Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety monitoring method and device for multi-log system

A technology of security monitoring and logging, which is applied in the field of security monitoring of multi-log systems, can solve problems such as unfavorable unified management, inconvenient storage, and large surplus, and achieve the effects of reducing system complexity, efficient identification, and easy storage and access

Pending Publication Date: 2020-05-15
河南文正电子数据处理有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the log is usually a complete record of all working states, so there is a large amount of surplus, inconvenient storage, and great difficulty in finding and analyzing useful information
In addition, in the computer system of an enterprise or institution, there are multiple devices with different functions, different log formats, and different log contents. query, and did not fully play the role of the log

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety monitoring method and device for multi-log system
  • Safety monitoring method and device for multi-log system
  • Safety monitoring method and device for multi-log system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0034] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0035] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and compl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a security monitoring method and device for a multi-log system. The method comprises the steps of obtaining first log data of multiple different types of log systems; converting the first log data into second log data conforming to a predefined multi-field format required by security monitoring; and performing security monitoring based on the second log data, and analyzingand outputting a security monitoring result by integrating the second log data of the plurality of log systems. On one hand, storage and access of log data are facilitated, and on the other hand, logdata analysis of multiple log systems is integrated to output the security monitoring result, so that the risk of an information system can be identified more efficiently.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a safety monitoring method and device for a multi-log system. Background technique [0002] In an information system, in order to record the operating status of its own system resources, the computer system generally has a corresponding log recording system to record relevant daily events or misuse alarms and time stamp information. These log information play a very important role in dealing with computer failures and security management. [0003] However, the log is usually a complete record of all working states, so there is a large amount of surplus, it is inconvenient to store, and it is also very difficult to find and analyze useful information. In addition, in the computer system of an enterprise or institution, there are multiple devices with different functions, different log formats, and different log contents. Query, and did not fully play the role of the log....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/34
CPCG06F11/3476G06F11/3452
Inventor 訾淑伊马晓丽杜明书
Owner 河南文正电子数据处理有限公司