Unreliable environment-oriented audit log read-write managing method and system

A management method and log technology, applied in the field of information security, can solve problems such as damage to database tables, increased hardware costs and maintenance costs, unavailable equipment functions, etc., to reduce the probability of damage, increase the speed of log writing, and improve availability.

Active Publication Date: 2017-04-19
深圳市任子行科技开发有限公司 +1
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Desktop low-end devices are faced with an unstable environment where users often lose power after get off work or during breaks. Since relational databases such as Mysql are used to record and query audit logs, a sudden power failure during writing will cause damage to the database table

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unreliable environment-oriented audit log read-write managing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to have a clearer understanding of the technical features, purposes and effects of the present invention, the specific implementation manners of the present invention will now be described in detail with reference to the accompanying drawings.

[0028] refer to figure 1 , is the structural diagram of the auditing equipment. Combine below figure 1 , to illustrate the method and system of the present invention.

[0029] Audit equipment includes three storage entities: memory, CF card, and hard disk.

[0030] The user status and traffic status are stored in the memory, and the user interface can be directly read through the interface;

[0031] The read-only partition of the CF card stores the operating system, system applications and configuration files. Only when the system is upgraded, the signature database is upgraded, and the database configuration file backup information on the hard disk is synchronized regularly, the read-only partition becomes writable...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An unreliable environment-oriented audit log read-write managing method and system. The method comprises a writing-in step, in which audit logs produced during an audit procedure by an audit device are periodically backed up to a log file related to time and in a hard disk, a read step, in which relative files are extracted according to user selected time, and importing the extracted log file to a database for check use. The audit logs are written into the log file, so even when power is off during the writing, only the last write-in log is affected; therefore system damage probability during sudden power-off can be reduced; when a user checks a log, the log file can be extracted according to user selected time and imported to the database; during the log file explicit importing process, the device power supply is not turned off due to the awareness of the import process, so possibility of errors during the importing of the log to the database can be greatly reduced; and further, during the check, a database of column storage type is employed, so log writing-in speed can be improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an audit log reading and writing management method for an unreliable environment. Background technique [0002] Network security generally requires security audit equipment to record and save users' online behavior logs for a period of time, and can query by time, IP, URL and other dimensions. Compared with other database business systems, the storage and query of audit logs has its own characteristics: on the one hand, the log is written frequently, and each user’s online behavior must be written into a log; on the other hand, , the query frequency of the log is low, and the audit log on the device will be queried only when the source of the network security problem occurs. [0003] Desktop low-end devices are faced with an unstable environment where users often lose power after get off work or during breaks. Since relational databases such as Mysql are used to rec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30
CPCG06F16/1815G06F16/258Y02D10/00
Inventor 刘永强张茜沈智杰景晓军
Owner 深圳市任子行科技开发有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products