Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for extracting key information from network security logs

A key information, network security technology, applied in the field of network security log key information extraction, can solve the problem of unable to cope with network environment security protection requirements, no monitoring object analysis and integration, etc., to reduce analysis workload, strong directionality, and goals clear effect

Active Publication Date: 2021-08-06
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, traditional analysis methods cannot meet the security protection requirements of the current network environment
[0003] At present, there are already a large number of association analysis methods, such as IP association and domain name association, etc., but most of these association analysis methods start from the macro, such as the WHOIS information base, etc., such as exploring how many IP addresses a domain name has used, and how many The IP address layer has been used by multiple domain names, etc., but the same monitoring object (one unit) has not been analyzed and integrated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for extracting key information from network security logs
  • A method and system for extracting key information from network security logs
  • A method and system for extracting key information from network security logs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0055]It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0056] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, but not as a limitation of the present invention.

[0057] In order to solve the above problems, the present invention now provides a method for extracting key infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for extracting key information of a network security log, and relates to the field of network monitoring. Including: step S1: obtain firewall alarm log and internal gateway login log in network security log; step S2: process firewall alarm log to obtain intranet result IP list; include several intranet IP addresses in the intranet result IP list; step S3: Retrieve in the internal gateway login log according to the intranet result IP list, and generate a list of intranet user usage records according to the retrieval results; the intranet user usage record list includes each intranet IP address and the IP address corresponding to the intranet IP address Allocating logs and user login information; Step S4: storing the intranet user usage record list in the pre-generated database to be analyzed for further analysis. Combined with firewall alarm logs and internal gateway login information, the intranet IP address is matched, which reduces the workload of analysis, and has clear goals and strong directivity.

Description

technical field [0001] The invention relates to the technical field of network monitoring, in particular to a method and system for extracting key information from network security logs. Background technique [0002] Network security is an important issue related to national security and sovereignty, social stability, and national economic development. Its importance has become more and more important with the acceleration of global informatization. At the same time, with the deepening of information technology and the rapid development of the Internet, network intrusion incidents are increasing, which has brought huge economic losses to people. Some even threaten national security. The detection and defense of network intrusion events is a key issue in network security assurance. In traditional methods, researchers analyze network intrusion behaviors from network security logs, data traffic, malicious code, system vulnerabilities and other channels. However, traditional ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L2463/146
Inventor 彭如香李祺杨涛凡友荣姜国庆
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY