Administrative user abnormal behavior detection method based on big data log analysis

A discovery method and user management technology, applied in special data processing applications, electrical digital data processing, instruments, etc., can solve problems such as incompetence in log analysis, and achieve the effects of easy promotion, strong practicability, and wide application range

Inactive Publication Date: 2014-12-24
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF6 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Massive log data puts forward higher requirements for the efficiency of log analysis and processing. Traditional log storage and analysis methods are no longer competent for log analysis in the context of big data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Administrative user abnormal behavior detection method based on big data log analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0024] The present invention provides a method for discovering abnormal behaviors of management users based on big data log analysis. The big data processing framework is used to deeply mine and analyze the management logs of the internal management personnel of the information system to discover the abnormal behavior of the management personnel, that is, to discover the abnormality of the management personnel. Behaviors and illegal operations, and trace the source of abnormalities. as attached figure 1 As shown, the specific implementation process is:

[0025] 1. The logs to be analyzed are stored in the log pool;

[0026] Two, the log pool is connected to the preprocessing module through the interface module, and the log in the log pool enters the preprocessing module to complete the log preprocessing, that is, the actions of cleaning and i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an administrative user abnormal behavior detection method based on big data log analysis. The administrative user abnormal behavior detection method is implemented thorough an interface module, a preprocessing module, an analysis module, a configuration module, a service module, a visualization module and a knowledge base. Log data enter the preprocessing module through the interface module, are preprocessed by the preprocessing module and then are analyzed through the analysis module; finally, the log data enter the service module and then are displayed on the visualization module. Compared with the prior art, the administrative user abnormal behavior detection method based on big data log analysis has the advantages that a big data processing framework is used for deep excavation and analysis of administrative logs of information system internal administrative staff, abnormal behaviors of the administrative staff are found, in other words, abnormal behaviors and violation operations of the administrative staff are found, abnormality sources are traced, security of the log data is guaranteed, and practicability is high.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a highly practical method for discovering abnormal behaviors of management users based on big data log analysis. Background technique [0002] Logging is a very broad concept in computer systems, and it is an essential part of security auditing. Log data is the foundation for many enterprise applications such as troubleshooting, debugging, monitoring, security, anti-fraud, compliance, e-discovery, and many others. In order to maintain the system's own operation and protect the security of legitimate users, computer information systems generally have corresponding logs to record the information system's daily events, misoperations, alarms, errors, and the date and time of various daily operations of users. Behavior attribute information. These log information are not only used to audit user behavior, discover abnormal and illegal operations, but also assist computer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/34G06F17/30
Inventor 李清玉颜斌
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products