Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data center account maintenance system

A technology for maintaining systems and data centers, applied in the field of information security, can solve problems such as non-fixed rules, rigid fixed rules, and high false alarm rate

Inactive Publication Date: 2020-08-28
ZHEJIANG QIZHI TECH CO LTD
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

3. WWW deception, the webpage being visited has been tampered with by hackers, and the information on the webpage is false! For example, the hacker rewrites the URL of the webpage that the user wants to browse to point to the hacker's own server. When the user browses the target webpage, it actually sends a request to the hacker's server.
4. Node attack, after the attacker breaks through a device, he often uses this device as a base to attack other devices
The problems of this abnormal event alarm mechanism are: 1. The fixed rules are rigid and unable to keep pace with the times
However, it is possible that the account needs to enter the data center for a temporary work task, and has been approved by the workflow engine to form an allowed operation, but the allowed operation is not a fixed rule, therefore, a legally allowed operation When the account logs in to the data center during the valid period specified by the non-fixed rules, the account dimension will send out an account abnormal event alarm
2. Alarms are only issued from a single dimension, and abnormal events in a single dimension cannot constitute abnormal behavior or attack behavior
The problems caused by these reasons mainly include: 1. High false positive rate. 2. Single-dimension abnormal event alarm. There is no information in other dimensions other than the information in this dimension. Therefore, it is impossible to judge whether the abnormal event is caused by an attack behavior. Abnormal event alarm low reference value
The high rate of false alarms and the low reference value of alarms lead to operation and maintenance personnel habitually ignoring abnormal event alarms, resulting in the alarm being useless

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data center account maintenance system
  • Data center account maintenance system
  • Data center account maintenance system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Abnormal behavior

[0035] The abnormal behavior described in the present invention refers to operation behaviors that are inconsistent with the content of the white list, including but not limited to abnormal behaviors caused by hacker attacks, abnormal behaviors caused by internal operation and maintenance personnel, etc.

[0036] Gateway

[0037] Everyone knows that to walk from one room to another, one must pass through a door. Similarly, a gateway is sent from one network to another. Information must also pass through a "pass", which is the gateway. As the name implies, a gateway is a "gateway" that connects one network to another network, that is, a network gate. The gateway mentioned in the present invention refers to the door to the data center.

[0038] Workflow engine

[0039] The so-called workflow engine refers to the workflow as a part of the application system and provides core solutions for determining information transmission routes and content levels accor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data center account maintenance system, which comprises a data collector, wherein the data collector logs in a server at regular time, searches the storage position of an account in an operation system of the server, and obtains all accounts on the server; newly appearing server accounts are automatically increased; and the data collector automatically modifies passwordsof all the accounts at regular time. The data center operation and maintenance system has the advantages that account data can be comprehensively collected, all server accounts existing in a data center are acquired, and comprehensive risk evaluation is performed on the accounts; and account passwords are directly obtained from an operating system, and are compatible with all asset types of a datacenter through multiple password detection modes. The account password configuration strategy is preset in the data collector; data transmission is achieved through an API, seamless linkage with a bastion host is achieved, the data collector is rapidly integrated with a bastion host or other servers in a plug-in mode, and the data center account maintenance system can be suitable for a super-large-scale account management scene.

Description

Technical field [0001] The invention relates to the field of information security, in particular to a data center account maintenance system. Background technique [0002] This section is only for the convenience of understanding the content of the present invention and should not be regarded as prior art. [0003] According to different users of the network, the network can be divided into an external network (Internet) and an internal network (local area network). Intranet can be divided into office network and production network. The Internet behavior of office Internet is relatively developed, and it is prone to virus and network intrusion incidents. If office users and production users are on the same network, viruses and intrusions that occur on the office network will quickly spread to the production network with little obstacles, posing a great threat to production safety. Therefore, the office network and production network are also required to be isolated. The product...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/08
Inventor 吴强
Owner ZHEJIANG QIZHI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products