Enhanced analysis method and device based on log security audit, equipment and storage medium

A security audit and analysis method technology, applied in the field of information security, can solve problems such as poor stability, low calculation and processing efficiency, complex log analysis model, etc., and achieve the effect of efficient calculation and processing and strong stability

Active Publication Date: 2021-10-12
BEIJING TOPWALK INFORMATION TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the increase in the amount of application logs and the expansion of application log-related data, the log analysis model close to actual combat and business is becoming more and more complex, and the security audit system is insufficient in supporting capabilities, poor in stability, and low in computing and processing efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enhanced analysis method and device based on log security audit, equipment and storage medium
  • Enhanced analysis method and device based on log security audit, equipment and storage medium
  • Enhanced analysis method and device based on log security audit, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0038] The terms "first", "second", "third", "fourth", etc. (if any) in the specification and claims of the present application and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an enhanced analysis method and device based on log security audit, equipment and a storage medium, and the method comprises the steps: calling a first big data component to collect various types of data, and cleaning the various types of data; and calling a second big data component to analyze the cleaned data and display a result according to an alarm threshold obtained by machine learning in advance. According to the embodiment of the invention, a complex log analysis model can be simplified, actual combat and business requirements are better met, calculation processing is efficiently carried out, meanwhile, PB-magnitude data can be supported, and the stability is high.

Description

technical field [0001] The present invention generally relates to the field of information security technology, to the field of big data analysis technology and artificial intelligence technology, and to a natural language processing engine based on deep learning, full-stack NLP technical capabilities, and especially to a multi-dimensional trajectory analysis based on personal daily business system operation Log security audit enhancement analysis method, device, equipment and storage medium. [0002] Using big data-related processing technologies, mainly including stream computing, distributed search engines, and natural language understanding, etc., to realize the storage and access of massive data and unstructured data that cannot be solved by traditional databases. Background technique [0003] With the increasing informatization of various organizations such as governments, enterprises and institutions, the degree of dependence on information systems has also increased....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F16/182G06F16/215G06F16/2458G06F16/25G06F16/28
CPCG06F21/552G06F16/182G06F16/215G06F16/254G06F16/2471G06F16/284
Inventor 余江王洪波张三海陈倩倩
Owner BEIJING TOPWALK INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products