Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Website security monitoring method based on cloud architecture

A technology of security monitoring and cloud architecture, applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problems of insufficient protection, loss, high cost, etc., to reduce losses and risks, reduce false positives, improve The effect of security capabilities

Active Publication Date: 2014-03-26
洪高颖
View PDF3 Cites 50 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0021] (1) Professional scanning tools often cannot solve the Trojan horse problem, and the cost is huge. At the same time, facing the complex security requirements of Web sites, they also have some limitations of their own;
[0022] (2) The previous anti-tampering technology can only detect files, but cannot effectively monitor database content and cross-site data, resulting in many incidents of being hacked, tampered, and linked to horses;
[0023] (3) At present, traditional security devices are not strict enough to protect application security. Many websites are often hacked, tampered with, and have not been found after a long time of hanging horses. During this period, many visitors will become victims. Or news about being hacked, tampered with, or linked to a horse spread everywhere, which caused a very bad reputation loss to the person in charge of the website or the unit;
[0024] (4) With the continuous improvement of informatization level and the continuous growth of various information systems, the old centralized monitoring system is increasingly unable to withstand the monitoring range beyond the limit, resulting in many new information systems that cannot be included in the centralized monitoring protection range Inside

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Website security monitoring method based on cloud architecture
  • Website security monitoring method based on cloud architecture
  • Website security monitoring method based on cloud architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] The present invention will be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments of the invention are illustrated.

[0085] Cloud Computing is the development of Distributed Computing, Parallel Computing and Grid Computing. It is the automatic splitting of huge computing processing programs into countless smaller subroutines through the network. , and then handed over to a huge system composed of multiple servers for calculation and analysis, and then return the processing results to the user. Through cloud computing technology, network service providers can process tens of millions or even billions of information in a few seconds, and achieve network services as powerful as "supercomputers".

[0086] As an emerging computing model, cloud computing can deliver various IT resources and functions to users through the network in the form of services. These services include a wide variety of Internet applications, p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a website security monitoring method based on a cloud architecture. The event is used as the drive, and the cloud architecture is used as the support, so as to support the centralized monitoring early-alarming of massive websites and the quick response processing of each event; the 24-hour security event automatic monitoring and alarming is carried out on various websites, so as to cooperate with operation and maintenance monitoring personnel to implement manual analysis and event processing on the security events. Through the 24-hour cooperation of the website security monitoring and event operation and maintenance monitoring personnel, the latest real security events in the website can be timely monitored, so a user can timely process various major security events, and reduce the loss and risk caused by various security events.

Description

technical field [0001] The invention relates to the technical field of website security monitoring, in particular to a method for website security monitoring based on cloud architecture. Background technique [0002] At present, the Internet website has become an important means of information dissemination, circulation, exchange and storage. Since the Internet website is open 24 / 7, and the application program that carries the website has loopholes that cannot be completely overcome by itself, this provides an opportunity for hackers to intrude. Opportunities that can be taken advantage of, such as page tampering, website rooting, injection attacks, DDoS attacks, etc., have greatly troubled website providers and caused serious damage to corporate image, information network and even core business. With the continuous improvement of the level of government informatization, the situation of e-government information security is becoming increasingly severe. The government affai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L12/24H04L29/06
Inventor 洪高颖
Owner 洪高颖
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products