Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and system for detecting website threat based on real-time log

A technology of threat detection and logging, applied in transmission systems, electrical components, etc., can solve the problems of long storage and analysis of massive log data, difficult to detect websites, and poor timeliness, so as to improve processing capacity, timeliness, and information security Guarantee and improve the effect of timeliness

Active Publication Date: 2015-05-13
INST OF INFORMATION ENG CAS
View PDF5 Cites 81 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Most of the existing log-based website threat analysis and detection methods and systems adopt the method of normalizing log data into structured data and storing them in database tables. In this processing method, the reading and writing of log data is more complicated and the performance is lower. Real-time detection and analysis of website threats cannot be satisfied, and most of them adopt database-based post-event detection methods with low processing efficiency and lack of timeliness, and effective measures cannot be taken immediately when an attack occurs
At the same time, the traditional log analysis architecture cannot achieve linear expansion of storage performance. When the stored log data reaches a certain amount, the read and write performance of the data is seriously affected, and it takes a long time to store and analyze massive log data. , with the rapid growth of website log data, the timeliness is getting worse and the cost is getting higher and higher, making it more difficult to quickly detect threats to the website in multiple dimensions and take effective measures in a timely manner

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting website threat based on real-time log
  • Method and system for detecting website threat based on real-time log
  • Method and system for detecting website threat based on real-time log

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056]The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0057] Such as figure 1 As shown, the real-time log-based website threat detection method provided by an embodiment of the present invention, the method includes the following steps:

[0058] 101. Collect and monitor the log data of the log server of the website in real time.

[0059] 102. Convert and distribute the log data in real time.

[0060] 103. Perform real-time processing and detection on the log data.

[0061] 104. Display the website threat detect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for detecting website threat based on a real-time log. The method comprises the steps of acquiring log data of a website log server on real time; transforming the log data and distributing on real time; processing and detecting the log data on real time; displaying the website threat detection result on real time; early warning the severity of the detection result on real time. The invention further provides a system for detecting the website threat based on the real-time log. The system comprises a log data real-time acquiring unit, a log data real-time transformation and distribution unit, a log data real-time processing and detecting unit and a log data real-time monitoring unit. With the adoption of the method and system, the processing capacity and timeliness of the log data can be improved; the timeliness of website threat detection and reaction can be improved; the website operation risk can be reduced; the information security of the website can be greatly ensured.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to a method and system for detecting website threats based on real-time logs. Background technique [0002] With the rapid development of Internet technology, the issue of network security is particularly important, and the security issue of network space has also risen to the national strategy. Some governments, school agencies and small and medium-sized enterprises have established their own network sites. Due to the lack of professional and technical personnel in information security, the system cannot be discovered in time after being attacked, resulting in adverse effects. There are various means of network attack, such as distributed denial of service (Distributed Denial of Service, referred to as DDoS) attack, 0day vulnerability attack, etc., the earlier the abnormality and threat of the system or network are discovered, and the preventive and countermea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425
Inventor 任房利仇新梁赵双武杨白波李龙泉刘建
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products