A security detection system and method based on log analysis
A technology of security detection and logging, applied in the field of information security, can solve problems such as poor timeliness, inability to meet real-time detection and analysis of website threats, and low processing efficiency, and achieve the effect of improving protection capabilities
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] The log collection module is used to collect log data of the network server.
[0042] The log sending module is used for real-time distribution and distributed offline storage and distribution of the log data.
[0047] The result of the real-time matching calculation is stored in the MySQL relational database.
[0049] The creation of the analysis task creates different analysis tasks for the log data of different types;
[0052] The threat rule library is used to store and manage threat rules.
[0053] Specifically, the managing threat rules (ie, threat rule management) includes threat library management and threat type management;
[0056] The result display module is used to read the calculation result from the relational database and display it.
[0059] Further, in order to realize that effective measures are taken immediately when a network attack occurs, the system also includes an alarm
[0060] Specifically, the alarm module includes an alarm event list and an alarm...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


