Implementation method of a fault-tolerant distributed security event data transmission protocol

A data transmission protocol and security event technology, which is applied in the field of distributed processing and data transmission of massive security events, can solve problems such as difficulty in use and poor scalability

Inactive Publication Date: 2016-11-16
中国南方电网有限责任公司信息中心 +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the mainstream technology in the industry still uses dual-machine hot backup as the main fault-tolerant solution. This solution has poor scalability and is difficult to meet the requirements of the big data era.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method of a fault-tolerant distributed security event data transmission protocol
  • Implementation method of a fault-tolerant distributed security event data transmission protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention provides a method for implementing a fault-tolerant distributed security event data transmission protocol, including the following steps:

[0037] A. For the security events of the whole network, the event processing distributed cluster method is adopted: each node of the distributed cluster is called a Performer, and each Performer node is an independent physical server or virtual machine with comparable computing performance. Each Performer node establishes a message queue ML (Message List), which is a first-in-first-out array;

[0038] B. The event processing cluster will periodically elect a transactional node called Transactional, and the transactional node Transactional is responsible for fault-tolerant processing of the cluster. In addition to the functions of a general Performer node, the transactional node Transactional will also build a transactional message mapping table TMM (Transactional Message Map), the mapping table backs up unproce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims to provide an implementation method of a fault-tolerant distributed security event data transmission protocol. Security events are handled through a distributed cluster, and event nodes in the cluster are determined through a periodical election mechanism in order to ensure the transaction of message data. A message queue mechanism is adopted for the nodes in the cluster in order to ensure the concurrency and expandability of security event handling. Thus, a fault-tolerant security event transmission mechanism is implemented. The method comprises the following steps that: A, security events in a whole network are handled through an event handling distributed cluster; B, the event handling cluster periodically elects event nodes Transactional; C, scoring factors of event nodes Transactional election are determined; D, one Performer node can process security event transmission requests of a plurality of Performer nodes concurrently; and E, the Performer node processes messages.

Description

technical field [0001] The invention relates to the field of information security, in particular to distributed processing and data transmission of massive security events. Background technique [0002] The concept of Internet + has been deeply rooted in the hearts of the people. The number of application systems and various devices deployed in various industry information networks has increased sharply. It is extremely urgent to conduct effective and timely audit analysis of IT operations in complex environments. The data basis of security audit is anti-virus system, firewall, intrusion detection system, vulnerability scanning system, UTM, running host, switch, router, database system, middleware and other log events, status events and network packet information. In the current network environment, the security events of various devices have become massive data. As the main log type, syslog is widely supported by various operating systems, network devices and security devic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0218H04L63/1408H04L67/1097
Inventor 樊凯梁志宏吕华辉王敏欧阳可萃
Owner 中国南方电网有限责任公司信息中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products