Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protection linkage configuration method and big data cloud system based on network security big data

A network data and network security technology, applied in the field of network security, can solve the problem of low protection reliability, and achieve the effect of improving the correlation of rules and improving reliability

Active Publication Date: 2022-01-04
上海艾涛信息科技发展有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the related technology adopts a single network security protection rule configuration method, and the protection reliability is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection linkage configuration method and big data cloud system based on network security big data
  • Protection linkage configuration method and big data cloud system based on network security big data
  • Protection linkage configuration method and big data cloud system based on network security big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present disclosure will be described in detail below with reference to the accompanying drawings, and the specific operation methods in the method embodiments can also be applied to the device embodiments or system embodiments.

[0021] figure 1 It is an interactive schematic diagram of a protection linkage configuration system 10 based on network security big data provided by an embodiment of the present disclosure. The protection linkage configuration system 10 based on network security big data may include a big data cloud system 100 and a network access device 200 communicatively connected to the big data cloud system 100 . figure 1 The shown network security big data-based protection linkage configuration system 10 is only a feasible example. In other feasible embodiments, the network security big data-based protection linkage configuration system 10 may also only include figure 1 At least some of the components shown may also include other components.

[002...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of the present disclosure provide a protection linkage configuration method based on network security big data and a big data cloud system. Before configuring the protection linkage command information, the interface protection network data layer of the protection linkage configuration information is used to predict the network security protection rules before The protection linkage instructions corresponding to the protection linkage configuration information are sorted out to generate the final configured protection linkage instruction information. Compared with the traditional single configuration method of network security protection rules, the accuracy of each protection linkage instruction part in the protection linkage instruction information can be improved. Rule correlation, thereby improving the reliability of network security protection.

Description

technical field [0001] The present disclosure relates to the technical field of network security, and for example, relates to a protection linkage configuration method based on network security big data and a big data cloud system. Background technique [0002] With the development of highly informatized and networked society, the society's dependence on computer networks has reached an unprecedented level, and the problem of network security has become more and more serious. If people and people, people and things, and things and things in the entire society are connected in the Internet of Things environment, then the security of the Internet of Things will have a profound impact on national security. Therefore, network security issues are getting more and more attention from network users. [0003] Based on this, in related technologies, for a large amount of network security historical data, analyzing the main access interface can be beneficial to interface protection c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0236H04L63/0263H04L63/162
Inventor 刘宏达朱刚
Owner 上海艾涛信息科技发展有限公司
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More