Data display method based on security big data and artificial intelligence, and cloud computing system

A data display and artificial intelligence technology, applied in the field of cloud computing systems, can solve the problems of not considering the construction of information security defense system, frequent information attacks, and inability to fully grasp the system security protection capabilities in advance, so as to reduce the security protection verification test process. Effect

Inactive Publication Date: 2021-08-27
广州瑞丰互联科技有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, there are more and more information security issues, and information attacks are becoming more and more frequent, resulting in leakage of user privacy data, paralysis of Internet services, and huge losses to social interests.
Under normal circumstances, a system does not consider the construction of its information security defense system during the network design stage. Instead, after being attacked by a network, developers begin to deploy various cloud computing security systems in the system in an attempt to defend against network attacks. Although the security of the system has been improved to a certain extent, it is difficult for the cloud computing security system to play a theoretical role in practice, so that developers cannot fully grasp the lack of security protection capabilities of the system in advance, and cannot effectively build a security defense system for the system. Make the system in a passive state when an information security incident occurs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data display method based on security big data and artificial intelligence, and cloud computing system
  • Data display method based on security big data and artificial intelligence, and cloud computing system
  • Data display method based on security big data and artificial intelligence, and cloud computing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] figure 1 It is a schematic diagram of a scene of a data presentation system 10 based on secure big data and artificial intelligence provided by an embodiment of the present disclosure. The data presentation system 10 based on secure big data and artificial intelligence may include a cloud computing system 100 and an Internet information service platform 200 communicatively connected to the cloud computing system 100 . figure 1 The shown data display system 10 based on secure big data and artificial intelligence is only a feasible example, and in other feasible embodiments, the data display system 10 based on secure big data and artificial intelligence may also only include figure 1 At least some of the components shown may also include other components.

[0020] In this embodiment, the cloud computing system 100 and the Internet information service platform 200 in the data display system 10 based on secure big data and artificial intelligence can cooperate to execute t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a data display method based on security big data and artificial intelligence, and a cloud computing system. The method comprises the following steps: carrying out the key security policy reinforcement configuration of an Internet information service platform according to a security defense policy map between the security domains of target threat perception big data of the Internet information service platform, acquiring simulated attack protection data for the configured strategy reinforcement configuration data, analyzing the simulated attack protection data based on the security protection performance learning network meeting the model convergence requirement to obtain security protection performance information corresponding to the simulated attack protection data, and according to the security protection performance information corresponding to the simulated attack protection data, performing data display on a security protection development page corresponding to the target threat perception big data. Thus, by analyzing the simulated attack protection data, the security protection performance information related to the simulated attack protection data can be determined and then transmitted to the corresponding security protection development page for data display, so that the security protection verification test process of the security protection development page is reduced.

Description

technical field [0001] The present disclosure relates to the technical field of information security, and for example, relates to a data display method and a cloud computing system based on secure big data and artificial intelligence. Background technique [0002] At present, with the rapid development of network information technology, information technology has been applied to various fields, bringing great convenience to life and production. At the same time, there are more and more information security issues, and information attacks are becoming more and more frequent, resulting in leakage of user privacy data, paralysis of Internet services, and huge losses to social interests. Under normal circumstances, a system does not consider the construction of its information security defense system during the network design stage. Instead, after being attacked by a network, developers begin to deploy various cloud computing security systems in the system in an attempt to defen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/55G06F16/36
CPCG06F21/55G06F21/6245G06F16/367
Inventor 闫世强田俭杨海珍张洪艳
Owner 广州瑞丰互联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products