Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A log-based audit method and system

A log and information system technology, applied in computing, special data processing applications, instruments, etc., can solve problems such as low efficiency and cumbersome audit work

Active Publication Date: 2017-08-04
ULTRAPOWER SOFTWARE
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing log audit scheme of information system operation behavior, if the information system is to be audited, the operation log of the information system needs to be manually retrieved frequently using the device IP in the audit database, and the operation log of the information system needs to be manually analyzed afterwards. The associated relationship, judging whether the operation is a high-risk operation, the audit work is cumbersome, and the efficiency is very low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A log-based audit method and system
  • A log-based audit method and system
  • A log-based audit method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0060] In order to audit the actions of operators from the massive logs, the embodiment of the present invention proposes a method for organizing information system operation audit logs from the perspective of operators. The technical problem to be solved in the embodiments of the present invention is: to solve the problem that the audit administrator cannot efficiently audit the operation behavior of the operator in the face of massive logs, that is, analyze and process the log data through a computer program, and establish an operation audit view from the perspective of the operator , in order to achieve automated auditing and greatly improve auditing efficiency and accuracy.

[0061] see figure 1 , the embodiment of the present inv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an auditing method and system based on logs and relates to the field of computer security. The method includes: acquiring the original logs of system log-in operations; analyzing to obtain source addresses, operation accounts, equipment IPs and operation commands; positioning operation equipment and information systems which the operation equipment belongs to, operators, operation contents and importance levels; building an auditing view using the corresponding information system as an index and using the corresponding operation equipment, operator, operating content and importance level; monitoring the importance levels to determine whether an alarming condition is satisfied or not, and if so, giving out an alarm and recording the corresponding auditing view into an auditing sensitive information set to facilitate auditing, looking up and analysis. The method has the advantages log data is analyzed and processed by computer programs, operation auditing views using the information systems as visual angles are built, the operated equipment, the specific operator, the corresponding operation content and whether the operation is an key operation or not in one information system can be automatically monitored and alarmed, manual intervention is not needed, automatic auditing is achieved, and auditing efficiency and accuracy are increased greatly.

Description

technical field [0001] The invention relates to the technical field of computer network information security, in particular to a log-based audit method and system. Background technique [0002] With the continuous development of economy and society, information, as the social basic resource for maintaining economic and social management, has become the foundation of all social fields such as politics, economy, national defense, science and technology, and culture. As the main storage and operation platform of information, information system plays an important role in various fields. With the continuous development of information systems, auditing institutions timely put forward the concept of information system auditing, and include information systems as objects in auditing. In recent years, audit institutions at all levels have continuously increased the intensity of information system audits and greatly promoted the information system audit work. [0003] Existing log a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30G06F11/34
CPCG06F11/3438G06F16/1734
Inventor 罗波高金明臧守湃陈尊王智江张建军苏砫唐楚荣
Owner ULTRAPOWER SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products