Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A log audit method and system

A log and relational table technology, applied in computing, instruments, electrical digital data processing, etc., can solve problems such as low efficiency and cumbersome audit work

Active Publication Date: 2017-08-04
ULTRAPOWER SOFTWARE
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing operator operation audit scheme, if the operator is to be audited, the relationship between the source address and the operator needs to be manually maintained first, and the source address and the operator need to be in one-to-one correspondence. Only by retrieving the operator's IP address can the operator's operation log be obtained, and after the event, it is necessary to manually analyze the correlation between the logs to determine whether the operation is a high-risk operation. The audit work is cumbersome and the efficiency is very low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A log audit method and system
  • A log audit method and system
  • A log audit method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0056]In order to audit the actions of operators from the massive logs, the embodiment of the present invention proposes a method for organizing information system operation audit logs from the perspective of operators. The technical problem to be solved in the embodiments of the present invention is: to solve the problem that the audit administrator cannot efficiently audit the operation behavior of the operator in the face of massive logs, that is, analyze and process the log data through a computer program, and establish an operation audit view from the perspective of the operator , in order to achieve automated auditing and greatly improve auditing efficiency and accuracy.

[0057] see figure 1 , the embodiment of the present inve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for auditing log, and relates to the field of computer safety. The method includes acquiring the raw log of login operator on various systems; analyzing contents of the raw log and acquiring source addresses, IP (internet protocol) addresses of equipment and operation commands by means of parsing; positioning operators, the equipment and operation importance level on the basis of the source addresses, the IP addresses of the equipment and the operation commands; creating audit views corresponding to the operators and machines; monitoring the importance level in the audit views to determine whether alarm conditions are met or not, initiating alarms if the alarm conditions are met, recording the operators, the corresponding operating equipment, corresponding operation contents and the corresponding importance level into audit sensitive information sets for auditing, consulting and analyzing. Contents of the audit views include the operating equipment, the operation contents and the importance level. The operators, the corresponding operating equipment, the corresponding operation contents and the corresponding importance level which are recorded in the audit sensitive information sets meet the alarm conditions. The method and the system have the advantages that data of the log are analyzed and processed by the aid of computer programs, the operation audit views which are based on viewing angles of the operators are created, accordingly, the equipment operated by the certain operators, the generated operation contents and the like can be automatically monitored, the alarms can be initiated for the equipment operated by the certain operators, the generated operation contents and the like, manual intervention can be omitted, the log can be automatically audited, and the audit efficiency and accuracy can be greatly improved.

Description

technical field [0001] The invention relates to the technical field of computer network information security, in particular to a log audit method and system. Background technique [0002] In recent years, there have been incidents of important data being stolen in enterprises. According to the latest statistics, 70% of serious attacks on enterprises come from within the organization, including internal personnel or maintenance personnel who provide third-party IT support etc., they take advantage of their positions to make security problems caused by illegal operations increasingly frequent and prominent, and these operations are closely related to the customer's business. For such safety issues of operational behaviors and violations that are closely related to the business, strong measures must be taken to prevent and prevent them, and the audit of operators came into being. [0003] The existing operator information system audit scheme: collect the login operation logs o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/50
CPCG06F11/3438G06F21/50
Inventor 罗波高金明臧守湃陈尊王智江张建军苏砫唐楚荣
Owner ULTRAPOWER SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products