Information system auditing method based on data storehouse
A data warehouse and information security technology, applied in the field of computer and information security, can solve problems affecting system performance, system resource conflicts, etc., and achieve the effect of improving scalability, improving efficiency, and good scalability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0036] The method of the invention is used to develop an easily expandable security audit system based on the data warehouse, and the security audit system separates the operation processing environment and the comprehensive analysis processing environment in the information security audit through the data warehouse server. In the operation processing environment, the system requires various network security applications to send logs to the remote log server in real time in the form of Syslog. The log server listens to the UDP port 514 of Syslog to receive logs. After receiving the logs, it performs pattern matching with the regular expressions pre-configured by the administrator, and integrates and purifies the qualified log information into the data warehouse. In the data warehouse, in the face of many complicated, heavy, and discrete low-level original information, a multi-dimensional model of information security is created, and on the basis of this multi-dimensional model...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com