Hierarchical aggregation management system for multi-source heterogeneous security data

A security data, multi-source heterogeneous technology, applied in the field of data management, can solve the problems of high false positive rate and false negative rate of intrusion detection system, it is difficult to understand the security threat status of the system, and it is impossible to take response measures in time. Concealment and confidentiality ability, avoid manual extraction, avoid the effect of leakage

Pending Publication Date: 2022-03-01
南京安易信息技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this situation, a defense-in-depth system based on a series of security devices such as intrusion detection, firewall, and anti-virus system has been established, but new problems have also emerged: the intrusion detection system itself has a high rate of false alarms and false negatives. At the same time, with the continuous increase of security syst

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hierarchical aggregation management system for multi-source heterogeneous security data
  • Hierarchical aggregation management system for multi-source heterogeneous security data
  • Hierarchical aggregation management system for multi-source heterogeneous security data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] refer to figure 1 , figure 2 In this embodiment, a multi-source heterogeneous security data hierarchical aggregation management system is proposed, including: data extraction module, key data acquisition module, data aggregation module, encoding module, data transmission module, reverse decoding module, data comparison module and data fusion module.

[0028] The data extraction module is used for extracting original data fragments using safety monitoring data as a data source. The safety monitoring data refers to: safety alarm log data, network log data and system log data.

[0029] The key data acquisition module is used to identify the original data fragments, compare them according to the pre-input key data, and mark the original data fragments containing key data; for example, for the pre-input key data, each original The data fragments are compared and scanned, and when the key data appears in one of the original data fragments, the original data fragment is ma...

Embodiment 2

[0040] The multi-source heterogeneous security data hierarchical aggregation management system may also include a standardization module, through which the original data fragments are standardized and marked with data source features, so that the data extraction module can extract key data from the original data fragments The collection module performs collection, such as extracting data source feature codes, and aggregating feature codes with original data fragments, so as to facilitate later classification. When raw data is input into the system, the data extraction module can be divided according to the input scene, area, time, input method, input account number, etc., so as to distinguish and obtain multiple raw data fragments from different sources. For example, if the input scenario is input through a security topic, the feature code is security.

[0041] The original data comes from the Internet of Things; the Internet of Things is the application of the Internet of Thi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of data management, and particularly discloses a multi-source heterogeneous security data hierarchical aggregation management system which comprises a data extraction module used for extracting original data fragments. And the key data acquisition module is used for identifying the original data fragments and obtaining fragment numbers. And the data aggregation module fuses the original data fragment and the fragment number to obtain a fusion code. And the coding module is used for recombining the fusion code to obtain a combined code. And the data transmission module is used for transmitting the combination code. And the reverse order decoding module is used for carrying out inverse operation on the combined code to obtain a restored fusion code. And the data comparison module is used for restoring the restored fusion code to obtain an original data fragment. And the data fusion module is used for associating the restored original data fragments with the multi-source data and selecting data from top to bottom for data aggregation. According to the method, the fusion code is formed by the original data fragments and is transmitted through the combination code, so that the concealment is high and the secrecy capability is strong.

Description

technical field [0001] The invention relates to the technical field of data management, in particular to a multi-source heterogeneous security data hierarchical aggregation management system. Background technique [0002] With the development of science and technology and the progress of society, human beings have entered the era of digitalization. Multiple sources refer to multiple data holders, while heterogeneity refers to inconsistent data types and characteristics. With the continuous promotion and use of the network, its scale is becoming larger and larger, and intrusion attacks are also developing in the direction of scale, complexity and intelligence, which brings more and more threats to the network and causes more and more losses. bigger. In this situation, a defense-in-depth system based on a series of security devices such as intrusion detection, firewall, and anti-virus system has been established, but new problems have also emerged: the intrusion detection sy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40
CPCH04L63/0428
Inventor 张振清
Owner 南京安易信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products