Supercharge Your Innovation With Domain-Expert AI Agents!

Method and device for suppressing log storm

A log and storm technology, applied in the communication field, can solve problems such as excessive garbage logs and important logs being overwritten, and achieve the effect of stabilizing the total amount of logs, avoiding log storms, and suppressing log storms

Active Publication Date: 2018-07-31
中国兵器装备集团兵器装备研究所
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a method and device for suppressing log storms, which can flexibly regulate log merging strategies and solve the problem of important logs being overwritten due to excessive garbage logs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for suppressing log storm
  • Method and device for suppressing log storm
  • Method and device for suppressing log storm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The technical solutions in this embodiment will be clearly and completely described below in conjunction with the accompanying drawings in this embodiment. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0029] In order to suppress the log storm in the system and prevent important system logs from being overwritten when suffering from illegal attacks, this embodiment provides a method for suppressing the log storm, such as figure 1 As shown, the method includes:

[0030] 101. Merge the logs according to the time interval granularity to obtain the merged logs.

[0031] When merging logs, firstly merge the logs generated in a certain merging period according to the current time interval granularity or the initially s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for suppressing a log storm, relates to the technical field of communication, and is invented for solving the problem that important logs are covered due to excessive garbage logs. The method of the present invention includes: merging the logs according to the time interval granularity, obtaining the merged log, generating feedback information according to the merged log, the feedback information is used to reflect the increase or decrease of the number of logs per unit time in the system, and adjusting the time interval granularity according to the feedback information, The granularity of the adjustment time interval is obtained, and the next log merge is performed according to the granularity of the adjustment time interval. The invention is mainly used in the process of merging network attack logs.

Description

technical field [0001] The invention relates to the technical field of communications, in particular to a method and device for suppressing log storms. Background technique [0002] With the development of computer systems and the advent of the era of high-traffic networks, network bandwidth and network traffic have increased rapidly, and various network attacks, such as Intrusion Prevention System (IPS) attacks, Distributed Denial of Service (Distributed Denial of Service) , referred to as DDos) attacks are increasingly rampant. Junk logs in the network and various systems have risen geometrically and exponentially, resulting in a log storm. When a log storm occurs, a large number of garbage logs will cover the real and effective system logs, making them unavailable for use. At the same time, the log storm will drastically increase the system burden, resulting in system performance degradation and insufficient storage space. The need for log storms is getting stronger. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24
Inventor 贾大朋
Owner 中国兵器装备集团兵器装备研究所
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More