Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Big data intelligent analysis and application method based on network security

A technology of network data and application methods, applied in the field of network security, can solve the problems of lack of data collection, analysis, prediction, early warning and solutions

Pending Publication Date: 2021-06-08
江苏国信安网络科技有限公司
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, although the above technology can achieve simultaneous network detection and file detection, it lacks the capabilities of data collection, analysis and prediction, research and early warning, and solutions for unknown threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data intelligent analysis and application method based on network security
  • Big data intelligent analysis and application method based on network security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to have a further understanding of the purpose, structure, features and functions of the present invention, the detailed description is as follows in conjunction with the embodiments.

[0019] Certain terms are used in the description and claims to refer to particular elements. Those of ordinary skill in the art will appreciate that manufacturers may refer to the same element by different terms. The specification and claims do not use the difference in name as a way to distinguish components, but use the difference in function of components as a criterion for distinguishing. "Include" mentioned throughout the specification and claims is an open term, so it should be interpreted as "including but not limited to".

[0020] See figure 1 , figure 1 It is a schematic flow chart of a network security-based big data intelligent analysis application method provided by an embodiment of the present invention.

[0021] Such as figure 1 As shown, the big data intellig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a big data intelligent analysis application method based on network security, and the method comprises the following steps: acquiring and preprocessing network data, storing the network data and forming a distributed storage management system; establishing a mathematical model library according to the network data, and completing data structure definition; providing a data mining analysis entry, establishing a corresponding model according to the algorithm parameters, and generating an analysis result. According to the invention, on the basis of security big data, the network security situation can be sensed in all weather and all directions; an existing real-time monitoring technology is utilized, and abnormal behaviors are found through long-time data analysis; through data modeling, a visual analysis capability is established, an influence range, an attack path, a purpose and a means of a threat are rapidly researched and judged, and an effective security decision and response are made; a risk notification and threat early warning mechanism is established, information such as objectives, techniques and tactics, attack tools and the like of attackers is comprehensively mastered, and a defense system is perfected.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network security-based big data intelligent analysis application method. Background technique [0002] At present, network security technology usually uses big data analysis and detection of known network threats and attack behaviors, that is, through the analysis of network traffic, threat data and behavior technologies, to detect all persistent threats of suspicious network activities for protection. [0003] However, although the above-mentioned technology can achieve simultaneous network detection and file detection, it lacks the capabilities of data collection, analysis and prediction, research and early warning, and solutions for unknown threats. Contents of the invention [0004] The purpose of the present invention is to provide a network security-based big data intelligent analysis application method, which can effectively monitor various network threats. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/245G06F16/215G06F16/25G06F16/28G06Q10/06
CPCG06F16/245G06F16/215G06F16/25G06F16/285G06Q10/0635G06Q10/067
Inventor 战文宗尹家波李勇
Owner 江苏国信安网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products