Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Log identification method and device, electronic equipment and storage medium

An identification method and log technology, applied in the field of network security, can solve time-consuming and labor-intensive problems, achieve the effects of improving efficiency, facilitating log identification, and reducing the workload of research and judgment

Pending Publication Date: 2022-04-05
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiments of the present application is to provide a log identification method, device, electronic equipment, and storage medium to solve the time-consuming and labor-consuming problem of log identification in the prior art, thereby improving the efficiency of manual investigation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log identification method and device, electronic equipment and storage medium
  • Log identification method and device, electronic equipment and storage medium
  • Log identification method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In view of the fact that firewalls generate a large number of attack logs, manually checking each attack log will consume a lot of manpower and material resources. Moreover, when there are many attack log information, manual inspection results will not be given in time, which will make the The operation of monitoring equipment is affected. In order to solve this technical problem, the present application focuses on the asset information targeted by the attack log information, and compares it with the asset information of the monitored device, so as to determine the risk level corresponding to the attack log information according to the comparison result. Therefore, the embodiment of the present application can determine whether the attack log information is a false positive through an automated research and judgment method, thereby reducing the consumption of human resources and improving the efficiency of identifying the attack log information.

[0024] The technical s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a log identification method and device, electronic equipment and a storage medium. The method comprises the steps of obtaining attack log information; the attack log information comprises a target IP address and a target rule identifier; obtaining first asset information aiming at the attack log information according to the target rule identifier; acquiring second asset information from an asset table corresponding to the monitored equipment according to the target IP address; and comparing the first asset information with the second asset information, and determining a target risk level corresponding to the attack log information according to a comparison result. According to the embodiment of the invention, the first asset information corresponding to the attack log information and the second asset information corresponding to the server are concerned, and the risk level corresponding to the attack log information is determined by comparing the first asset information with the second asset information, so that whether the attack log information is misreported or not can be automatically researched and judged; the study and judgment workload of security personnel is reduced, and the log recognition efficiency is improved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular, to a log identification method, device, electronic equipment and storage medium. Background technique [0002] With the improvement of firewall functions, each functional module in the firewall will generate a lot of attack logs within a period of time, and the attack logs will contain some false positive logs. This is a false positive. [0003] At present, to confirm whether the firewall log is a real attack, security personnel with security knowledge need to conduct a manual investigation. First, understand which operating system or application software the attack log is targeted at, and then confirm the operating system or installation of the attacked host. Combining the information of the application software and the information of the two to confirm whether the attack is a false positive log. This requires high security knowledge of security personnel, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/17G06F16/18
Inventor 刘继东娄扬
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products