Security protection configuration method based on information security big data and cloud computing system

Fecha de publicación: 27/08/2021
Fuente: Wipo "BigData"
The embodiment of the invention provides a security protection configuration method based on information security big data and a cloud computing system, and the method comprises the steps: determining a protocol protection key field of a business data transmission protocol of an access registration object corresponding to each target protocol protection instruction included in a target security protection rule, quoting extension protocol protection rules, searching a preset extension protocol protection instruction of the extension protocol protection rule set, determining a to-be-configured preset extension protocol protection instruction from the at least one preset extension protocol protection instruction set, and performing security protection configuration, so each target protocol protection instruction included in the target security protection rule can be matched with the extended protocol protection rule of the service data transmission protocol of the access registration object, the matching precision of the service data transmission protocol in the security protection configuration process is improved, and the directivity of security protection configuration is improved.