Information security alarm method and device and electronic equipment

An information security and preset content technology, applied in the field of network information security, can solve problems such as inability to solve multiple data sources or multi-scenario comparison calculations, reduce the accuracy of information security detection, and undetectable alarm requirements, etc.

Pending Publication Date: 2021-09-10
华青融天(北京)软件股份有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method is only suitable for simple alarm requirements, and cannot solve the comparison calculation between multiple data sources o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security alarm method and device and electronic equipment
  • Information security alarm method and device and electronic equipment
  • Information security alarm method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0060] Step 205, if the target data comprises log data, log data corresponding statistically pre-configured, every predetermined time, log data within a specified time statistical processing, statistical results obtained statistical indicators; wherein data corresponding to the log comprising at least statistical methods: statistical polymerization, and a count of a statistical.

[0061] The above-described log data corresponding to statistically preconfigured, in advance according to the actual alarm needs provided, for example, if the alarm needs a period of time, the total number of infected data reaches 100 when the alarm, and the data to be infected is log data log data corresponding to statistical methods, the polymeric preconfigured or statistical counting statistics, the total number of virus data for the calculation. The designated time may be set to one minute, i.e., every one minute, for obtaining the target data for statistical processing, statistical indicators of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an information security alarm method and device and electronic equipment. The method comprises the following steps: acquiring a pre-configured statistical index, wherein the statistical index is configured with one or more data sources; determining target data corresponding to the statistical index according to initial data corresponding to the data source; according to a pre-configured statistical mode, performing statistical processing on the target data to obtain a statistical result of the statistical index; and if the statistical result meets the preset alarm condition, carrying out alarm processing according to preset content. In the mode, by configuring the statistical indexes of one or more data sources, the data among the plurality of data sources can be compared and calculated, so that the security detection of complex alarm requirements is realized, and the accuracy of information security detection is improved.

Description

Technical field [0001] The present invention relates to the field of network information security, in particular, involving an information security discipline, device, and electronic device. Background technique [0002] At present, various information security issues have become increasingly prominent, and network security incidents are frequent, the impacts and losses are also increasing, so they need security detection on Internet data in the Internet, and avoid or reduce due to security incidents. Timely handling risks and losses. In the related art, the rule alarm engine technology is usually utilized, and the data in a data source is analyzed by diverse rules, and the alarm processing is performed according to the analysis results, so that the relevant personnel can be able to war in advance. However, this way, only applicable to simple alarm requirements, unable to solve the comparison calculation between multi-source or multi-scenes, resulting in complex alarm demand unab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/30G06F11/32
CPCG06F11/3006G06F11/327
Inventor 郭学丽
Owner 华青融天(北京)软件股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products