Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security attack alarm positioning system based on Spark big data platform of Tachyou

A big data platform and security attack technology, which is applied in the field of security attack alarm positioning system based on Tachyou Spark big data platform, can solve the problems of unclear security responsibilities, low processing efficiency, untimely fault diagnosis, etc., and achieve easy expansion and The effect of reducing and improving accuracy

Inactive Publication Date: 2015-12-30
NANJING LIANCHENG TECH DEV
View PDF6 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0019] 1. There are many types of information security products and network equipment, widely distributed, and lack of unified data analysis and management;
[0020] 2. The knowledge base of information security products and network equipment is not unified, and there is a lack of unified solutions;
[0021] 3. Safety responsibilities are unclear, and specific responsibilities have not been implemented;
[0022] 4. Information security operation and maintenance management assessment is not detailed, lacking some necessary and key indicators;
[0023] 5. There is a lack of more advanced intelligent analysis and aggregation correlation between different security device events and even the same security device events, resulting in a huge amount of alarm information, which is not convenient for the analysis and discovery of potential safety hazards, so as to prevent problems before they happen;
[0024] 6. Information security incidents are not reported in time, fault diagnosis is not timely, processing efficiency is low, and the effect is poor;
[0025] 7. Information security incidents and asset vulnerabilities have not been correlatively analyzed, resulting in no further analysis and processing of many incidents;
[0029] The above-mentioned problems exist to varying degrees in the business and network that the enterprise has built, which will become an obstacle to the stable improvement of the enterprise's business security operation and maintenance management in the future

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security attack alarm positioning system based on Spark big data platform of Tachyou
  • Security attack alarm positioning system based on Spark big data platform of Tachyou

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Below is further detailed description of the present invention according to accompanying drawing and example:

[0057] A security attack alarm positioning system based on Tachyou's Spark big data platform of the present invention collects logs of various devices in the enterprise environment by integrating flume into the kafka distributed data exchange system, and preprocesses and transmits them to the positioning module in real time . The positioning module provides real-time analysis of the knowledge base, pushes the analysis results to the foreground, and provides alarm information traceability and proof functions. Its structure is as follows figure 1 Shown: (1) The acquisition module is composed of the kafka distributed data exchange system. (2) Security attack alarm location module, which is composed of SparkStreaming; (3) View module, which provides alarm information and analysis, log information and analysis query.

[0058] The collection module is the premise...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security attack alarm positioning system based on a Spark big data platform of Tachyou and belongs to the field of big data and information security. The system comprises an acquisition module, a security attack alarm positioning module and a view module. The acquisition module gathers log information in an enterprise information system, preprocesses and pushes the log information to the security attack alarm positioning module in real time, the security attack alarm positioning module performs real-time analysis to generate alarm information, and sends the alarm information to a view front end page. Compared with the prior art, the security attack alarm positioning system can solve the problem that a large number of logs are difficult to analyze in real time and has excellent practicality and value of popularization and application.

Description

technical field [0001] The invention relates to the technical fields of information security, Spark big data platform, Flume log collection, kafka data exchange platform, HDFS and Tachyou distributed memory file system, and in particular relates to a security attack alarm positioning system. Background technique [0002] The English abbreviation included in the present invention is as follows: [0003] SOC: SecurityOperationCenter Security Management Center [0004] IDS: IntrusionDetectionSystems intrusion detection system [0005] DDOS: DDoS: DistributedDenialofService distributed denial of service attack [0006] MIS: Management Information System Management Information System [0007] DMZ: demilitarizedzone isolation area, or demilitarized area [0008] JMS: JavaMessageServiceJava Message Service [0009] APP: Application application [0010] SNMP: SimpleNetworkManagementProtocol Simple Network Management Protocol [0011] HDFS: HadoopDistributeFileSystemHadoop Dis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L29/06
Inventor 凌飞李木金
Owner NANJING LIANCHENG TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products