Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protection linkage configuration method based on network security big data and big data cloud system

A network security and network data technology, applied in the field of network security, can solve the problem of low protection reliability, and achieve the effect of improving the correlation of rules and improving reliability

Active Publication Date: 2021-06-22
上海艾涛信息科技发展有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the related technology adopts a single network security protection rule configuration method, and the protection reliability is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection linkage configuration method based on network security big data and big data cloud system
  • Protection linkage configuration method based on network security big data and big data cloud system
  • Protection linkage configuration method based on network security big data and big data cloud system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present disclosure will be described in detail below with reference to the accompanying drawings, and the specific operation methods in the method embodiments can also be applied to the device embodiments or system embodiments.

[0021] figure 1 It is an interactive schematic diagram of a protection linkage configuration system 10 based on network security big data provided by an embodiment of the present disclosure. The protection linkage configuration system 10 based on network security big data may include a big data cloud system 100 and a network access device 200 communicatively connected to the big data cloud system 100 . figure 1 The shown network security big data-based protection linkage configuration system 10 is only a feasible example. In other feasible embodiments, the network security big data-based protection linkage configuration system 10 may also only include figure 1 At least some of the components shown may also include other components.

[002...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a protection linkage configuration method based on network security big data and a big data cloud system. Before configuration of the protection linkage instruction information, network security protection rule prediction is carried out on an interface protection network data layer of the protection linkage configuration information, protection linkage instructions corresponding to the protection linkage configuration information are sorted, and finally configured protection linkage instruction information is generated. Compared with a traditional single network security protection rule configuration mode, the rule relevance of each protection linkage instruction part in the protection linkage instruction information can be improved, and then the network security protection reliability is improved.

Description

technical field [0001] The present disclosure relates to the technical field of network security, and for example, relates to a protection linkage configuration method based on network security big data and a big data cloud system. Background technique [0002] With the development of highly informatized and networked society, the society's dependence on computer networks has reached an unprecedented level, and the problem of network security has become more and more serious. If people and people, people and things, and things and things in the entire society are connected in the Internet of Things environment, then the security of the Internet of Things will have a profound impact on national security. Therefore, network security issues are getting more and more attention from network users. [0003] Based on this, in related technologies, for a large amount of network security historical data, analyzing the main access interface can be beneficial to interface protection c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/0263H04L63/162
Inventor 刘宏达朱刚
Owner 上海艾涛信息科技发展有限公司
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More