Threat intelligence big data sharing method and system

The invention provides a threat intelligence big data sharing method and system, and the method comprises the steps: obtaining intelligence big data from a server cluster, calculating the homology of each table, constructing a data tree, distributing the sharing authority of each table through the d...

Full description

Saved in:
Bibliographic Details
Main Authors ZHU ZHIHUA, ZHANG PENG, XIE LIPAO, WU JUN, YIN FANGPING, LI TINGTING
Format Patent
LanguageChinese
English
Published 02.11.2021
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The invention provides a threat intelligence big data sharing method and system, and the method comprises the steps: obtaining intelligence big data from a server cluster, calculating the homology of each table, constructing a data tree, distributing the sharing authority of each table through the data tree, and determining an access sequence according to the sharing authority. The beneficial effect of effectively processing exclusive permission distribution of each table in the database is achieved. 本公开提供了一种威胁情报大数据共享方法及系统,通过从服务器集群获取情报大数据,计算各个表的同源度构建数据树,并以数据树进行分配各个表的共享权限,进而按照共享权限决定访问顺序,实现了有效处理数据库中各个表的排他性权限分配的有益效果。
Bibliography:Application Number: CN202111139244