Method for completely auditing user behaviors under centralization access mode

A user-behavior technology, applied in the field of information security, can solve problems such as system resource occupation, data loss, and system efficiency reduction, and achieve the effect of solving performance problems of the audit system

Inactive Publication Date: 2009-05-27
CHINA MOBILE GROUP ZHEJIANG
View PDF0 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the centralized access of a large number of users, this method has a huge overhead on system resources, resulting in the occupation of a large number of system resources and reducing the efficiency of the system.
And the audit module of the application layer may conflict with other applications and cause data loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for completely auditing user behaviors under centralization access mode
  • Method for completely auditing user behaviors under centralization access mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] See attached picture. In the present invention, a centralized publishing platform is arranged between the client end and the background server, which is composed of several publishing machines, and the network monitoring program is installed on the publishing machines.

[0028] Concrete steps of the present invention are as follows:

[0029] Step 1: Set up a centralized publishing platform composed of several publishing machines, and deploy application software and network monitoring programs on the publishing machines;

[0030] Step 2, the user requests access to the application software through the web interface of the centralized publishing platform;

[0031] Step 3: The centralized publishing platform designates users to access the application software on the specific publishing machine according to the load balancing mechanism;

[0032] Step 4, the user uses his own account (main account) to connect to the publishing machine through the client of the centralized ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for overall auditing behavior of a customer under an integrated access pattern, wherein an integrated issuing platform consisting of a plurality of issuing machines is provided, each issuing machine is provided with application software and a network monitoring program; and an auditing server is linked to the network in a bypass mode, and a network acquisition module of the method acquires a network behavior log operated by a user to an auditing server which matches the network access information of the user transmitted by the monitoring program with the network operation log to form complete auditing information for search and analysis, thereby realizing complete auditing data based on the operator. The invention achieves complementarity of advantages of the monitoring program and network behavior auditing methods through the combination of two technological means, thereby ensuring the completeness of the auditing data and improving the auditing efficiency.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a method for comprehensively auditing user behavior in a network environment. Background technique [0002] With the continuous improvement of enterprise systems and supporting networks, a large number of enterprise business server groups and data are concentrated, and data security is becoming more and more obvious; the security protection of enterprise core data has also become the focus of each enterprise's information security construction. [0003] At present, the protection technology for enterprise data security is mainly through auditing the operation behavior of users inside the enterprise, that is, monitoring. There are mainly the following methods of auditing: [0004] One is the interception audit based on the network level. The interception device is deployed at the user data convergence layer, and the user operation behavior is displayed through networ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/24H04L29/08
Inventor 徐良
Owner CHINA MOBILE GROUP ZHEJIANG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products