Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and device for monitoring terminal command line in real time

A terminal command and real-time monitoring technology, which is applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problems of being unable to accurately locate the person responsible for operating commands, man-made tampering of files, and inability to perform centralized management and real-time monitoring, etc., to achieve less occupation , extensive compatibility, and the effect of less system resources

Active Publication Date: 2012-07-11
CHINA UNIONPAY
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the files saved using this method may be tampered with (for example, hackers intentionally tamper with to cover up malicious behavior or human misoperation), and cannot be centrally managed and effectively monitored in real time
In addition, because there are multiple users in the system who su (change identities) to operate under the same user within the same period of time, this will lead to the inability to accurately locate the person responsible for the operation command in real-time monitoring and post-event auditing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for monitoring terminal command line in real time
  • Method and device for monitoring terminal command line in real time
  • Method and device for monitoring terminal command line in real time

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The specific implementation manners of the present invention will be described in further detail below with reference to the accompanying drawings.

[0041] Embodiments of the present invention associate historical command file names with terminal information and user information, and utilize various log files provided by the Unix / Linux operating system to collect user operation commands and various other behaviors, and send these information to Event collection server for monitoring, management and auditing. These log files can include user information (utmp) successfully logged in the current system provided by the Unix / Linux operating system by default, user su records in the system (sulog), failed login information in the system (filedlogin), and user operations in the system Command (history), operation command (ftp log) after ftp login in the system, and other user-defined application logs.

[0042] Such as figure 1 As shown, the device for real-time monitoring ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for monitoring a terminal command line in real time. Operation commands and other behaviors of users are collected by associating historical file names, terminal information and user information and using various log files provided by a Unix / Linux operation system, and information is transmitted to an event collection server for monitoring, managing and auditing.

Description

technical field [0001] The invention relates to operating system security, and in particular to a method and a device for real-time monitoring of terminal command lines. Background technique [0002] Due to the lack of monitoring tools and monitoring methods for operating commands, Unix / Linux system servers are often unable to detect and monitor user behavior in the operating system in time. When the system administrator needs to manage a certain number of servers, how to track the behavior of users on the server in real time and minimize the system failure time and downtime has become a crucial issue. [0003] Although the bottom layer of the Unix / Linux operating system kernel provides the audit function of user operation commands and various behaviors, enabling the audit function of the operating system kernel will greatly increase the load of the system itself, reduce the stability of the system, and affect the operating system. Applications and businesses on the system ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26
Inventor 戚跃民胡文斌吴素文周恒磊班昊孙会林
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products