security and maintain Various security properties and values ​​of information transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information safety anomaly sensing platform based on data mining and analysis of big data
  • Information safety anomaly sensing platform based on data mining and analysis of big data
  • Information safety anomaly sensing platform based on data mining and analysis of big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] Embodiment 1: The collection of data flow during the transaction process is θ={θ 1 , θ 2 , θ 3 , θ 4 , θ 5}={30°, 53°, 45°, 60°, 63°}, corresponding to the set of data flow in the transaction process is The data retrieval unit retrieves the data flow direction and data flow to the transaction environment simulation test unit, and the information source and sink location unit confirms that the set of information source points is A={A 1 , A 2 , A 3 , A 4 , A 5}, the set of sink points is B={B 1 , B 2 , B 3 , B 4 , B 5}, establish a two-dimensional coordinate system with the location of the source as the origin, and confirm that the coordinate set of the data flow transmission vector during the transaction is The corresponding data flow transmission vector is According to the formula Get the data flow set in the tested transaction process: θ’={θ 1 ’, θ 2 ’, θ 3 ’, θ 4 ’, θ 5 ’}={30°, 53°, 45°, 30°, 63°}, according to the formula Get the data f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information safety anomaly sensing platform based on data mining and analysis of big data. Comprising an information transmission flow direction collection unit, an information transmission flow collection unit, a database, a data calling unit, a transaction environment simulation test unit, a transaction channel establishment unit, an information source and information sink positioning unit, a transmission deviation analysis unit, an abnormal equipment sensing unit, an information safety abnormity analysis unit and an abnormity processing unit. Information transmission flow direction and flow are called through big data, and are compared with information transmission flow direction and flow in a transaction simulation test to analyze deviation of data flow direction and flow when information transmission safety is sensed to be abnormal; according to the method, the attack mode in the transaction process is predicted by analyzing the transmission direction of the data stream and the change of the data flow in the e-commerce transaction process, and protection measures are taken for attacks in different modes, so that the information safety in the e-commerce transaction process is guaranteed to the greatest extent, and the information value is maintained.

Description

technical field [0001] The invention relates to the field of big data technology, in particular to an information security anomaly perception platform based on data mining and analysis of big data. Background technique [0002] With the development of science and technology, information security issues are becoming more and more prominent, especially in the process of e-commerce transactions. The main problem faced by e-commerce transactions is that transaction information is subject to unknown attacks during transmission, and information is maliciously tampered and replaced. and leaks, with the popularization of electronic transactions, insecure factors in the transaction process are increasing day by day. When information security is abnormal, it is necessary to be aware of it in time. The attack methods received during the information transmission process are not very effective, and cannot help technicians solve information security problems in a timely manner. The ultima...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q30/06G06Q20/38G06F21/62
CPCG06F21/6218G06Q20/382G06Q30/0601
Inventor 刘智勇
Owner 珠海市鸿瑞信息技术股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More