Host monitoring alarm processing method and device

A host and monitoring object technology, applied in the field of network security, can solve problems such as ensuring the security and disadvantages of the network system

Active Publication Date: 2021-09-10
山东浪潮爱购云链信息科技有限公司
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present application provides a method and device for host monitoring and alarm processing, which solves the problem that the number of hosts in the network system is increasing day by day,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Host monitoring alarm processing method and device
  • Host monitoring alarm processing method and device
  • Host monitoring alarm processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the purpose, technical solution and advantages of the present application clearer, the following will give a clear and complete description of the present application in conjunction with specific embodiments of the present application. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0030] With the rapid development of the Internet, many companies are getting bigger and bigger, and more and more companies are also being established. During this process, the number of host servers used is increasing rapidly. At the same time, the complexity of the Internet environment has also made the issues of host security and network security increasingly prominent. In different pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a host monitoring alarm processing method and device, which are applied to a network system comprising a monitoring server and one or more hosts monitored by the monitoring server, and the method comprises the following steps: configuring, by the monitoring server, a corresponding resource library according to local program running characteristics of the host, wherein the resource library is related to a monitoring object monitored by the monitoring server in the host; converting the corresponding resource library into a resource list, issuing the resource list to the corresponding target host, so that the target host carries out local scanning according to the corresponding resource list, and reporting a scanned alarm result to the monitoring server; and processing the monitoring object causing the alarm result in the corresponding target host according to the alarm result and a preset processing operation.

Description

technical field [0001] The present application relates to the field of network security, in particular to a method and a device for processing host monitoring alarms. Background technique [0002] With the rapid development of the Internet, the business scale of enterprises is expanding day by day. During this process, the number of hosts in the network system used by enterprises has also increased rapidly, and the complexity of the Internet environment has led to increasingly prominent security issues. [0003] In different projects and environments, project managers and operators have different security awareness and technical levels, especially non-technical personnel are often unable to detect the intrusion of harmful programs during the use of computers, thus affecting the security of the host computer and even the entire project , The normal operation of the entire enterprise system. [0004] At present, in order to ensure normal work and confidential files are not s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L12/26H04L29/06G06F21/50G06F21/56
CPCH04L41/0631H04L43/08H04L41/0803H04L41/0886H04L41/0889H04L63/1408G06F21/56G06F21/50
Inventor 鹿春阳
Owner 山东浪潮爱购云链信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products