Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Log analysis method and log analysis device

An analysis method and log technology, applied in the field of information security, can solve the problems of large manpower and material resources, tediousness, and boring, etc., and achieve the effect of reducing the implementation cycle, low entry cost, and low maintenance cost

Pending Publication Date: 2021-04-16
BEIJING VENUS INFORMATION SECURITY TECH +1
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When analyzing complicated logs, it is necessary to write corresponding parsing rules according to the specific logs, which is undoubtedly a boring and cumbersome work that requires a lot of manpower and material resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log analysis method and log analysis device
  • Log analysis method and log analysis device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the following will clearly illustrate the spirit of the content disclosed in the application with the accompanying drawings and detailed descriptions. After any person skilled in the art understands the embodiments of the content of the application , when it can be changed and modified by the technology taught in the content of the application, it does not depart from the spirit and scope of the content of the application.

[0053] The exemplary embodiments and descriptions of the present application are used to explain the present application, but not to limit the present application. In addition, elements / members with the same or similar numbers used in the drawings and embodiments are used to represent the same or similar parts.

[0054] As used herein, "first", "second", ... etc. do not specifically refer to a sequence or order, nor are they used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a log analysis method. The log analysis method comprises the following steps that a log is obtained; the event processing engine processes the log, wherein the event processing engine comprises an analysis rule base and an intelligent analysis engine; the log processing process of the event processing engine comprises the steps that all analysis rules in an analysis rule base are traversed, and corresponding analysis rules are matched for the obtained log; if the analysis rule corresponding to the log does not exist in the analysis rule base, the log is sent to an intelligent analysis engine to be processed; the intelligent analysis engine combines a complete regular expression for the received log and matches the regular expression with the log; and an analysis rule is generated for the log file through the page semi-intelligent analysis tool if the log of the preset target field cannot be analyzed by the intelligent analysis engine. The complex log can be intelligently analyzed and processed, the processing capacity is high, the entry cost is low, the writing time consumption is low, the maintenance cost is low, and manpower and material resources can be greatly saved.

Description

technical field [0001] The application belongs to the technical field of information security, and in particular relates to a log parsing method and parsing device. Background technique [0002] Today's enterprises and organizations face a more complex log environment in the field of information security. On the one hand, there is no unified standard for logs. On the other hand, different enterprises and organizations have special log requirements, and the types of logs are increasing day and night. When analyzing complex logs, it is necessary to write corresponding parsing rules based on specific logs, which is undoubtedly a boring and cumbersome work that requires a lot of manpower and material resources. Contents of the invention [0003] In order to overcome the problems existing in the related technologies at least to a certain extent, the present application provides a log parsing method and parsing device. [0004] According to the first aspect of the embodiments o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/245G06F16/242
Inventor 樊宏杰王浩
Owner BEIJING VENUS INFORMATION SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products