Log auditing method and device

A technology of logs and audit points, applied in the field of information security, can solve the problems of time-consuming, labor-intensive, large-scale, low efficiency and accuracy of manual methods, and achieve the effect of quickly discovering potential security risks.

Active Publication Date: 2018-03-20
CHINA MOBILE GRP GUANGDONG CO LTD +1
View PDF7 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, due to the large scale of the big data platform and the large number of components and nodes, relying on manual methods to audit the operation l

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log auditing method and device
  • Log auditing method and device
  • Log auditing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0046] Due to the large scale of the big data platform and the large number of components and nodes, it is impossible to audit the operation logs of the big data platform manually, which cannot meet the requirements of automatic and comprehensive auditing. In view of this, the present invention proposes a log audit method and device for big data components. The basic realization principle is: fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a log auditing method and device. Particularly, the method comprises the steps that original logs which are collected from all big data platform components are parsed and subjected to field standardized mapping, operation types and operation fine points of the logs are divided and processed, and initial logs of all the components in big data platforms with different sourcesand formats can be standardized; then, according to an auditing requirement of big data security management and control, a corresponding auditing rule and a corresponding analysis strategy are adopted, the standardized logs of all the components in the big data platforms are automatically audited and analyzed, and whether or not management and data access operations of the big data platforms andthe components meet safety technology norm and management requirements is determined. Compared with a manual auditing mode, the log auditing method has the advantages that the logs of the big data platform components are standardized and centrally audited, the operation of the big data platform components can be comprehensively and timely audited, hidden safety dangers are quickly found, and safety problems are found.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a log audit method and device. Background technique [0002] With the continuous improvement of social information technology and the rapid popularization of Internet technology, more and more data needs to be processed, and the big data platform has unparalleled advantages in the field of large-scale data storage and high-performance computing. Provide efficient big data storage, computing, operation and maintenance and monitoring services. However, the security protection measures of the current big data platform lack standards and requirements, cannot keep up with the development of the big data platform's own business needs, and have defects that do not match the high-value business of data centralization and data sharing. Therefore, it is the focus of current research to explore the data security risks and solutions of the big data platform itself and the platf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30G06F21/55G06F21/57
CPCG06F21/552G06F21/577G06F2221/034G06F16/16G06F16/172G06F16/1815G06F16/90344
Inventor 何庆李冠道严敏周乐坤高峰张建军苏砫罗波
Owner CHINA MOBILE GRP GUANGDONG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products