Server log monitoring method and system based on block chain

A server and block chain technology, applied in the field of block chain network, can solve the problems that the system security cannot be guaranteed, and the behavior of malicious tampering of the log cannot be monitored, etc.

Active Publication Date: 2019-08-02
江苏全链通信息科技有限公司
View PDF6 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a block chain-based server log monitoring method and system to solve the technical prob

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Server log monitoring method and system based on block chain
  • Server log monitoring method and system based on block chain
  • Server log monitoring method and system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0017] The blockchain-based server log monitoring method and system of the embodiments of the present invention are described below with reference to the accompanying drawings.

[0018] Aiming at the problem mentioned in the above background technology that the log information will be tampered with or the malicious operation cannot be cleared, a method commonly used in the prior art is to set up a log server specially for saving the log, so that once the system generates the log , that is, to send the log to the log server for st...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a server log monitoring method and system based on a block chain. The method comprises the following steps that a service server generates log summary information in a log file;the log file is sent to the block chain network; and the accounting node in the block chain network analyzes the log file to verify the authenticity of the sender identity of the log file and the reliability of the content, and if the verification is passed, the log summary information in the log file is written into the block chain, so that the reliability of the target log file is verified according to the written log summary information. Therefore, the authenticity of the log file is verified based on the decentralized block chain network, the log is prevented from being maliciously tampered, real-time log tampering risk monitoring is realized, and the security of the system is protected.

Description

technical field [0001] The present invention relates to a block chain network, in particular to a block chain-based server log monitoring method and system. Background technique [0002] At present, a key log security audit in the server security system is to record every operation of the administrator and form a log. In this way, after a malicious operation is received or the system is invaded, a backtracking can be performed based on the recorded log to ensure the security of the system. [0003] In related technologies, with the development of hacking technology, many intruders make some malicious operations untraceable by clearing logs. Therefore, when the system is attacked, it is impossible to know the malicious operations performed, and it is difficult to retroactively restore system security. Therefore, There is an urgent need for a method that can monitor the risk of log tampering. Contents of the invention [0004] The present invention provides a block chain-b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/64G06F11/30G06F11/34G06F21/60
CPCG06F11/3003G06F11/3438G06F21/602G06F21/64
Inventor 路成业王凌
Owner 江苏全链通信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products