Web site access security audit method for MIPS (Million Instructions Per Second) platform

A security audit and security technology, applied in special data processing applications, digital transmission systems, electrical components, etc., can solve the problem of increasing the controllability of network security faults, affecting system administrator decision revision and task deployment, and inability to effectively capture events References and other issues

Inactive Publication Date: 2015-04-08
中软信息系统工程有限公司
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For the destructive events that have occurred, if the system does not have the security audit function, the system administrator will not be able to effectively capture the event reference and make a reasonable assessment based on the reference; it will ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web site access security audit method for MIPS (Million Instructions Per Second) platform
  • Web site access security audit method for MIPS (Million Instructions Per Second) platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0016] Such as Figure 1-2 Shown, a kind of MIPS platform Web site access security audit method, described MIPS platform comprises safe browser client and safe browser server end, and described client is provided with the safe browser that has system access auditing function, and described safe The browser server is provided with a security browser audit server, and the security audit method specifically includes the following steps:

[0017] (1) Terminal user such as A opens a browser on a secure browser terminal and enters a URL address to visit a certain website;

[0018] (2) Information such as the URL access address, user name, access time, and IP of the computer used by the terminal user such as A is sent to the security browser audit server through the network, and is recorded and stored by the security browser audit server;

[0019] (3) The audit system administrator opens the audit management system of the full-browser audit server on the secure browser server side t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a web site access security audit method for an MIPS (Million Instructions Per Second) platform. Every time when URL (Uniform Resource Locator) access is carried out, a URL access address, a user name, access time, IP (Internet Protocol) address information of an accessor and the like are automatically submitted to an audit server on a background by a browser; meanwhile, an audit viewing system is provided, so that an audit administrator can find safety risks by timely analyzing audit information. The web site access security audit method for the MIPS platform has the advantages that a security audit on access record of a user to a Web site in the MIPS platform is implemented; individual behaviors can be monitored; individuals who carry out illegal operations are timely found. By analyzing audit data, various abnormal operations, such as hacker attack, in a network can be timely found.

Description

technical field [0001] The invention relates to a network security audit method, in particular to a MIPS platform Web site access security audit method, which belongs to the field of network security audit methods. Background technique [0002] In recent years, with the rapid development of the open system Internet, network security and information security issues have become increasingly prominent, and various hacker attacks have emerged in an endless stream. In this case, it is necessary to effectively track and adjust the control situation of the system in time. [0003] For the destructive events that have occurred, if the system does not have the security audit function, the system administrator will not be able to effectively capture the event reference and make a reasonable assessment based on the reference; it will not be able to take effective measures for changes in system control, security policies and procedures. Countermeasures will affect the system administra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L12/26
CPCH04L63/105G06F16/95H04L63/1416H04L67/025
Inventor 陈鲁符兴斌李锁在郑永飞刘向军韩鹏黄明胡春玲徐志亮胡松葛江华李亮袁泉李贺肖利建马利君陈文静
Owner 中软信息系统工程有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products