Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security abnormity monitoring method and system in public information platform

A technology for data security and public information, applied in the field of data security, it can solve problems such as frequent changes, difficult real-time response of algorithms, and difficulty in identifying data categories.

Inactive Publication Date: 2016-06-15
成都安信共创检测技术有限公司
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 2. It is difficult to identify data categories in public information platforms (for example, smart city information processing platforms, etc.), so it is difficult to implement classification and classification ideas in public information platforms by applying existing methods;
[0009] 3. In the public information platform, the amount of data is very large and changes frequently, and the existing algorithms are difficult to respond in real time;
[0010] 4. In the existing methods, data classification and grading are mainly used in the fine-grained protection of data, and are rarely used in the identification of data security exception access;
[0013] 1) In an open public information platform, the amount of data is very large and constantly changing, so how to quickly identify whether there is an abnormality in user access behavior is very difficult;
[0014] 2) In the big data environment, the security attributes of some data are explicit, and the security attributes of some data are implicit (for example, a single data is non-sensitive, but multiple data aggregated together become sensitive data), How to identify and prevent hidden sensitive data leakage is also a difficult problem in the monitoring of abnormal behaviors in big data security;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security abnormity monitoring method and system in public information platform
  • Data security abnormity monitoring method and system in public information platform
  • Data security abnormity monitoring method and system in public information platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0035] Example: see figure 1 , figure 2 , image 3 with Figure 4 ,

[0036] This patent adopts the idea of ​​"three-level analysis and detection" to construct the data security anomaly monitoring system architecture in the public information platform, and uses different methods to analyze whether there is abnormal behavior in the system according to different scenarios. framework such as figure 1 Shown:

[0037] The system is divided into data layer, analysis layer and display layer. The basic data mainly comes from: ①The operation behavior of the bypass shunt to the data, and the protocol analysis to obtain its behavior data; ②Obtain system logs, device logs, application logs and database logs, etc.; ③Collect intranet security log information at the same time. The analysis layer adopts a three-level analysis method to analyze the data at different granularities. The presentation layer mainly uses visualization technology to visually display security threats to help d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security abnormity monitoring method and system in a public information platform. The system comprises a data layer responsible for data collection, an analysis layer for three-level data analysis and a presentation layer for visibility presentation and threat prediction. The data collection of the data layer adopts a multi-source data collection method; the presentation layer mainly afterwards applies a visibility technique, carries out visibility presentation to security threats and helps a decision maker to know the security threat tendency and dynamic states of the system visually; and an executor can know concrete details through a multi-layer pull-down form. According to the method and the system provided by the invention, a manager center processes, analyzes and presents collected data in a clustering mode; the system is of B / S architecture; different personnel can carry out operations such as querying, processing and analyzing to the data through an IE or other browsers; related managers can carry out graphical presentation, know the security conditions of the data visually, perceive the development dynamic states of the data security and dispose timely after an event is generated.

Description

technical field [0001] The invention relates to the field of data security, in particular to a data security anomaly monitoring method and system in a public information platform. Background technique [0002] Traditional firewall and other technologies have existed for 20 to 30 years. Although they have been changing, the essence and structure have not changed. In the future, they will not be able to adapt to the security requirements of the big data environment. With the emergence of application models such as cloud computing and big data, the security architecture will also undergo tremendous changes. For example, users are using smart devices, all data is stored in the cloud, and all information is stored centrally. How to ensure the safe use of this information depends on big data analysis and machine learning modeling. Therefore, driven by the collection, processing and analysis technology of big data, it helps enterprises to automatically detect internal and external...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/1416
Inventor 黄洪
Owner 成都安信共创检测技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products