Cloud protection log system and working method thereof

A working method and log technology, applied in the field of information security applications, can solve real-time, reliability and scalability limitations, can not effectively improve system performance, lack of cloud protection log system and other problems, to achieve performance improvement, good real-time , the effect of ensuring reliability

Active Publication Date: 2020-06-09
SHANDONG UNIV
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the basis of the cloud protection system, the above solutions lack the ability to build a fully functional, unified and efficient cloud protection log system. At the same time, its performance is also limited in terms of real-time performance, reliability and scalability, and cannot effectively improve the system. performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud protection log system and working method thereof
  • Cloud protection log system and working method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0031] A cloud protection log system and its working method, such as Figure 1-2 As shown, the system includes a log collection module, a log processing module and a log storage module. The log collection module is responsible for collecting and aggregating the log data generated by the antivirus engine cluster under the cloud protection platform, and then sending the log data to the log processing module for real-time processing; After the real-time processing is completed, the log processing module stores the log data in the log storage module; after that, the log processing module performs offline processing on the log data in the log storage module; the data reports generated by real-time processing and offline processing in the log processing module will be stored into the log storage module; the log collection module includes the log collection system Flume and the message queue Kafka, and Flume includes the Flume Agent responsible for collecting log data and the Flume Co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud protection log system and a working method thereof, and belongs to the technical field of information security application. The system comprises a log collection module, a log processing module and a log storage module. The method comprises the following steps that: a distributed log collection system Flume collects and aggregates log data on a cloud protection platform, and then caches the log data into a message queue Kafka; Storm responsible for executing the real-time processing task processes log data in the Kafka, the log data is stored in the HDFS after being processed, and the MapReduce responsible for executing the off-line processing task operates algorithms such as data mining and the like on the HDFS; and the data report subjected to real-time processing and off-line processing is stored in the MySQL. Compared with a log system in a traditional local protection system, the log system adopting cloud computing, distribution and other novel architectures has better real-time performance when facing massive log data in the cloud, and the reliability and expansibility of the system are also obviously improved.

Description

technical field [0001] The invention relates to a cloud protection log system and a working method thereof, belonging to the technical field of information security applications. Background technique [0002] In recent years, with the vigorous development of my country's enterprise network technology, the needs of enterprise users are also increasing. While enterprise users are pursuing high-speed and high-quality network services, network security has also received more and more attention, and the development of network security is always accompanied by the innovation of network technology. At present, network attack methods are becoming more and more complex, coupled with the weak awareness of network security precautions among ordinary enterprise employees, this has led to frequent incidents of enterprise internal network intrusion and attacks. Traditional network security solutions are gradually losing their effectiveness and facing the situation of being eliminated. W...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/182G06F16/28G06F16/2455G06F16/2458G06F16/248G06F16/25H04L29/06H04L29/08
CPCG06F16/182G06F16/284G06F16/28G06F16/24552G06F16/2462G06F16/2465G06F16/248G06F16/25G06F16/24556H04L67/06H04L67/1097H04L67/02H04L63/1425H04L67/1095H04L63/30H04L67/1001
Inventor 白智全寇晓辉杨颖超庞珂郭蒙霍克
Owner SHANDONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products