Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network safety monitoring method, system and equipment, and storage medium

A technology of network security and monitoring system, applied in the field of network security, can solve the problems of heavy platform system, indeterminate security event level, definition and log output difference, etc., to achieve the effect of simple use of tools

Active Publication Date: 2018-02-09
CTRIP TRAVEL NETWORK TECH SHANGHAI0
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] (1) Log security semantic standards are not uniform
Since multiple network security defense technologies come from different providers, different products have differences in the definition and log output of the same security problem
In addition, firewalls, operating systems, etc. only record events, and do not perform full security semantic conversion on event logs
[0004] (2) There is no unified entrance, and timing analysis and query based on logs cannot be done
The entrances provided by different network security defense technologies are not uniform, and cannot provide support for time series query and original log query for manual analysis
[0005] (3) Insufficient dimension of monitoring rules
If monitoring rules are set based on a single factor, the monitoring false positive rate is high, and the level of security incidents cannot be determined qualitatively
[0006] (4) The monitoring platform requires professional team maintenance support
In terms of monitoring, mainstream large platforms will introduce professional technical solutions, such as streaming engines, rule engines, large storage environments, and front-end design. These large and comprehensive platform systems are heavy and complex, and require a lot of time to be supported by dedicated personnel. Development and maintenance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network safety monitoring method, system and equipment, and storage medium
  • Network safety monitoring method, system and equipment, and storage medium
  • Network safety monitoring method, system and equipment, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art. The same reference numerals denote the same or similar structures in the drawings, and thus their repeated descriptions will be omitted.

[0031] There are multiple network security defense devices in the current network security monitoring system, but the log security semantic standards generated by multiple network security defense devices are not uniform, there is no unified entry, and timing analysis and query based on logs cannot be performed. The present invention uniformly collects security logs of various network security defense devices, performs uni...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network safety monitoring method, system and equipment, and a storage medium. The method comprises the following steps: colleting safety logs of multiple network safety defense equipment and sending the same to a message caching cluster and an intrusion detection server; performing safety semantic conversion on the safety logs through the intrusion detection server, and analyzing to generate a safety event according to a preset rule, sending the safety event to the message caching cluster, and sending alarm information when the safety event satisfies a preset alarm condition; reading the storage data in the message caching cluster through a centralized log analysis platform, performing normalization processing and field filling on the storage data to acquire indexdata, querying the index data through a retrieval front end, thereby acquiring the safety log or safety event corresponding to the index data. Through the network safety monitoring method provided bythe invention, the light-weight and multi-dimensional safety monitoring with unified safety semantic standard and traceable source can be realized through the safety log unified collection, the intrusion detection server, the message caching cluster and the centralized log analysis platform.

Description

technical field [0001] The present invention relates to the field of network security, in particular to a method, system, device and storage medium for network security monitoring based on intrusion detection and data indexing. Background technique [0002] With the popularization of various network technologies, enterprise network systems are also facing more and more dangers of being attacked, and often suffer from different degrees of intrusion and damage, which seriously interferes with the normal operation of enterprise networks. In order to ensure the security of the basic environment and business, enterprises have to strengthen the security protection of the network system, and constantly pursue a multi-level and three-dimensional network security monitoring system, including network firewall, IPS (Intrusion Prevention System, intrusion prevention system), WAF (Web Application Firewall, Web Application Firewall), HIPS (Host-based Intrusion Prevention System, host-base...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24H04L12/26
CPCH04L41/0631H04L43/045H04L63/1416H04L63/1425H04L2463/146
Inventor 余本华雷兵凌云
Owner CTRIP TRAVEL NETWORK TECH SHANGHAI0
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More