Server log monitoring method and system based on block chain

A server and blockchain technology, applied in the field of blockchain network, can solve problems such as system security cannot be guaranteed, log maliciously tampered behavior cannot be monitored, etc.

Active Publication Date: 2019-07-23
江苏全链通信息科技有限公司
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a block chain-based server log monitoring method and system to solve the technical problem in the prior art that the malicious tampering of the log cannot be monitored and the system security cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Server log monitoring method and system based on block chain
  • Server log monitoring method and system based on block chain
  • Server log monitoring method and system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0017] The blockchain-based server log monitoring method and system of the embodiments of the present invention are described below with reference to the accompanying drawings.

[0018] In view of the problem mentioned in the above background technology that malicious operations cannot be cleared due to log information being tampered with, a commonly used method in the prior art is to set up a log server specially for saving logs, so that once the system generates logs, That is to say, the log is sent to the log server for storag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a server log monitoring method and system based on a block chain, and the method comprises the steps that a service server generates a heartbeat message and broadcasts the heartbeat message signed by a private key of the service server to a block chain network; the log monitoring node of the block chain network receives the heartbeat message broadcasted by the service serverto verify the legality of the heartbeat message; and if the heartbeat message is legal, that the service server is online is determined, then a time mark corresponding to the service server is obtained by the auditing node, and the authenticity of the log information stored in the service server is detected based on the consistency of the time mark and the timestamp in the service server. Therefore, on one hand, the business server which is separated from control is found in time so as to recover the business server quickly, and on the other hand, the time information of the log is stored based on the decentralization mode, malicious tampering of the log is avoided, real-time log tampering risk monitoring is realized, and the security of the system is protected.

Description

technical field [0001] The present invention relates to a block chain network, in particular to a block chain-based server log monitoring method and system. Background technique [0002] At present, a key log security audit in the server security system is to record every operation of the administrator and form a log. In this way, after a malicious operation is received or the system is invaded, a backtracking can be performed based on the recorded log to ensure the security of the system. [0003] In related technologies, with the development of hacking technology, many intruders make some malicious operations untraceable by clearing logs. Therefore, when the system is attacked, it is impossible to know the malicious operations performed, and it is difficult to retroactively restore system security. Therefore, There is an urgent need for a method that can monitor the risk of log tampering. Contents of the invention [0004] The present invention provides a block chain-b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L12/26
CPCH04L9/3297H04L43/10H04L63/123H04L63/1425H04L2463/121
Inventor 路成业王凌
Owner 江苏全链通信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products