Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security management method and device based on firewall log and medium

A technology of network security and management method, applied in the field of network security management based on firewall logs, can solve the problems of low network security management efficiency and excessive growth of the number of logs, and achieve the effect of improving security and improving network management efficiency.

Pending Publication Date: 2022-01-21
天元大数据信用管理有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a firewall log-based network security management method, equipment, and media, which are used to solve the problem that the number of logs generated by the firewall grows too fast, and the processing of massive log data cannot be efficiently completed, resulting in low efficiency of network security management. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security management method and device based on firewall log and medium
  • Network security management method and device based on firewall log and medium
  • Network security management method and device based on firewall log and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0023] Some embodiments of the present application will be described in detail below with reference to the accompanying drawings.

[0024] figure 1 It is a schematic framework diagram of a firewall log-based network security management system provided by the embodiment of the present application.

[0025] Such as figure 1 As shown, according to the idea of ​​layered design, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security management method and device based on a firewall log, and a medium. The method comprises the following steps: acquiring flow log data and threat log data of a firewall from an HDFS (Hadoop Distributed File System); based on Hive, performing multi-dimensional static analysis on the historical traffic log data through Spark SQL, and determining a first analysis result; based on Kafka, in a preset time interval, performing multi-dimensional dynamic analysis on the online traffic log data through Spark Streaming, and determining a second analysis result; performing risk analysis on the threat log data through a set multi-classification SVM model to determine a third analysis result; and performing security management on the network of the firewall according to the first analysis result, the second analysis result and the third analysis result. When network security management is carried out through firewall logs, a log analysis platform of a Spark distributed memory computing framework is constructed, and in combination with technical components such as Hive, Spark Streaming and Kafka, processing of massive log data can be efficiently completed, and the network security management efficiency is improved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a firewall log-based network security management method, equipment and media. Background technique [0002] With the advent of global informatization, a large number of enterprises and institutions are building their own networks to share network resources. The network plays an important role in the information society, but frequent network security issues cannot be ignored. [0003] The firewall isolates the LAN and the external network, can identify and shield illegal requests from the outside world, and prevent unauthorized data access. The firewall system can strengthen the security of the network, so as to simplify the security management of the LAN. [0004] However, the firewall has a powerful log function, which can view communication behaviors and check security holes in the network. However, the number of logs generated by the firewall grows too fas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L41/02G06K9/62G06F16/28G06F16/2458G06F16/182
CPCH04L63/02H04L41/024H04L63/1416H04L63/1425G06F16/182G06F16/2471G06F16/2465G06F16/283G06F18/2411
Inventor 付玉玺崔乐乐李仰允
Owner 天元大数据信用管理有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products