Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and system for automatically extracting logs

An automatic extraction and log technology, applied in the field of information security, can solve the problems of repeated extraction, low extraction efficiency, delay in the progress of detecting network security incidents, etc., and achieve the effect of automatic extraction

Inactive Publication Date: 2018-03-20
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This makes the existing methods of manually extracting logs have many insurmountable problems, such as: incomplete log extraction, low extraction efficiency, long extraction time, repeated extraction, etc.
[0004] After a network security incident occurs, the above-mentioned problems such as incomplete extraction of logs and low extraction efficiency further make it impossible to quickly locate logs and grab logs to obtain clues, thereby delaying the progress of detecting network security incidents

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for automatically extracting logs
  • Method, device and system for automatically extracting logs
  • Method, device and system for automatically extracting logs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] An embodiment of the present invention provides a method for automatically extracting logs. The method is executed on the side of a device for automatically extracting logs, and can automatically extract logs from a server connected to it. see figure 1 As shown, it specifically includes the following steps:

[0061] S101: Obtain basic information of a target server.

[0062] Wherein, the basic information includes: at least one of process information, service information, system information, and network port information.

[0063] For the specific basic information acquisition process, see figure 2 shown, including the following steps:

[0064] S201: Receive extraction information input by a user.

[0065] Wherein, the extracted information is the information of the extracted log. During specific implementation, the information of extracting logs may include the extraction request generated by pressing the button of the device for automatically extracting logs, and...

Embodiment 2

[0101] An embodiment of the present invention provides a device for automatically extracting logs, see Figure 8 As shown, the device includes: a basic information acquisition module 81 , an analysis module 82 , and a log extraction module 83 .

[0102] Wherein, the basic information acquisition module 81 is used to obtain the basic information of the target server; the basic information includes: at least one item of process information, service information, system information, and network port information;

[0103] Analysis module 82, is used for analyzing according to basic information, obtains the log storage path of target server;

[0104] The log extraction module 83 is configured to extract log content and generate a log information description file according to the log storage path.

[0105] The device for automatically extracting logs provided by the embodiment of the present invention has the same technical features as the aforementioned method for automatically ext...

Embodiment 3

[0107] The embodiment of the present invention also provides a system for automatically extracting logs, see Figure 9 As shown, the system includes: a server 91 and a device 92 for automatically extracting logs as described in Embodiment 2; the device 92 for automatically extracting logs is connected to the server 91 .

[0108] Specifically, the device 92 for automatically extracting logs can be connected to the server 91 that needs to extract logs through USB, or can be connected to the server 91 that needs to extract logs through wireless communication.

[0109] In the system for automatically extracting logs provided by the embodiments of the present invention, the specific interaction process between the server and the device for automatically extracting logs has the same technical features as the aforementioned method for automatically extracting logs, so the above functions can also be realized. For the specific working process of the server and the device for automatic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method, device and system for automatically extracting logs, and relates to the technical field of information security, wherein the method for automatically extracting the logs comprises the steps of: obtaining the basic information of a target server, wherein the basic information includes at least one selected from a group consisting of process information, service information, system information and network port information; analyzing according to the basic information, so that the log storage path of the target server is obtained; and generating a log informationdescription file based on the log storage path. According to the method for automatically extracting the logs provided by the invention, the log storage path of the target server is found by analysison the obtained basic information of the target server, so that the log information description file is generated according to the path; therefore, a network security emergency disposal person can extract logs rapidly and automatically, and analyze the logs, so that clues are obtained; and the progress of detecting a network security event is quickened.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method, device and system for automatically extracting logs. Background technique [0002] At this stage, my country's network security situation is becoming increasingly severe and complex, and network security incidents emerge in endlessly. In the detection process of network security incidents, log extraction is an indispensable link and a necessary stage. [0003] With the development of network communication technology, there are more and more devices and system services deployed in the network environment, which are becoming more and more complex, which leads to the characteristics of "massive" and "complex" logs generated in the network environment. This causes many insurmountable problems in the existing method for manually extracting logs, such as incomplete log extraction, low extraction efficiency, long extraction time, repeated extraction, and the like...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/069H04L63/20
Inventor 王勇范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products