A Behavior Analysis Method Based on Massive System Logs

A system log and behavior analysis technology, applied in the field of big data, can solve the problems of one-sided log analysis results, low analysis speed and efficiency, and output diversified analysis results, etc.

Active Publication Date: 2022-07-01
时代云英(深圳)科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a behavior analysis method based on massive system logs, which is used to solve the problem that when analyzing logs, the terminal usually uses the inherent log analysis program to perform log analysis on the locally stored data and obtain the log analysis results. The result data, the log analysis results of such a process are very one-sided, the analysis speed and efficiency are not high, and the technical purpose of outputting diversified analysis results through log analysis cannot be achieved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Behavior Analysis Method Based on Massive System Logs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments These are some embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0034] Accordingly, the detailed descriptions of embodiments of the invention provided in the following drawings are not intended to limit the scope of the invention as claimed, but are merely representative of selected embodiments of the invention.

[0035] Traditionally, systems such as intrusion monitoring, vulnerability scanning, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a behavior analysis method based on massive system logs, comprising: acquiring coding information in the massive system logs, and corresponding the coding information to a unique analysis target; Arrangement; clustering according to the attribute characteristics of log information, wherein the clustered log information is still arranged according to time nodes; time iterative analysis of the clustered log information is performed to obtain the analysis result, which can monitor log faults The purpose of information, predicting risks and trends, thus solving the technical problem that log analysis cannot accurately and efficiently analyze diversified log results in the existing technology, and at the same time determining behavior information and approximate behavior information can obtain accurate fault judgment results, risk Evaluation results, trend prediction results, and diversified analysis results are output through log analysis.

Description

technical field [0001] The invention belongs to the field of big data and relates to behavior analysis technology, in particular to a behavior analysis method based on massive system logs. Background technique [0002] With the rise and development of cloud computing, mobile Internet, and the Internet of Things, the era of big data has arrived. Logs of various systems, programs, operation and maintenance, transactions, etc. are becoming more and more important as an important basis for system recovery, error tracking, security detection and other operations. Therefore, it is very important to quickly find useful information in massive logs; [0003] For example, as a security monitoring system, systems such as intrusion monitoring, vulnerability scanning, and auditing can complete an alarm for any behavior that poses a threat to security, that is, generate an operation log; when a certain operation continues, the same operation log will be issued; Administrators repeatedly...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/07G06F16/906
CPCG06F11/079G06F11/0766G06F16/906
Inventor 张金涛刘英男龙丕荣胡志尧王金波
Owner 时代云英(深圳)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products