Method and system for detecting and processing malicious codes in big data
A malicious code detection and processing method technology, applied in the field of malicious code detection and processing methods and systems in big data, can solve the problems of inability to meet network high performance, high reliability, high capacity, poor mobile communication service experience, etc. Fast scanning and comparison speed, improving efficiency and reducing user losses
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] Embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings and examples. The following examples are used to illustrate the present invention, but should not be used to limit the scope of the present invention.
[0041] figure 2 It is a system structure diagram of the present invention, which discloses a malicious code detection and processing system in big data, including:
[0042] MVDS monitoring probe, deployed between PCF and PSDN, obtains real-time traffic data, performs protocol analysis and judgment on vicious events, records and uploads running information, detection log information and session restoration information in real time;
[0043] The MVDS management platform is responsible for the collection, collation, storage, display, management and processing of the entire system data;
[0044] Dispose of the interface system and execute the command tasks of the MVDS management platform to assist ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


