Safety management method for distributed SYSLOG (System Log) in network management system

A network management system and security management technology, applied in the field of network management system, can solve the problems of log server crash, low log performance, loss of SYSLOG log data, etc., to achieve the effect of improving performance and improving security

Inactive Publication Date: 2012-08-01
网经科技(苏州)有限公司
View PDF4 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Since the traditional SYSLOG data is in plain text, these data are very easy to be intercepted and analyzed, and the logs are simply sent to a single log server, which increases the burden on the log server and easily causes the log server to crash, resulting in The loss of SYSLOG log data can also easily cause the performance of the log server to analyze the log is very low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety management method for distributed SYSLOG (System Log) in network management system
  • Safety management method for distributed SYSLOG (System Log) in network management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The distributed SYSLOG log security high-performance management method adopts a custom symmetric encryption algorithm to classify the SYSLOG log data according to the user's online behavior, such as web browsing, blog forum, online game, instant messaging, email, file transfer, remote login , Internet proxy, stock software, multimedia, P2P software, and according to different types of SYSLOG log data, first enter different types of cache queues, and send the SYSLOG log data in different types of cache queues to different types of log servers through sending threads. In this way, the distributed security high-performance management of the SYSLOG log is realized, so as to improve the performance of the log server for analyzing the log and improve the security of the log storage.

[0028] figure 1 Describes the overall example of OfficeTen routers processing SYSLOG log data. Personnel connect to OfficeTen routers on computers 1, 2, 3, and 4 through network cables, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safety management method for a distributed SYSLOG (System Log) in a network management system. The method comprises the following steps of: classifying SYSLOG data according to the online behaviors of a user; encrypting the classified SYSLOG data by a user-defined encryption symmetric algorithm and entering different types of caching queue according to different types of SYSLOG data firstly; and sending the SYSLOG data in different types of caching queues to different types of log servers through sending threads, so as to realize the distributed safety management of the SYSLOG. Therefore, the log analysis performance of the log server is improved and the log storage safety is enhanced.

Description

technical field [0001] The invention relates to a method for transmitting SYSLOG log data in a network management system, in particular to a method for classifying and encrypting SYSLOG log data and transmitting data in a distributed manner, belonging to the technical field of network management systems. Background technique [0002] With the rapid development of the Internet, more and more people access the Internet in public Internet service places, such as chatting, watching movies, playing games, stock speculation, etc., the applications on the Internet can be described as varied, and a major feature of the Internet is its openness. It is this openness that poses a serious threat to the security of services on the Internet. With the development of the internet, it has come a time when it must be controlled and managed, because the internet is full of misinformation, disinformation and undemocratic forces. [0003] Because the traditional SYSLOG data is in plain text, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/56H04L9/30
Inventor 徐冬王东泉谢炜刘继明林恩峰
Owner 网经科技(苏州)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products