Network Status Analysis System Based on Security Log
A technology for analyzing systems and logs, applied in the field of information
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] The invention is a network situation analysis system and analysis method used in the field of network management. The present invention is described in detail below with specific examples.
[0028] like figure 1 As shown, the network situation analysis system 1 of the present invention runs on a Linux server, and each security product is first set to send security logs to the security log management subsystem 2 in the analysis system. The security log acquisition module 3 in the security management subsystem receives the security logs sent by each security device, and stores them in the database, and at the same time, according to the attributes of the security logs, classifies the received security logs through the security log classification module 4, Group security logs into three categories: availability, confidentiality, and integrity. Then, according to the IP address in the security log, each security log is positioned to a specific device through the security ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 