Supercharge Your Innovation With Domain-Expert AI Agents!

A violation log processing method, device and computer-readable storage medium

A processing method and log technology, which is applied in computing, multi-programming devices, electronic digital data processing, etc., can solve the problems of delay in analysis of violation logs, centralized management platform cannot handle them in time, etc., so as to improve user experience and improve log processing efficiency Effect

Active Publication Date: 2021-10-22
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, when the host encounters a virus attack, a large number of violation logs will continue to be generated. The violation logs are blocked on the communication components, and the centralized management platform cannot handle them in time, resulting in delays in the analysis of the violation logs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A violation log processing method, device and computer-readable storage medium
  • A violation log processing method, device and computer-readable storage medium
  • A violation log processing method, device and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0048] In the related technology, due to the large number of hosts, but only one centralized management platform, a large number of violation logs will continue to be generated when the host encounters a virus attack. Delay occurs. Based on the above technical problems, this embodiment provides a method for processing violation logs, which greatly imp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a violation log processing method, including: extracting the violation log set from the communication component, and storing the violation log set in the first cache; performing horizontal segmentation processing on the violation log set in the first cache, to obtain For each violation log information, respectively store each violation log information in the corresponding second cache; determine the corresponding message processing thread according to the violation log information in the second cache; manage each message processing thread, so as to concurrently process the second cache Violation log information is processed. It can be seen that this application greatly improves the log processing efficiency by adopting two-level cache and multi-thread concurrent processing, avoids the problems of message blockage and message delay processing when a large number of logs are concurrently processed, and provides convenience for users to analyze security violation logs in a timely manner. Improved user experience. The present application also provides a violation log processing device, electronic equipment, and a computer-readable storage medium, all of which have the above beneficial effects.

Description

technical field [0001] The present application relates to the technical field of violation log processing, and in particular to a method, device, electronic device, and computer-readable storage medium for processing violation logs. Background technique [0002] In scenarios such as rail transit and power grids, the security of various hosts is of paramount importance. It is usually necessary to install an operating system security enhancement system, and a large number of security violation logs will be generated during the process of protecting host security. In this scenario, the number of hosts is usually several thousand, and one is deployed on the centralized management platform. [0003] However, when a host encounters a virus attack, a large number of violation logs will continue to be generated. The violation logs are blocked on the communication components, and the centralized management platform cannot handle them in time, resulting in delays in the analysis of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/172G06F16/18G06F9/54
CPCG06F9/546G06F2209/548G06F16/172G06F16/1815
Inventor 甄鹏唐超
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More