Alarm method and device thereof

A technology of alarm time and log, which is applied in the computer field, can solve the problem that the server cannot alarm in time, achieve the effect of reducing operation complexity, avoiding false alarm problems, and improving accuracy

Active Publication Date: 2020-07-31
新浪技术(中国)有限公司
View PDF10 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides an alarm method to solve the problem in the prior art that the server cannot be alarmed in time when the server is threatened by security
[0005] The embodiment of the present application also provides an alarm device to solve the problem in the prior art that the server cannot be alarmed in time when the server is threatened by security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alarm method and device thereof
  • Alarm method and device thereof
  • Alarm method and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In the process of the server providing external services, multiple different monitoring devices can be used to monitor whether the server is subject to security threats. However, different monitoring devices may have different sensitivity to security threats, which makes the monitoring of different monitoring devices Results may be inconsistent, making it impossible to accurately determine whether a server is compromised.

[0022] For example, during the process of server 1 providing external services, monitoring device A and monitoring device B can simultaneously monitor whether server 1 is threatened by security. Among them, if the sensitivity of monitoring device A to security threats is too low, and the sensitivity of monitoring device B to security threats is too high, the following monitoring results will appear: monitoring device A monitors that server 1 is not threatened by security, monitoring device B It is monitored that server 1 is threatened by security, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an alarm method and a device thereof, which are used for solving the problem that an alarm cannot be given in time when a server is subjected to security threat in the prior art. The warning method comprises the following steps: obtaining access logs of a plurality of servers and monitoring logs of a plurality of monitoring devices from a log database, using the plurality of monitoring devices for monitoring whether the plurality of servers are threatened by security, wherein the access log comprises access IPs and access timestamps of access devices accessing a plurality of servers, the monitoring log comprises monitored alarm IPs and alarm timestamps of the access devices generating security threats to the plurality of servers, and the access log and the monitoring log are logs after unified formatting; performing association analysis on the access log and the monitoring log, determining whether a target IP exists or not, wherein the access timestamp corresponding to the target IP in the access log is the same as the alarm timestamp corresponding to the target IP in the monitoring log; and if the target IP exists, performing threat alarm based on the target IP. Therefore, timely alarming can be realized and alarming accuracy is high.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to an alarm method and device. Background technique [0002] During the process of the server providing external services, a monitoring device can be used to monitor whether the server is threatened by security. Usually, multiple monitoring devices (such as firewalls and threat intelligence devices) can be used to monitor the server, and when it is determined that the server is under security threats according to the monitoring results, a security alarm is given to the server. [0003] However, in practical applications, the monitoring results of different monitoring devices may be inconsistent, resulting in inaccurate monitoring results for the server. In order to improve the accuracy, at present, the staff usually analyze the logs of the server and monitoring equipment, so as to determine whether the server is threatened by security according to the analysis results. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24G06F21/55
CPCH04L63/1425H04L41/0631G06F21/552
Inventor 盛洋康宇
Owner 新浪技术(中国)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products