Log-based automatic security check method, storage medium and system

A security inspection and log technology, applied in the field of network security, can solve problems such as inability to broadcast fault information in real time, and inability to detect malicious attacks in advance, achieve accurate and intuitive attack analysis, improve inspection efficiency, and improve the quality of security assurance.

Pending Publication Date: 2022-04-05
北京思特奇信息技术股份有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While the Internet has brought a lot of convenience to people, the Internet has also brought us a lot of defects.
[0003] Many application systems are exposed to the public network. Of course, there are many malicious attacks. The existing security inspection system cannot detect malicious attacks in advance, and cannot broadcast fault information in real time.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log-based automatic security check method, storage medium and system
  • Log-based automatic security check method, storage medium and system
  • Log-based automatic security check method, storage medium and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The principles and features of the present invention will be described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0050] Such as figure 1 As shown, a log-based automated security check method provided by the embodiment of the present invention includes:

[0051] S1, obtaining log data of system interaction;

[0052] It should be noted that, in a certain embodiment, the original data of Nginx log (access.log, error_log) is obtained; the original data of Nginx log can include: source IP, request time, request header, request URL, request message, source IP , response message, response duration, and response header.

[0053] S2, setting the analysis index, performing attack analysis on the log data according to the analysis index, and obtaining the analysis result;

[0054] It should be noted that, in a certain embodiment, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a log-based automatic security check method, a storage medium and a system, and the method comprises the steps: obtaining system interaction log data, setting an analysis index, carrying out the attack analysis of the log data according to the analysis index, and obtaining an analysis result, a preset front-end template is selected to display visual data generated according to the analysis result, and the preset front-end template displaying the visual data is sent outwards; according to the scheme, inspection is carried out through an automatic means, Nginx log analysis and different monitoring frequency setting, then the security inspection report is sent at the first time in a mail playing mode, hostile attacks are intervened in advance, the inspection efficiency is greatly improved, and the security guarantee quality is improved.

Description

technical field [0001] The invention relates to the field of network security, in particular to a log-based automatic security check method, storage medium and system. Background technique [0002] In this era of rapid Internet development, the Internet surrounds people all the time and plays a vital role. While the Internet has brought a lot of convenience to people, the Internet has also brought us a lot of defects. [0003] Many application systems are exposed to the public network. Of course, there are many malicious attacks. The existing security inspection system cannot detect malicious attacks in advance, and cannot broadcast fault information in real time. Contents of the invention [0004] The technical problem to be solved by the present invention is to provide a log-based automatic security inspection method, storage medium and system for the deficiencies of the prior art. [0005] The technical scheme that the present invention solves the problems of the tech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L43/06
Inventor 熊景张健
Owner 北京思特奇信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products