Behavior analysis method based on massive system logs

A system log and behavior analysis technology, applied in the field of big data, can solve the problems of inability to do log analysis, one-sided log analysis results, low analysis speed and efficiency, etc.

Active Publication Date: 2021-09-07
时代云英(深圳)科技有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a behavior analysis method based on massive system logs, which is used to solve the problem that when analyzing logs, the terminal usually uses the inherent log analysis program to perform log analysis on the locally stored data and obtain the log analysis results. The result data, the log analysis results of such a process are very one-sided, the analysis speed and efficiency are not high, and the technical purpose of outputting diversified analysis results through log analysis cannot be achieved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Behavior analysis method based on massive system logs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is some embodiments of the present invention, but not all of them. Based on the implementation manners in the present invention, all other implementation manners obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0034] Accordingly, the detailed description of the embodiments of the invention, which is provided in the following figures, is not intended to limit the scope of the claimed invention but merely represents selected embodiments of the invention.

[0035] Traditionally, systems such as intrusion monitoring, vulnerability ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a behavior analysis method based on massive system logs. The method comprises the following steps: acquiring coding information in the massive system logs, and enabling the coding information to correspond to a unique analysis target; extracting all log information corresponding to the coding information, and arranging the log information according to time nodes; clustering according to the attribute characteristics of the log information, wherein the clustered log information is still arranged according to time nodes; and carrying out time iteration analysis on the clustered log information to obtain an analysis result. The purposes of monitoring the log fault information and predicting the risk and trend, solving the technical problem that in the prior art, the log analysis cannot accurately and efficiently carry out diversified log result analysis, and improving the log analysis efficiency are achieved. The behavior information and the approximate behavior information are determined at the same time, so that an accurate fault judgment result, a risk assessment result and a trend prediction result can be obtained, and a diversified analysis result is output through log analysis.

Description

technical field [0001] The invention belongs to the field of big data and relates to behavior analysis technology, in particular to a behavior analysis method based on massive system logs. Background technique [0002] With the rise and development of cloud computing, mobile Internet, and Internet of Things, the era of big data has come. Logs of various systems, programs, operation and maintenance, transactions, etc. are becoming more and more important as an important basis for system recovery, error tracking, security testing and other operations. Therefore, it becomes very important to quickly find useful information in massive logs; [0003] For example, systems such as intrusion monitoring, vulnerability scanning, and auditing, as a security monitoring system, can complete an alarm for any behavior that poses a threat to security, that is, generate an operation log; when a certain operation continues, the same operation log will be issued; The administrator looks at t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/07G06F16/906
CPCG06F11/079G06F11/0766G06F16/906
Inventor 张金涛刘英男龙丕荣胡志尧王金波
Owner 时代云英(深圳)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products