Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Log analysis method and system

An analysis method and analysis system technology, applied in the field of log monitoring, can solve the problems of inability to monitor and block crawler behavior in real time, inability to monitor, and inability to monitor in real time.

Active Publication Date: 2020-10-30
CHINA PING AN PROPERTY INSURANCE CO LTD
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the existing business system, it is necessary to open accounts with business system authority for the company's partners, salesmen and suppliers, but since these accounts log in through the external network, real-time monitoring cannot be performed on them
If the account on the external network crawls the business system through a crawler, the existing technology cannot monitor it in real time, and the crawler behavior of the account on the external network can only be identified through log analysis afterwards
Even if the crawling behavior in progress is found, if the crawler has the function of maintaining the session, it will not be able to stop the crawling behavior in time
[0003] Therefore, this solution aims to solve the problem that the crawler behavior in the external network environment cannot be monitored and blocked in real time in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log analysis method and system
  • Log analysis method and system
  • Log analysis method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] see figure 1 , shows a flow chart of the steps of the log analysis method according to Embodiment 1 of the present invention. It can be understood that the flowchart in this method embodiment is not used to limit the sequence of execution steps. The following is an exemplary description taking computer equipment as the execution subject, as follows:

[0037] Step S100, acquire at least one log file of the system to be monitored according to a preset collection agent, wherein each log file includes a corresponding operator ID.

[0038] A log is a log file automatically created and maintained by a system or server that contains a listing of the activities it has performed. The logs mainly include system logs, application logs, and security logs. Each log contains relevant descriptions such as time stamp, host name, user, and operation behavior. System operation and maintenance and developers can use the logs to understand server software and hardware information, Check...

Embodiment 2

[0062] see figure 2 , shows a schematic diagram of the program modules of the log analysis system according to Embodiment 2 of the present invention. It can be understood that the flowchart in this method embodiment is not used to limit the sequence of execution steps. In this embodiment, the log analysis system 20 may include or be divided into one or more program modules, one or more program modules are stored in a storage medium and executed by one or more processors to complete The present invention can also realize the above log analysis method. The program module referred to in the embodiment of the present invention refers to a series of computer program instruction segments capable of completing specific functions, which is more suitable than the program itself to describe the execution process of the log analysis system 20 in the storage medium. The following description will specifically introduce the functions of each program module of the present embodiment:

...

Embodiment 3

[0088] refer to image 3 , is a schematic diagram of the hardware architecture of the computer device according to the third embodiment of the present invention. In this embodiment, the computer device 2 is a device that can automatically perform numerical calculation and / or information processing according to pre-set or stored instructions. The computer equipment 2 may be a rack-type server, a blade-type server, a tower-type server or a cabinet-type server (including an independent server, or a server cluster composed of multiple servers) and the like. like image 3 As shown, the computer device 2 at least includes, but is not limited to, a memory 21 , a processor 22 , a network interface 23 , and a log analysis system 20 that can communicate with each other through a system bus. in:

[0089] In this embodiment, the memory 21 includes at least one type of computer-readable storage medium, and the readable storage medium includes a flash memory, a hard disk, a multimedia ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of log monitoring, and provides a log analysis method comprising the steps of: obtaining at least one log file of a to-be-monitored system according to a preset acquisition agent, wherein each log file comprises a corresponding operator ID; sending the log file to a preset server, and carrying out fragmentation storage on the log file; performing field analysis on each log file to obtain a plurality of target field values in each log file, and judging whether the operator ID corresponding to each log file conforms to a preset alarm rule or not according to the plurality of target field values, the alarm rule including a first alarm rule, a second alarm rule and a third alarm rule; and when the operator ID conforms to the alarm rule, sending correspondingalarm information to a risk control platform, so that the risk control platform executes a blocking operation on the operator ID. Through the embodiment of the invention, the crawler behavior of the extranet environment can be monitored and blocked in real time.

Description

technical field [0001] The embodiments of the present invention relate to the field of log monitoring, and in particular, relate to a log analysis method, system, computer equipment, and storage medium. Background technique [0002] In the existing business system, it is necessary to open accounts with business system authority for the company's partners, salesmen, and suppliers. However, since these accounts log in through the external network, real-time monitoring cannot be performed on them. If the account on the external network crawls the business system through a crawler, the existing technology cannot monitor it in real time, and the crawler behavior of the account on the external network can only be identified through log analysis afterwards. Even if the crawling behavior in progress is found, if the crawler has the function of maintaining the session, it cannot stop the crawling behavior in time. [0003] Therefore, this solution aims to solve the problem that the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F16/958G06F16/18
CPCH04L63/1425H04L63/1491G06F16/958G06F16/1815Y02D10/00
Inventor 卿哲嘉
Owner CHINA PING AN PROPERTY INSURANCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products