Multi-source network security alarm event tracing and automatic processing method and device
A technology of alarm events and handling methods, which is applied in the field of network security, can solve the problems of high false alarm rate and false alarm rate, difficulty in tracing the source of enterprise security operation and maintenance personnel, and small proportion of automatic handling, so as to achieve the level of enhanced security protection and facilitate Traceability analysis, the effect of improving efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] This embodiment provides a multi-source network security alarm event tracing and automatic processing method, such as figure 1 shown, including the following steps:
[0057] Obtain security log data; security log data includes security device alarm data, alarm logs and / or business system log data;
[0058] Specifically, there are two ways to obtain security log data in this embodiment. Way 1: actively collect alarm data of security devices through the REST API interface of the log audit system, and access log data through the business system access_log; way 2: through syslog Passively collect security devices to actively send alarm logs;
[0059] Identify the IP of the security log data, and divide the security log data into the corresponding index category according to the IP correspondence; the IP correspondence is the correspondence between the IP and the index category, and one index category contains multiple IPs;
[0060] The index categories in this embodiment ...
Embodiment 2
[0079] This embodiment provides a multi-source network security alarm event traceability and automatic processing device, including:
[0080] A security log data collection module, configured to acquire security log data, where the security log data includes alarm data of security devices, alarm logs and / or log data of business systems;
[0081] The classification module is used to identify the IP of the security log data, and divide the security log data into corresponding index categories according to the IP correspondence; the IP correspondence is the correspondence between the IP and the index category, and one index category contains multiple IPs;
[0082] The obtaining module is used to obtain the attack source IP when the index category is the Internet; when the index category is a terminal, obtain the attacked source IP;
[0083] Judgment module, used to judge whether to block the attack source IP or the attacked source IP according to the risk assessment result; the r...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com