A method and system for identifying hotspot security events
A security event and hot event technology, applied in the field of information security, can solve the problems of low accuracy of key information and significant impact of analysis
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0063] In order to facilitate the understanding of those skilled in the art, the present invention will be further described below in conjunction with the accompanying drawings, which cannot be used to limit the protection scope of the present invention.
[0064] The purpose of the present invention is to propose a method for identifying hotspot security events in a complex network environment in order to overcome the shortcomings of the prior art. The invention collects the SYSLOG log data of each network device asset in the enterprise network, normalizes it into a security event record with a unified format; builds a network hotspot center with network layering and IP segmentation technology; maps the security event record to the hotspot according to IP and asset information In the center; comprehensively consider factors such as the severity of security incidents, the number and the importance of assets to calculate the hotspot index of each hotspot center; when the hotspot ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


