Data analysis method for coping with cloud computing network attack and server

A data analysis and big data technology, applied in the field of cloud computing, can solve the problems of difficult network attack detection and positioning, detection technology is difficult to use effectively, etc., to reduce the amount of attack recognition calculations, improve recognition accuracy and timeliness, and reduce resource overhead Effect

Active Publication Date: 2022-07-08
北京徽享科技有限公司
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Relevant network attack protection processing is usually implemented based on the detection results of network attacks. However, in practical applications, due to the complexity of cloud computing services, most...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data analysis method for coping with cloud computing network attack and server
  • Data analysis method for coping with cloud computing network attack and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Hereinafter, the terms "first", "second" and "third" etc. are only used for descriptive purposes, and should not be construed as indicating or implying relative importance or implying the number of indicated technical features. Thus, a feature defined as "first", "second" or "third" etc. may expressly or implicitly include one or more of that feature.

[0040] figure 1 A schematic flowchart of a data analysis method for responding to cloud computing network attacks provided by an embodiment of the present invention is shown. The data analysis method for responding to cloud computing network attacks may be implemented by a big data analysis server, and the big data analysis server may include a memory and a processor; The memory is coupled to the processor; the memory is used to store computer program code, the computer program code includes computer instructions; wherein, when the processor executes the computer instructions, the big data analysis server is caused to P...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data analysis method for coping with a cloud computing network attack and a server, which can intelligently respond to a network attack analysis instruction and collect a potential abnormal session information set in cloud service activity big data triggering an information security response mechanism. Then, the method can be used for guiding a big data attack analysis network to identify cloud service activity big data triggering an information security response mechanism based on the potential abnormal session information set, so that the attack identification operand of the big data attack analysis network is reduced; compared with a traditional thought of manually positioning the potential abnormal session information set for a big data attack analysis network, the method has the advantages that the intelligent degree of network attack identification for cloud service activity big data can be improved; and unnecessary resource overhead is reduced.

Description

technical field [0001] The invention relates to the technical field of cloud computing, in particular to a data analysis method and a server for dealing with cloud computing network attacks. Background technique [0002] The continuous expansion of the scale and application fields of cloud computing services increases the possibility of cloud computing services being subject to cyber attacks to a certain extent, which may easily lead to the loss of important data assets in cloud computing services, and may also trigger a series of negative chain effects. reaction. Therefore, network attack protection for cloud computing is crucial. Related network attack protection processing is usually implemented based on the detection results of network attacks, but in practical applications, due to the complexity of cloud computing services, most detection technologies are usually limited, making it difficult for such detection technologies to be effective. It is difficult to accuratel...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40H04L67/10
CPCH04L63/1416H04L63/20H04L67/10
Inventor 龚良
Owner 北京徽享科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products