Audit rule recommendation method and device

A recommendation method and rule technology, applied in the field of computer communication, can solve the problems of not being able to capture system exception logs, hiding system risks, missing audit rules, etc., and achieve the effects of improving practicability, expanding configuration methods, and improving accuracy and efficiency

Pending Publication Date: 2019-05-07
HANGZHOU DT DREAM TECH
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, audit rules usually require personnel who are very familiar with the business to perform reasonable configuration, which is difficult to configure. When configuring audit rules, some audit rules may be missed, and abnormal logs in the system cannot be captured, thereby hiding some system risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Audit rule recommendation method and device
  • Audit rule recommendation method and device
  • Audit rule recommendation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0088] The terminology used in the present disclosure is for the purpose of describing particular embodiments only, and is not intended to limit the present disclosure. As used in this disclosure and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an auditing rule recommendation method and device. The method comprises: acquiring log information; Determining at least one keyword used for configuring an appointed auditing rule from the log information, wherein the appointed auditing rule comprises a character string matching rule; And recommending each keyword to an auditing rule configuration device, so that the auditing rule configuration device configures the appointed auditing rule according to the keyword. Therefore, the auditing rule configuration difficulty is reduced, the auditing rule configuration rationality is improved, and possible omission caused by manual auditing rule configuration is avoided.

Description

technical field [0001] The present disclosure relates to the technical field of computer communication, in particular to an audit rule recommendation method and device. Background technique [0002] In an enterprise information system or Internet service system, the log system is a very important functional component. It can record all the behaviors generated by the system and express them according to certain specifications. [0003] In the prior art, the collected logs may be stored in a designated storage area after normalized processing. In addition, in order to identify abnormal logs, some audit rules can be created, such as: regular expressions, string matching, threshold comparison, etc., to match the data in the specified storage area. If the logs match, an audit event will be reported , if the audit event meets certain alarm conditions, an email or SMS alarm will be sent. [0004] However, audit rules usually require personnel who are very familiar with the busine...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/332G06F16/36G06F17/27
Inventor 肖峰
Owner HANGZHOU DT DREAM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products