Big data security protection system and method based on network security

A security protection and network security technology, applied in the field of network security, can solve problems such as the inability to improve the efficiency of detecting and blocking abnormal outreach behaviors, and misjudgment of outreach behaviors, so as to improve security protection efficiency, reduce misjudgments, and reduce interference Effect

Pending Publication Date: 2022-06-03
南京硕茂电子科技有限公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Boundary integrity inspection refers to checking the behavior of unauthorized devices connecting to the intranet and the behavior of intranet users connecting to the external network, accurately determining the location and effectively blocking abnormal external behaviors. The protection method is: set up a host on the internal network and an external network respectively, the internal network host is responsible for sending detection packets to all detected computers in the network at regular intervals, and sends a response packet to the external network host when an abnormal computer is detected. After the host receives the response packet, it confirms the abnormal outreach behavior and blocks it. However, in terms of boundary integrity check, there are still some problems in the existing network information security protection methods: first, during data transmission, it will be affected by other The interference of computer data transmission leads to the possibility of misjudgment of outreach behaviors; secondly, the internal network detection host is randomly set, if multiple computers have abnormal outreach behaviors, the efficiency of detecting and blocking abnormal outreach behaviors cannot be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data security protection system and method based on network security
  • Big data security protection system and method based on network security
  • Big data security protection system and method based on network security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] Example 1: Collect the IP address of the detection host, parse the IP address, model the boundary integrity check environment, and obtain the location coordinates of the detection host as (X, Y)=(20, 20). Detect the IP address of the computer, parse the IP address, and obtain the location coordinate set of the detected computer as (x, y)={(x1, y1), (x2, y2), (x3, y3)}={(6, 6 ), (10, 10), (15, 15)}, the set of times that the detected host detected abnormal outreach behavior of the detected computer in the intranet was obtained as B={B1, B2, B3}={6, 8 , 4}, the set of times the abnormal outreach behavior of the detected computer is blocked due to misjudgment is A={A1, A2, A3}={2, 3, 0}, and the abnormal outreach behavior of the detected computer is analyzed. The set of average duration of blocking is T={T1, T2, T3}={8, 6, 10}, according to the formula The total efficiency that the detection host detects and blocks the abnormal outreach behavior of the detected computer ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a big data security protection system and method based on network security, and the system comprises a user information collection module, a database, a test information analysis module, a protection optimization module and a security protection test module. All collected data are stored through a database, the efficiency of current checking and abnormal condition processing is analyzed through a test information analysis module, a data security protection mode is optimized through a protection optimization module, the checking efficiency before and after optimization is compared through a security protection test module, secondary optimization is carried out, and the data security protection efficiency is improved. The efficiency of checking and blocking abnormal external connection behaviors is improved while the network boundary integrity checking range is expanded, and the erroneous judgment phenomenon of boundary integrity checking is reduced.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network security-based big data security protection system and method. Background technique [0002] With the rapid development of the Internet, network security incidents such as network attacks, brute force cracking, and data leakage often occur, and network information security faces serious challenges. The operation and protection of network information security is related to the stable operation of the entire data center business system. Network information security The scope mainly includes network structure, network boundary and network equipment security, etc. Through the protection of network security, a safe environment can be provided for the operation of user information systems; [0003] Boundary integrity check refers to checking the behavior of unauthorized devices connecting to the intranet privately, and the behavior of intranet users privately connect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1408H04L63/123H04L63/1425H04L63/1416
Inventor 乔翠霞
Owner 南京硕茂电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products