Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cluster audit control method based on blockchain technology

A block chain and cluster technology, applied in the field of information technology and computer software, can solve the problems of no cluster audit control and achieve the effect of improving audit efficiency

Active Publication Date: 2018-11-27
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF20 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

So far, there is no method for auditing and controlling clusters based on blockchain technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cluster audit control method based on blockchain technology
  • Cluster audit control method based on blockchain technology
  • Cluster audit control method based on blockchain technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Below in conjunction with accompanying drawing, the present invention will be further described through embodiment.

[0024] Such as figure 1 As shown, the cluster audit management and control method based on blockchain technology in this embodiment, the main body is a hardware device, which carries a cluster audit management and control engine, the input of which is the cluster log related to security, and the output is the cluster audit result and the cluster Control information.

[0025] The functions of this embodiment are fully automated, from the audit of the cluster log to the control of the cluster, the whole process is automatically executed by each unit inside the engine, without manual intervention.

[0026] The schematic diagram of cluster audit management and control in this embodiment is as follows figure 2 As shown, the cluster audit control flow chart is as follows image 3 As shown, it mainly includes the following steps:

[0027] 1) Collect the lo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cluster audit control method based on a blockchain technology. The cluster audit control method based on a blockchain technology includes the steps: extracting security related logs in the cluster and collecting information, then establishing a cluster audit control engine, saving the initial state of the logs, collecting logs in real time, and auditing the logs; when thelogs are updated, performing the operation of comparison and adding on the updated logs on the blockchain by the cluster audit control engine, and backing up the updated logs to a server; and when thecluster logs are maliciously tampered, reporting the tampering events and restoring the original logs by the cluster audit control engine. The invention provides a method for security audit of the cluster and management of the cluster. The cluster audit control method based on a blockchain technology can improve the audit efficiency of the cluster and the security of the cluster.

Description

technical field [0001] The invention belongs to the technical fields of information technology and computer software, and in particular relates to a cluster audit control method based on block chain technology. Background technique [0002] With the gradual expansion of computer cluster applications, malicious attacks from the public network pose an increasingly serious threat to cluster security. The attacker deletes and tampers with the logs and destroys the operation records of the attacked system, thereby avoiding the monitoring and auditing of the cluster by management tools and managers. Accurately and quickly identifying log tampering has become an important task to protect the security of computer clusters. [0003] At present, the protection of log security consists of two parts: the system's own security mechanism and the third-party security policy. The system's own security mechanism, such as the Syslog mechanism of the Unix system and the SCE mechanism of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/20
Inventor 倪琛吴敬征杨牧天罗天悦
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products