Method and device for storing and reading security logs and security control system

A technology for reading devices and logs, which is applied in the field of data processing, and can solve problems such as slow storage speed, small storage capacity, and slow read and write speed of security logs

Inactive Publication Date: 2015-09-02
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF3 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The current method of storing and reading security logs stores all security logs on the same node. Due to the large amount of security log data, the storage space will be filled in a short time, and the storage speed is slow. When the security logs need to be processed , analysis, and then use this storage node to find the required security logs from the massive security logs for reading, but the reading speed is slow. Therefore, the existing technology has slow reading and writing speeds and storage Disadvantages such as small quantity and difficult processing and analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for storing and reading security logs and security control system
  • Method and device for storing and reading security logs and security control system
  • Method and device for storing and reading security logs and security control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0041] Such as figure 1 As shown, an embodiment of the present invention provides a security log storage and reading method, including:

[0042] Step 101: Deploy a database on each server in at least one server;

[0043] Step 102: Create at least one event table in each of the databases according to the types of all security logs, and each event table corresponds to a type of security log;

[0044] Step 103: According to the type of the security log, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for storing and reading security logs and a security control system. The method comprises: deploying a database on every server of at least one server; creating at least one event list in each database according to the type of all security logs, wherein each event list is corresponding to one type of security logs; storing the to-be-stored security logs into the corresponding event list of the database, respectively, according to the type of the security logs; defining a timestamp for each security log stored in the event list; and reading the required security logs from the corresponding event list according to the timestamps of the security logs. The device includes: a deploying unit, a creating unit, a storing unit, a defining unit, and a reading unit. The security control system includes: a management module, a collection module, an analysis module and a security log storing and reading device. According to the invention, the speed of storing and reading the security logs can be improved.

Description

technical field [0001] The invention relates to the field of data processing, in particular to a security log storage and reading method, device and security management and control system. Background technique [0002] With the application and promotion of technologies such as big data and servers in the computer field, computer information security is becoming more and more important. Due to factors such as the large number of users, the large amount of data processing, and the current network environment, a large number of security logs will be generated, and it is necessary to Various types of security logs are analyzed in depth to provide a basis for computer information security decision-making and rectification. Therefore, the problem we are facing now is how to solve the problem of storing and reading massive security logs. [0003] At present, the methods for storing and reading security logs mainly include: using a centralized storage method for security logs, stori...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F17/30
CPCH04L63/1425G06F16/256H04L63/02H04L67/10
Inventor 王永强
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products