Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Multi surce audit data business uniformity judging method based on state conversion table

A state transition and data business technology, applied in the field of network security, can solve problems such as low audit supervision intensity, lack of consistency judgment function, and insufficient audit data sources

Inactive Publication Date: 2004-12-22
上海光华如新信息科技股份有限公司 +1
View PDF1 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are many defects in the technical solution of this invention: (1) the audit data collection method of security audit is too single, resulting in insufficient comprehensive source of audit data
The invention is based on the missing trace information at all levels of the business system as the source of audit data. The trace information missed by the system can only record its own operation status and some simple violation information. Real records of violations that occurred, making the audit intensity less
(2) Lack of context-related consistency judgment function
The application process audit proposed in this invention is to analyze each link in a business process as an isolated node, and judge whether the operation behavior in each link complies with the audit rules of the link. Ability to conduct correlation analysis and judgment between audit data
(3) The intensity of audit supervision is low
Especially the anti-bypass feature of the audit mechanism is poor, so in many cases, the audit supervision mechanism of the invention will be bypassed by experienced hackers or illegal operators

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi surce audit data business uniformity judging method based on state conversion table
  • Multi surce audit data business uniformity judging method based on state conversion table
  • Multi surce audit data business uniformity judging method based on state conversion table

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] like figure 1 Shown, the inventive method is carried out by distributed data collection agent (Agent), the system that business audit data consistency judgment center and control interface form carry out, and the main effect of all kinds of data collection agents (Agent) is to realize original data collection, according to Certain templates and security policies are used to extract and identify information, transform the original information into standardized business audit information representation, and report to the business audit data consistency judgment center. The present invention includes five kinds of data acquisition agents (Agent), including:

[0059] (1) The log collection agent (Agent) is responsible for collecting system logs and internal events including mainstream operating systems (Windows series, UNIX series), logs generated by various application platforms and database platforms, and logs generated by application systems (document transfer, etc.) , ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a state conversion table-based judging method of the consistency of mulitsource audit data service. It adopts many types of information collecting agents distributed various places of a system to implement multiple information collecting modes, acquires audit data from various links and layers of the system, the information collecting agents process various information forms to generate a united standard audit information and report it to a service audit data consistency judgment center, which makes a whole consistency judgment on the service audit data based on the state conversion table, according to the relevance between the front and back service links, finds the inconsistency of service processing operations in various links, in time finds the occurrence of abnormal service operations like revising relative data, falsifying service data flow round an application system, etc, and makes the corresponding transaction processing according to the consistency judgment result. It can find the occurrence of abnormal service operations in time and enhances the strength of the auditing and monitoring mechanism.

Description

technical field [0001] The invention relates to a network security method, in particular to a multi-source audit data service consistency judgment method based on a state transition table. It belongs to the field of network technology. Background technique [0002] Security audit technology is a functional feature that a secure network must support. According to certain security policies, it records and analyzes various activities in the computer network system, and identifies existing and potential violations. At present, security audit is placed in an important position in many international norms and domestic security regulations on important networks. In recent years, the focus of security audit technology has expanded from network audit and system audit to the scope of content audit of business systems. After literature search, domestic applications were found: application number: 02148414.7, application date: 2002.12.3, publication number: CN1417690A, applicant: Nanj...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
Inventor 张世永吴云飞朱斌马正文吴承荣俞桂平廖志成郑枫
Owner 上海光华如新信息科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products