Linux operation log audit system and method

A journal, topic technology

Active Publication Date: 2018-12-18
携程旅游信息技术(上海)有限公司
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The general accident audit traceback method is to log in to the device to view historical operation records (Linux operation logs). This audit method has a strong lag and is not timely, and it is impossible to see detailed user sources, such as IP (Internet protocol) address,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Linux operation log audit system and method
  • Linux operation log audit system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be further described below through a preferred embodiment, but the present invention is not limited to the scope of the described embodiment.

[0037] This embodiment provides a kind of audit system of Linux operation log, refer to figure 1 , the audit system of the Linux operation log includes a bastion host 101, a log search engine 103, a log collection unit 102, an open source analysis and visualization platform 104, and a comprehensive security operation center 105; the bastion host 101 is used to back up the operation log of the Linux server to the target path; the log collection unit 102 is used to transmit the operation log under the target path to the log search engine 103; the log search engine 103 is used to fragment the operation log according to fields, and transmit the fragmented operation log to the open source analysis and visualization platform 104; the open source analysis and visualization platform 104 is used to add an audit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Linux operation log audit system and method. The Linux operation log audit system comprises a fortress machine, a log search engine, a log collection unit, an open source analysis visual platform and a comprehensive safety operation center. The fortress machine is used for backing up the operation logs of the Linux server to the target path; the log collection unit is used for transmitting the operation log under the target path to the log search engine. The log search engine is used for slicing the operation log according to the fields and transmitting the sliced operation log to the open source analysis visualization platform. The open source analysis visual platform is used to add audit topics to the fragmented operation logs; the comprehensive safety operationcenter is used to detect the operation logs after adding audit topics according to the preset rules. The invention can audit the Linux operation log in real time, and timely alarms.

Description

technical field [0001] The invention belongs to the technical field of Linux (an operating system) operation log audit and monitoring, and in particular relates to an audit system and method for a Linux operation log. Background technique [0002] In large Internet companies, human error in computer operation is one of the main causes of production accidents, and there are many cases of hacker infiltration and malicious operation damage. The general accident audit traceback method is to log in to the device to view historical operation records (Linux operation logs). This audit method has a strong lag and is not timely, and it is impossible to see detailed user sources, such as IP (Internet Protocol) address, operating time, operating user, etc. If the device encounters malicious infiltration, the Linux historical command file (Linux operation log) can be emptied artificially, or the device is catastrophically damaged, and the historical file (Linux operation log) will also...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/50G06F11/30G06F11/32G06F17/30
CPCG06F11/3065G06F11/327G06F21/50
Inventor 徐楷凌云雷兵杨晓春吴伟哲
Owner 携程旅游信息技术(上海)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products