Unlock instant, AI-driven research and patent intelligence for your innovation.

Network Status Analysis System Based on Security Log

A technology for analyzing systems and logs, applied in the field of information

Active Publication Date: 2016-11-02
CHINA TOBACCO ZHEJIANG IND
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing network management system only analyzes and monitors the performance and faults of network devices and hosts, and the security management system only analyzes security logs and security events, without comprehensive analysis of security logs and device attributes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network Status Analysis System Based on Security Log
  • Network Status Analysis System Based on Security Log

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The invention is a network situation analysis system and analysis method used in the field of network management. The present invention is described in detail below with specific examples.

[0028] like figure 1 As shown, the network situation analysis system 1 of the present invention runs on a Linux server, and each security product is first set to send security logs to the security log management subsystem 2 in the analysis system. The security log acquisition module 3 in the security management subsystem receives the security logs sent by each security device, and stores them in the database, and at the same time, according to the attributes of the security logs, classifies the received security logs through the security log classification module 4, Group security logs into three categories: availability, confidentiality, and integrity. Then, according to the IP address in the security log, each security log is positioned to a specific device through the security ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a security log-based network state analysis system. The system comprises a security log management subsystem, an equipment asset management subsystem and a network performance and fault management subsystem. According to the security log-based network state analysis system, adjustment is performed according to different influences of different security logs on the network situation and with the attribute change of the equipment asset and the change of a network performance fault event. According to the system, analytical processing is performed on each security log to obtain the influence of each security log on the network, wherein the security log with the maximum influence value is an event which has the most serious influence on the network situation; thus a reliable basis is provided for an administrator to solve the network security problem.

Description

technical field [0001] The invention belongs to the field of information technology, and in particular relates to an analysis system aiming at network operation status in an enterprise internal network. Background technique [0002] At present, the analysis of network operation status is mainly based on the monitoring and analysis of network performance and faults. The main technology used is the SNMP protocol. The network monitoring and management system obtains the operating parameters of network devices and hosts through SNMP. Through the analysis of operating parameters, the Network performance and fault conditions, so as to realize the monitoring of network operation status. With the development and application of network security technology, more and more security devices are deployed in the network. These security devices will generate a large number of security logs or security events, which reflect the security status of network operation. Important indicators of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/06
Inventor 姜学峰李威李健俊董惠良
Owner CHINA TOBACCO ZHEJIANG IND