Information system auditing method based on data storehouse

A data warehouse and information security technology, applied in the field of computer and information security, can solve problems affecting system performance, system resource conflicts, etc., and achieve the effect of improving scalability, improving efficiency, and good scalability

Inactive Publication Date: 2004-04-28
KOAL SOFTWARE CO LTD
View PDF0 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

(4) When the system is running, on the one hand, the system needs to continuously add information to the database, and on the other hand, the central console software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The method of the invention is used to develop an easily expandable security audit system based on the data warehouse, and the security audit system separates the operation processing environment and the comprehensive analysis processing environment in the information security audit through the data warehouse server. In the operation processing environment, the system requires various network security applications to send logs to the remote log server in real time in the form of Syslog. The log server listens to the UDP port 514 of Syslog to receive logs. After receiving the logs, it performs pattern matching with the regular expressions pre-configured by the administrator, and integrates and purifies the qualified log information into the data warehouse. In the data warehouse, in the face of many complicated, heavy, and discrete low-level original information, a multi-dimensional model of information security is created, and on the basis of this multi-dimensional model...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention belongs to the field of computer and information safety technology. The information safety auditing method including adopting Syslog standard protocol and mode matching method based on regular expression in collecting journal information; using the data storehouse to separate the comprehensive analysis processing environment and operation processing environment; adopting multi-dimensional information safety model to correlate the analysis dimensions of several auditing analysis themes and to form multi-dimensional stellar system; performing on-line in-situ multi-dimensional analysis by the multi-dimensional model and data excavation and correlation to find out safety hole and problem; and creating auditing analysis report based on the analysis result. The method of the present invention has expandability, opening and raised auditing efficiency.

Description

technical field [0001] The invention relates to a computer information security audit method, in particular to a data warehouse-based information security audit method. It belongs to the technical field of computer and information security. Background technique [0002] Security audit is an important measure to judge whether a system is really secure. Security auditing is a feature that a secure network must support. The security audit function mainly monitors user activities from inside and outside the network, detects existing and potential threats in the system, and identifies, records, stores, and analyzes information related to security-related activities. At present, the content of security audit discussion mainly includes the following points: 1. System audit 2. Network audit 3. Security application audit. System audit records the user's access to the operating system and important audit resources in the host. The network audit records the detailed network usage o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14G06F17/00
Inventor 徐骥庄昱垚高鹏
Owner KOAL SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products