System and method for achieving safety audit

A security audit and equipment technology, applied in the field of information security, can solve the problems of unable to support the server, difficult to meet the requirements, etc., and achieve the effect of reliable service, convenient expansion and high reliability

Inactive Publication Date: 2015-03-25
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, at present, various industries rely heavily on information systems and need to provide uninterrupted services to ensure 24-hour uninterrupted operation. This also requires security audit equipment to provide continuous and reliable services. figure 1 The method shown in is difficult to meet this requirement; in real applications, the number of application servers is relatively large and increasing day by day, usually a security audit device cannot support a large number of servers, which requires the security audit device to support dynamic expansion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for achieving safety audit
  • System and method for achieving safety audit
  • System and method for achieving safety audit

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0045] Through multiple groups of ports of the security audit device, the security audit device can be connected in series between multiple client users and multiple servers providing web services. The security audit device receives the service request message sent by the client to the server and the service operation log generated after the server responds to the user request; all http messages (ie service request messages) for the user to access the web service must pass through the security audit device, Most switches (that is, switching modules) support the mirror (mirror) strategy. The mirror strategy can copy the packets that meet the specified rules on one port to one or more ports, which is convenient to use and has a good effect. Therefore, this security audit device is used in switching Set the mirror policy on the board component, combined with image 3 Shown method, a specific embodiment of the present invention is as follows:

[0046] When a user accesses the ser...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a system for achieving a safety audit. The system comprises a plurality of clients, a plurality of servers and a safety audit device. The invention further relates to a safety audit method. The method includes the steps that service request messages are sent to the safety audit device by the clients; the safety audit device forwards the service request messages to the servers corresponding to the service request messages, and a service request message mirror image is copied so that a corresponding mirror image file can be obtained; the safety audit device analyzes the mirror image file so that corresponding service operation instructions can be obtained; the servers respond to the service request messages and send corresponding service operation logs to the safety audit device; the safety audit device compares and analyzes the service operation instructions and the service operation logs. The system for achieving the safety audit has the functions of double-machine hot standby and cluster deployment, is easy to popularize, stable and reliable, supports dynamic expansion and has a wider application range.

Description

technical field [0001] The present invention relates to the field of information security, in particular to the field of security audit of user access, and specifically refers to a system and method for realizing security audit. Background technique [0002] With the rapid development of information technology, Internet security issues have become increasingly prominent. Traditional network security methods such as firewalls and intrusion detection can realize the management and monitoring of abnormal network behaviors, but cannot monitor network content and authorized normal internal network access behaviors. Therefore, information leakage and network resource monitoring caused by normal network access behaviors Behavior can't be helped. Under this background, a security audit device is produced. The network topology diagram of the existing security audit device is as follows: figure 1 As shown, the security audit device corresponds to the server one by one. However, at ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/24
CPCH04L63/1408H04L41/069H04L67/1095
Inventor 李勋吴松洋李营那刘欣张涛符运辉
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products