Network security management method and device based on firewall log and medium

A technology of network security and management method, applied in the field of network security management based on firewall logs, can solve the problems of low network security management efficiency and excessive growth of the number of logs, and achieve the effect of improving security and improving network management efficiency.

Pending Publication Date: 2022-01-21
天元大数据信用管理有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a firewall log-based network security management method, equipment, and media, which are used to solve the problem that the number o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security management method and device based on firewall log and medium
  • Network security management method and device based on firewall log and medium
  • Network security management method and device based on firewall log and medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0022] In order to make the objects, technical solutions and advantages of the present application, the technical solutions of the present application will be described in conjunction with specific examples and corresponding drawings. Obviously, the described embodiments are merely the embodiments of the present application, not all of the embodiments. Based on the embodiments in the present application, one of ordinary skill in the art is in the scope of the present application without making creative labor premistence.

[0023] Some embodiments of the present application will be described in detail below with reference to the accompanying drawings.

[0024] figure 1 A framework diagram of a network security management system based on a firewall log is provided for the present application embodiment.

[0025] like figure 1 As shown, according to the idea of ​​hierarchical design, the network security management system is divided into four layers: data source layer, data storage ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security management method and device based on a firewall log, and a medium. The method comprises the following steps: acquiring flow log data and threat log data of a firewall from an HDFS (Hadoop Distributed File System); based on Hive, performing multi-dimensional static analysis on the historical traffic log data through Spark SQL, and determining a first analysis result; based on Kafka, in a preset time interval, performing multi-dimensional dynamic analysis on the online traffic log data through Spark Streaming, and determining a second analysis result; performing risk analysis on the threat log data through a set multi-classification SVM model to determine a third analysis result; and performing security management on the network of the firewall according to the first analysis result, the second analysis result and the third analysis result. When network security management is carried out through firewall logs, a log analysis platform of a Spark distributed memory computing framework is constructed, and in combination with technical components such as Hive, Spark Streaming and Kafka, processing of massive log data can be efficiently completed, and the network security management efficiency is improved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a firewall log-based network security management method, equipment and media. Background technique [0002] With the advent of global informatization, a large number of enterprises and institutions are building their own networks to share network resources. The network plays an important role in the information society, but frequent network security issues cannot be ignored. [0003] The firewall isolates the LAN and the external network, can identify and shield illegal requests from the outside world, and prevent unauthorized data access. The firewall system can strengthen the security of the network, so as to simplify the security management of the LAN. [0004] However, the firewall has a powerful log function, which can view communication behaviors and check security holes in the network. However, the number of logs generated by the firewall grows too fas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40H04L41/02G06K9/62G06F16/28G06F16/2458G06F16/182
CPCH04L63/02H04L41/024H04L63/1416H04L63/1425G06F16/182G06F16/2471G06F16/2465G06F16/283G06F18/2411
Inventor 付玉玺崔乐乐李仰允
Owner 天元大数据信用管理有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products