Network security management method and device based on firewall log and medium
A technology of network security and management method, applied in the field of network security management based on firewall logs, can solve the problems of low network security management efficiency and excessive growth of the number of logs, and achieve the effect of improving security and improving network management efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0022] In order to make the objects, technical solutions and advantages of the present application, the technical solutions of the present application will be described in conjunction with specific examples and corresponding drawings. Obviously, the described embodiments are merely the embodiments of the present application, not all of the embodiments. Based on the embodiments in the present application, one of ordinary skill in the art is in the scope of the present application without making creative labor premistence.
[0023] Some embodiments of the present application will be described in detail below with reference to the accompanying drawings.
[0024] figure 1 A framework diagram of a network security management system based on a firewall log is provided for the present application embodiment.
[0025] like figure 1 As shown, according to the idea of hierarchical design, the network security management system is divided into four layers: data source layer, data storage ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap