Threat identification method based on big data security, and data security server

An identification method and big data technology, applied in the field of big data and information threat protection, can solve the problems of interference and influence, and it is difficult to ensure the accuracy and reliability of information security threat identification, so as to reduce influence and interference, ensure accuracy and reliability. The effect of reliability

Active Publication Date: 2021-11-26
GUANGDONG AOFEI DATA TECHNOLOGY CO LTD
View PDF7 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the actual application process, it is very important to identify the threat of data information security for various businesses. However, the inventor found in the process of research and analysis that

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat identification method based on big data security, and data security server
  • Threat identification method based on big data security, and data security server
  • Threat identification method based on big data security, and data security server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] figure 1 A schematic block diagram of a data security server 10 provided by the embodiment of the present application is shown. The data security server 10 in the embodiment of the present application can be a server with data storage, transmission and processing functions, such as figure 1 As shown, the data security server 10 includes: a memory 11 , a processor 12 , a communication bus 13 and a threat identification device 20 based on big data security. The memory 11 , the processor 12 and the communication bus 13 are electrically connected directly or indirectly to realize data transmission or interaction. The embodiment of the present application also provides a computer storage medium, where the computer storage medium stores a computer program, and the computer program implements the above method when running.

[0012] figure 2 A flow chart of threat identification based on big data security provided by the embodiment of the present application is shown. The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of big data and information threat protection, in particular to a threat identification method based on big data security and a data security server. According to the invention, an operation intention expression having a positive effect on the detection precision and credibility of a digital threat identification result is determined from a target big data service operation log set, thereby realizing threat identification of the target big data service operation log, ensuring the accuracy and reliability of the digital threat identification result as much as possible, and reducing the influence and interference of noise except for the operation intention expression on the digital threat identification result.

Description

technical field [0001] The embodiment of the present application relates to the technical field of big data and information threat protection, and specifically relates to a threat identification method and a data security server based on big data security. Background technique [0002] With the development of big data, big data security has extended from the traditional safe city, intelligent traffic management, environmental protection, hazardous chemical transportation monitoring, food safety monitoring and other fields to the field of cloud business processing. Today's big data security focuses more on the security protection processing at the data information level to protect users' data information from the threat of various network attacks. In the actual application process, it is very important to identify the threat of data information security for various businesses. However, the inventor found in the process of research and analysis that the relevant information se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q30/00G06F11/34G06F16/35G06F40/205G06F40/279G06F40/30G06N20/00
CPCG06Q30/0185G06F11/3476G06F16/355G06F40/30G06F40/279G06F40/205G06N20/00
Inventor 赵琦林楠
Owner GUANGDONG AOFEI DATA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products