Security cloud service big data-based component configuration method and AI cloud service system

A configuration method and cloud service technology, applied in the field of big data, can solve problems such as insufficient information and poor targeting of abnormal repairs.

Inactive Publication Date: 2021-09-07
广州市泽联科技有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in related technologies, due to the insufficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security cloud service big data-based component configuration method and AI cloud service system
  • Security cloud service big data-based component configuration method and AI cloud service system
  • Security cloud service big data-based component configuration method and AI cloud service system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present disclosure will be described in detail below with reference to the accompanying drawings, and the specific operation methods in the method embodiments can also be applied to the device embodiments or system embodiments.

[0022] figure 1 It is an interactive schematic diagram of a component configuration system 10 based on secure cloud service big data provided by an embodiment of the present disclosure. The component configuration system 10 based on secure cloud service big data may include an AI cloud service system 100 and a cloud service node device 200 communicatively connected to the AI ​​cloud service system 100 . figure 1 The shown component configuration system 10 based on secure cloud service big data is only a feasible example, and in other feasible embodiments, the component configuration system 10 based on secure cloud service big data may also only include figure 1 At least some of the components shown may also include other components.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a security cloud service big data-based component configuration method and an AI cloud service system, and the method comprises the steps: generating a combined probability value between a reference trajectory node and a target abnormal trajectory node according to the trajectory matching degree of the reference trajectory node and the target abnormal trajectory node under at least one abnormal trajectory node; by integrating the combined probability values between the reference trajectory nodes and the target abnormal trajectory nodes in each security abnormal environment, utilizing a large number of reference bases based on the abnormal trajectory nodes, so that more target abnormal trajectory nodes can be obtained, the pertinence of subsequent abnormality repair can be improved, and when the abnormal track node is used as the minimum basic unit, the situation that errors occur when the abnormal matching elements are combined can be avoided, and therefore the pertinence of abnormal repairing is improved.

Description

technical field [0001] The present disclosure relates to the technical field of big data, in particular, to a method for configuring components based on secure cloud service big data and an AI cloud service system. Background technique [0002] Network attacks are the main cause of network security threats. Sniffing attacks, interception attacks, and denial of service attacks are common network attacks. For example, a sniffer attack is a passive attack, mainly through the hacker terminal sniffing the information transmission path of the target terminal through access, and then copying the information transmitted through the network; an interception attack is an active attack, the attack method is to change the transmission path, but the hacker Terminals can perform operations such as tampering with intercepted messages; denial-of-service attacks are also active attacks, mainly by exhausting resources such as network devices or servers so that they cannot provide services to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/1425H04L63/1441H04L41/0661
Inventor 徐金财李麒麟项鹏臻陈伟宗
Owner 广州市泽联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products