Computer security management method and device

A computer security and log technology, applied in the computer field, can solve problems such as low efficiency of computer security management

Pending Publication Date: 2020-02-04
TENCENT CLOUD COMPUTING BEIJING CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a method and device for computer security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer security management method and device
  • Computer security management method and device
  • Computer security management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0083] With the research and progress of artificial intelligence technology, artificial intelligence technology has been researched and applied in many fields, such as common smart homes, smart wearable devices, virtual assistants, smart speakers, smart marketing, unmanned driving, automatic driving, drones , robots, intelligent medical care, intelligent customer service, etc., I believe that with the development of technology, artificial intelligence technology will be applied in more fields and play an increasingly important value.

[0084] Machine learning (Machine Learning, ML) is a multi-field interdisciplinary subject, involving probability theory, statistics, approximation theory, convex analysis, algorithm complexity theor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer security management method and device, and belongs to the technical field of computers. The method comprises the steps of obtaining a to-be-identified log; determining at least one target character string belonging to a preset character string set and contained in the log to be identified; determining the frequency of each target character string appearing in different types of logs in the log sample set based on the corresponding relationship between each character string in the stored preset character string set and the frequency of each character string appearing in different types of logs in the log sample set; determining the log type of the log to be identified according to the occurrence frequency of each target character string in different typesof logs in the log sample set; and when the to-be-identified log is the target type log, determining to-be-reported content in the to-be-identified log, and reporting the to-be-reported content to a security management server. The log identification efficiency in the computer security management process can be improved, so that the computer security management efficiency is improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a method and device for computer security management. Background technique [0002] With the rapid development of computer technology, people have begun to pay attention to computer security issues. Some computer attackers can install malicious application programs into the computer in various ways, and the running of these malicious application programs in the computer will cause a certain threat to computer security. Regardless of whether a non-malicious application program or a malicious application program runs in a computer, corresponding logs will be generated, and these logs record relevant information about events that occur during the running of the application program. When performing computer security management, it is necessary to identify logs generated by malicious applications in a large number of logs, and extract content that needs to be analyzed fro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/903G06F21/56
CPCG06F16/90344G06F21/56
Inventor 宋兵董志强刘嘉诚
Owner TENCENT CLOUD COMPUTING BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products