Method, system and device for monitoring security event

A technology of security incidents and incidents, applied in the field of network security, can solve problems such as poor versatility, and achieve the effect of improving versatility

Inactive Publication Date: 2010-09-08
BLUEDON INFORMATION SECURITY TECH CO LTD
View PDF0 Cites 56 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention provides a security event monitoring method, system and device to solve the problem of poor versatility of the existing network information security event monitoring technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and device for monitoring security event
  • Method, system and device for monitoring security event
  • Method, system and device for monitoring security event

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to solve the problem of poor versatility of existing network information security event monitoring technologies, the present invention provides a general security event monitoring solution.

[0019] see figure 1 As shown, it is a system architecture diagram in the embodiment of the present invention, which is designed by layered processing and event collection client (agent software) plug-in.

[0020] The data collection method adopts hierarchical processing. Firstly, it is divided according to manufacturers, regions, and industries. Each manufacturer collects and deploys border security product logs by itself to the manufacturer, region, and industry log collection and analysis center. Specifically, the node log server collects border security product logs. (that is, the event log of the security product under the jurisdiction of this node), and stored in the node log database.

[0021] Deploy the event collection client on the node log server (can be a plug-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a system and a device for monitoring a security event, which relate to the field of network security and are used for solving the problem that the generality of the conventional network information security event monitoring technique is poor. The method comprises the steps that: an event-acquiring client acquires an event log of a node in real time; the event-acquiring client uploads the acquired event log data to a security event monitoring center; and the security event monitoring center acquires the uploaded event log data and arranges the data to have a uniform format. The system comprises a node log server, the event-acquiring client and the security event-monitoring center, wherein the event-acquiring client is arranged on the node log server; the security event-monitoring center is communicated with the event-acquiring client; and the event-acquiring client comprises an acquiring unit and an uploading unit.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method, system and device for monitoring security events. Background technique [0002] The development of information network has brought great convenience to social production and life, but also caused many problems. First, computer viruses and Trojan horses are seriously infected. In half a year in 2009, 195 million Internet users were attacked by viruses and Trojans, 110 million Internet users were attacked by viruses and Trojans while surfing the Internet, and 110 million Internet users encountered account or password theft. Second, there are frequent cyber attacks. Since June 2009, a Turkish hacker organization broke through more than 200 websites in my country, including several websites in our province, causing negative social impact. [0003] In order to cope with information security threats, information network operators and users have installed security systems such...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06
Inventor 柯宗贵柯宗庆
Owner BLUEDON INFORMATION SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products