Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network log storage method based on multi-attribute hash deduplication in intrusion detection system

An intrusion detection system, multi-attribute technology, applied in transmission systems, special data processing applications, instruments, etc., can solve the problems of waste of server storage and computing resources, high false negative rate of duplicate logs, and low false negative rate of duplicate logs, etc. Achieve the effect of small computational complexity and space requirements, low false negative rate of duplicate logs, and accurate log deduplication

Active Publication Date: 2017-08-18
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] To sum up, the current network log deduplication method in the intrusion detection system either lacks real-time guarantee, or has a high false negative rate of duplicate logs. heavy method
However, the log storage method in the existing intrusion detection system does not provide a performance optimization strategy for subsequent data analysis operations, resulting in waste of server storage and computing resources, and limits the room for further optimization of data analysis performance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network log storage method based on multi-attribute hash deduplication in intrusion detection system
  • Network log storage method based on multi-attribute hash deduplication in intrusion detection system
  • Network log storage method based on multi-attribute hash deduplication in intrusion detection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] First of all, it needs to be explained that the present invention relates to network security and data storage technology, and is an application of computer technology in the field of Internet technology. During the implementation of the present invention, the application of multiple software function modules will be involved. The applicant believes that after carefully reading the application documents and accurately understanding the realization principle and purpose of the present invention, and in combination with existing known technologies, those skilled in the art can fully implement the present invention by using their software programming skills. Everything mentioned in the application documents of the present invention belongs to this category, and the applicant will not list them one by one.

[0051] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail:

[0052] The network log storage me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to network security and data storage, and aims to provide a network log storage method based on multi-attribute hash deduplication in an intrusion detection system. The network log storage method based on multi-attribute hash deduplication in the intrusion detection system comprises log deduplication and log storage, and ensures that the intrusion detection system can store network logs into a local server after deduplication. The intrusion detection system comprises a data acquisition server and a plurality of data storage and analysis servers, and both the data acquisition server and the data storage and analysis servers are connected with a switch. According to the network log storage method provided by the invention, acquisition and deduplication operations of the network logs can be completed with only one server by using a multi-attribute segment hash method, and smaller computing complexity and space requirements can be achieved; more accurate log deduplication can be realized, data cannot be mistakenly lost, and the lower rate of missing report of repeated logs can be achieved; and the storage mode of the network logs adopts a storage method that is proportional to the server performance, and thus the data storage efficiency can be ensured, and the performance of subsequent data analysis tasks can also be increased.

Description

technical field [0001] The invention relates to the fields of network security and data storage, in particular to a network log storage method based on multi-attribute hash deduplication in an intrusion detection system. Background technique [0002] With the popularization of the Internet, various network attacks emerge in an endless stream, and the security of network users is seriously threatened. The purpose of an intrusion detection system is to discover suspicious attack behaviors through the analysis of network data, usually using detection methods based on Bayesian networks, detection methods based on pattern prediction, detection methods based on machine learning, and detection methods based on data mining. Wait. Although the detection methods are different, the detection process generally includes four steps: data collection, data storage, data analysis, and system response. The data collection process collects or samples network data, especially log data, the da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F17/30
CPCG06F16/1815G06F16/1824H04L63/1425H04L67/1097
Inventor 范渊方黎明张小孟莫金友
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products