A security visual analysis system based on company internal log

A technology for analyzing systems and logs, applied in file systems, file system functions, structured data retrieval, etc., can solve problems such as neglect, internal employee attack behavior and illegal operations that cannot be effectively supervised, and achieve the effect of wide coverage and low threshold

Inactive Publication Date: 2019-02-01
ZHEJIANG UNIV OF TECH
View PDF1 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In traditional network analysis, the focus is often on preventing external attacks, but there is no effective supervision of internal employee attacks and corresponding violations.
At the same time, for the analysis of internal employee saf

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security visual analysis system based on company internal log
  • A security visual analysis system based on company internal log
  • A security visual analysis system based on company internal log

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be further described below in conjunction with the accompanying drawings.

[0030] refer to Figure 1 to Figure 8 , a security visualization analysis system based on the company's internal security logs in the big data scenario, based on the perspective of internal network user behavior, mining internal network security threat events in a visualized form, and based on internal employee network behavior data in a variety of The display in the form of a visual view can better display the user behavior information of employees.

[0031] The security visualization analysis system is divided into five levels: data cleaning layer, data storage layer, data processing layer, data transmission layer and data visualization layer;

[0032] The data cleaning layer is used to store the original internal security log into the corresponding folder in the distributed system HDFS of Hadoop in units of days by the form of the API interface of Hadoop, and the n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A security visual analysis system based on company internal security log in big data scenario is provided. Based on the perspective of internal network user behavior, the internal network security threat events are mining in visual form, and the internal employee network behavior data are displayed in a variety of visual views, which can make the employee user behavior information be better displayed; the security visualization analysis system is divided into five levels: a data cleaning layer, a data storage layer, a data processing layer, a data transmission layer and a data visualization layer. The invention can make the safety maintenance personnel more intuitively and effectively find the abnormal situation of the internal user behavior.

Description

technical field [0001] The invention designs the field of safety monitoring, and in particular relates to a safety visualization analysis system based on company internal logs. Background technique [0002] With the rapid development of the network, especially the emergence of some new services such as the mobile Internet, the technical means of network attacks are also constantly changing. With the emergence of new network attack technologies, the traditional network security boundary is gradually ineffective. It's getting more complicated. In view of the above situation, we urgently need to find a suitable method to discover a series of threats in the network more intuitively, conveniently and quickly, such as virus programs, Trojan horse programs, DDOS attacks, internal spy attacks and other attack behaviors, so that we can timely The response to this series of threatening behaviors should be adjusted. [0003] Network security data refers to internal server log informa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/17G06F16/182G06F16/215G06F16/28
Inventor 徐志江饶晨张昱华惊宇卢为党
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products