A cloud user behavior audit system and method based on cloud log analysis

A log and behavior technology, which is applied in the field of cloud user behavior audit system based on cloud log analysis, can solve the problems of large data volume, unpredictable log format, and inability to run analysis algorithms, etc., to achieve the effect of improving overall security

Inactive Publication Date: 2019-03-15
CHINA ELECTRONICS TECH CYBER SECURITY CO LTD
View PDF4 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Cloud logs have the characteristics of huge number, ever-changing log formats, many redundant logs, and random distribution of effective information, so it is impossible to directly run analysis algorithms on them.
The amount of data is large, the proportion of valid information is low, and it is randomly distributed, so that ordinary filtering algorithms cannot fully fi...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cloud user behavior audit system and method based on cloud log analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] In order to better understand the present invention, the present invention will be described in detail below in conjunction with the accompanying drawings.

[0014] The present invention mainly extracts user operation behavior information by analyzing the operation log of the cloud, thereby recording the user operation behavior, understanding the operation status of the cloud, and discovering risks and illegal operations on the cloud in time. The invention extracts user operation behavior information from the operation log of the cloud system, and audits the user's operation behavior; the system automatically collects the full amount of logs of all sub-modules in the cloud system, uses a combined filtering algorithm to effectively filter out invalid logs, and retains Effective logs of information are required to improve system processing capabilities; the system can process logs in any format, and use the log type extraction algorithm to automatically identify all log fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The cloud user behavior auditing system and the cloud user behavior auditing method based on cloud log analysis provide a unique cloud log processing algorithm, which can efficiently and accurately extract effective information from a mass of original logs with uncertain format, and convert the effective information into structured user operation behavior data which can be used for large data analysis. Based on the operation behavior data, the invention provides the functions of user operation behavior audit, record, multi-dimensional display, violation alarm, compliance analysis, complex process audit, automatic generation of audit strategy and the like, which greatly improves the overall security of the cloud system.

Description

technical field [0001] The present invention relates to the fields of big data, machine learning, log processing technology, cloud computing technology, auditing technology, etc. Specifically, the present invention relates to a cloud user behavior audit system and method based on cloud log analysis. Background technique [0002] With the widespread application of the cloud, more and more businesses are migrating to the cloud, which greatly improves efficiency and reduces costs. However, in the process of use, the user's daily operation has security risks such as unclear operator identity, opaque operation process, unknowable operation content, uncontrollable operation behavior, and operation accidents that cannot be located. User's negligence and malicious operations may endanger the business on the cloud and data security; in addition, with the expansion of the cloud scale, the transparency of the system is getting lower and lower, and it is difficult for users and regulato...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/18G06F16/182
Inventor 齐伟钢王红伟刘恕涛熊丹楼恒越郭小华
Owner CHINA ELECTRONICS TECH CYBER SECURITY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products