Integration and conversion system for network security data

A technology of network security and conversion system, applied in the field of network security data integration and conversion system, can solve the problems of low performance, not supporting dynamic addition of network security probes to the system, complicated data conversion, etc., to achieve the effect of improving accuracy

Inactive Publication Date: 2012-05-16
NAT UNIV OF DEFENSE TECH
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0026] The purpose of the present invention is to overcome the problems of complex data conversion, low performance, and not supporting the dynamic addition of network security probes to the system in the existing method for data integration and conversion of heterogeneous security data, and to provide an efficient and convenient , Accurate data integration and transformation methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Integration and conversion system for network security data
  • Integration and conversion system for network security data
  • Integration and conversion system for network security data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention will be described below in conjunction with the accompanying drawings and specific embodiments.

[0042] Since regular expressions (Regular Expressions) are used in the present invention to realize the integration and conversion of heterogeneous security data, before describing the methods of the present invention in detail, a brief description of regular expressions is given first.

[0043] A regular expression is a string composed of a series of special characters, each of which is called a metacharacter, and these metacharacters are not expressed as their literal meanings, but are interpreted as some specific meanings. The main uses of regular expressions are:

[0044] 1. Verify whether the string conforms to the specified characteristics, such as verifying whether it is a legal email address.

[0045] 2. Used to find strings. It is more flexible and convenient to use regular expressions to find strings matching specified characteristics from ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an integration and conversion system for network security data. The system comprises a network security detection tool, an agent module, a configuration module, a data acquisition device and a data sorting and merging processing module, wherein the number of the network security detection tool is at least one, each network security detection tool comprises at least one agent module and at least one configuration module; the configuration module comprises a configuration document, and the configuration document comprises a data format conversion rule described by a regular expression; the network security detection tool obtains the network security data of the located network; the agent module obtains the network security data from the network security detection tool according to the configuration document, extracts security event data in the network security data according to the regular expression and converts the extracted security event data into a uniform data format corresponding to the security event; and the data acquisition device collects the security event data formed by conversion of each agent module, and sends the security event data to the data sorting and merging processing module, so that the data sorting and merging processing module can sort and merge the data.

Description

technical field [0001] The invention relates to the field of network security, in particular to a system for integrating and converting network security data. Background technique [0002] With the increasing popularity of network applications, network security issues are getting more and more attention. Various current network protection facilities such as data stream collectors, intrusion detection systems, virus detection systems, vulnerability scanning systems and firewalls have obtained part of network security data from different angles. In order to obtain more complete data, it is necessary to integrate the data detected by various manufacturers' detection tools for unified analysis. Since the data formats and storage methods set by different manufacturers are different, it is necessary to extract corresponding security data from various heterogeneous detection tools, and integrate and convert these security data into unified data in a certain format , Only in this ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 韩伟红贾焰陈志坤张剑锋郑黎明李爱平周斌杨树强徐镜湖刘东赵光耀
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products