Unlock instant, AI-driven research and patent intelligence for your innovation.

A security detection system and method based on log analysis

A technology of security detection and logging, applied in the field of information security, can solve problems such as poor timeliness, inability to meet real-time detection and analysis of website threats, and low processing efficiency, and achieve the effect of improving protection capabilities

Active Publication Date: 2022-05-31
上海豌豆信息技术有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, neither the pre-event detection nor the post-event detection can meet the real-time detection and analysis of website threats, and there are defects of low processing efficiency and lack of timeliness; Continuously increasing, there is still the defect that the timeliness is getting worse

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security detection system and method based on log analysis
  • A security detection system and method based on log analysis
  • A security detection system and method based on log analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The log collection module is used to collect log data of the network server.

[0042] The log sending module is used for real-time distribution and distributed offline storage and distribution of the log data.

[0047] The result of the real-time matching calculation is stored in the MySQL relational database.

[0049] The creation of the analysis task creates different analysis tasks for the log data of different types;

[0052] The threat rule library is used to store and manage threat rules.

[0053] Specifically, the managing threat rules (ie, threat rule management) includes threat library management and threat type management;

[0056] The result display module is used to read the calculation result from the relational database and display it.

[0059] Further, in order to realize that effective measures are taken immediately when a network attack occurs, the system also includes an alarm

[0060] Specifically, the alarm module includes an alarm event list and an alarm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security detection system and method based on log analysis. The system includes: a log collection module for collecting log data of a network server; a log sending module for real-time distribution and distributed offline storage and distribution of log data ; The real-time calculation module is used to analyze and calculate the real-time distributed log data according to the preset threat rules, and store the calculation results in the relational database; the threat rule base is used to store and manage threat rules; the offline calculation module is used to Use machine learning to calculate and process the log data distributed by distributed offline storage to obtain new threat rules and update them into the threat rule base; the result display module is used to read the calculation results from the relational database and Display; the effect is: deal with website threats in time, and update the newly obtained threat rules into the threat rule base, further improving the protection against network intrusions.

Description

A security detection system and method based on log analysis technical field The present invention relates to information security technical field, be specifically related to a kind of security detection system and method based on log analysis Law. Background technique [0002] At present, with the rapid development of the Internet, the complexity and importance of network security have become increasingly prominent. Network attacks Incidents continue, and network security issues are getting more and more attention. [0003] In order to ensure the security of network servers and the like, network attack detection is generally required. For example, for web services The network attack detection of the device can be mainly divided into pre-detection and post-detection. It is necessary to identify network access behaviors with malicious behavior characteristics, so as to realize early warning and blocking of network intrusion behaviors. Ex-ante detection mainly includ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06F16/23G06F16/28G06N20/00
CPCH04L63/1425H04L63/1408H04L63/1416G06F16/23G06F16/284G06N20/00
Inventor 宋国徽杨磊
Owner 上海豌豆信息技术有限公司