Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Website security monitoring and alarm system based on log analysis and firewall security matrix

A security matrix and security monitoring technology, applied in the field of information security, can solve problems such as destroying the security matrix

Active Publication Date: 2018-08-10
朱烨 +1
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the compromised websites are hackers who obtain the outer host / server authority, then remotely log in / automatically download to carry out further content tampering and destruction. This process will inevitably destroy the security matrix defined by the original system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Website security monitoring and alarm system based on log analysis and firewall security matrix
  • Website security monitoring and alarm system based on log analysis and firewall security matrix
  • Website security monitoring and alarm system based on log analysis and firewall security matrix

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The specific implementation of this system is as follows:

[0032] 1. Deploy the monitoring agent on all relevant host nodes of the website, and deploy the management center server on the local intranet or remotely.

[0033] 2. The website security administrator designs the firewall security matrix of the entire website according to the guidance of this system, and configures the firewall equipment and hosts in the relevant environment of the website according to the requirements of the matrix.

[0034] 3. The administrator configures the monitoring parameters of the security matrix on the management node of the system, and the management node sends the monitoring requirements to each monitoring agent. The monitoring agent adopts direct and indirect methods to perform monitoring tasks to verify the validity of the matrix, and will report to the management node if any discrepancy is found. The direct monitoring method will regularly initiate access attempts (such as tel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a website security monitoring and alarming system based on log analysis and firewall security matrixes. The website security monitoring and alarming system aims at finding and stopping various security attacks on the website in time and is based on two work items which a website security administrator mostly depends on during actual security operation and maintenance. Log monitoring is characterized in that the known and unknown attacks are automatically found by conducting keyword / regular expression filtering on access of Apache / Tomcat / IIS or error logs or other environment logs, and meanwhile service processing errors caused by the hacker attacks in the early period are found in time through log customization in website service codes. The website security monitoring and alarming system is characterized in that the firewall security matrixes are defined, then the effectiveness of the firewall security matrixes is verified with the direct or indirect network connectivity detecting technology, and alarming is triggered once the firewall security matrixes are damaged. The website security monitoring and alarming system provides a simple and effective customization mode for the administrator, and sensing capacity for any attack or any suspicious action can be continuously improved.

Description

technical field [0001] The technical field of the present invention is the website security protection and monitoring and alarm system in the information security field. Background technique [0002] With the high-speed development of Internet applications, various Web sites are growing at a geometric progression rate, but the endless hacker attacks pose a huge threat to the usability and security of Web sites. The current mainstream security protection includes various types of systems: intrusion detection system, web application firewall, remote security scanning, etc. However, the above-mentioned types of security products are not enough to guarantee the security of the website for the following reasons: [0003] Intrusion detection system: The relying mechanism is the inspection of network packets. Because it does not understand the business logic of the user's website application, it can only perform matching inspections on known typical exploit methods and attack ch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L12/26H04L29/06
Inventor 朱烨袁晓东
Owner 朱烨
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products