Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Weblog auditing system for network monitoring

A network monitoring and logging technology, applied in the transmission system, electrical components, etc., can solve the problems of inconvenient storage, format confusion, etc., and achieve the effect of improving processing and auditing speed

Pending Publication Date: 2020-12-22
安徽长泰科技有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the above-mentioned shortcomings in the prior art, the present invention provides a network log audit system for network monitoring, which can effectively overcome the chaotic data format of the network security traffic log in the prior art, which is inconvenient to store, and there is a large amount of repetitive redundancy. Flaws in remaining log data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Weblog auditing system for network monitoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Apparently, the described embodiments are some, but not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0028] A network log audit system for network monitoring, such as figure 1 As shown, it includes a server and a data acquisition module, the server is connected to the file storage module for storing the file data collected by the data acquisition module, the server is connected to the log storage module for storing the log data collected by the data acquisitio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to network security monitoring, in particular to a weblog auditing system for network monitoring, which comprises a server and a data acquisition module, and is characterized inthat the server is connected with a file storage module for storing file data acquired by the data acquisition module; the server is connected with a log storage module used for storing log data acquired by the data acquisition module; and the server is connected with a data packet integration module used for integrating file data and the log data into a data packet. According to the technical scheme provided by the invention, the defects that the network security flow log data format is disordered and is inconvenient to store and a large amount of repeated redundant log data exists in the prior art can be effectively overcome.

Description

technical field [0001] The invention relates to network security monitoring, in particular to a network log auditing system for network monitoring. Background technique [0002] Network traffic logs record every bit of what happens in the network. By analyzing network traffic logs, you can locate and deeply analyze security events in the network environment and discover abnormal behaviors of users inside the network. At present, most of the network log auditing systems analyze and audit the network traffic according to the protocol type and content. Most of the traffic anomalies are real-time, based on the time window division of static or dynamic thresholds, and monitor the entire network. In this way, it is impossible to identify and judge the periodic anomalies of individual users. Therefore, it is necessary to build an offline network log audit system. necessary. [0003] The amount of data in network security traffic logs is very large. How to effectively store and ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1425
Inventor 廉明
Owner 安徽长泰科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products