Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Server alarm processing method, system and device

A processing method and server technology, which are applied in the field of network information security, can solve problems such as hackers stealing information, omission of security alarm information, and inability to process security alarm information in time, and achieve the effect of improving efficiency.

Pending Publication Date: 2021-12-07
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When a large amount of security warning information appears, the staff cannot process all the security warning information in time, and the efficiency of processing the warning information is low, which may lead to hackers successfully stealing information in the server
In addition, due to the fatigue of the staff after processing the security warning information for a long time, it may lead to the omission of the security warning information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Server alarm processing method, system and device
  • Server alarm processing method, system and device
  • Server alarm processing method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The core of the present invention is to provide a server alarm processing method, system and device, which can not require staff to process security alarm information, improves the efficiency of processing alarm information, and does not cause omissions.

[0050] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0051] Please refer to figure 1 , figure 1 A flow chart of a method for proces...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a server alarm processing method, system and device. First alarm information is obtained when a server accesses a malicious domain name, whether a first virus program corresponding to the first alarm information exists in the server or not is judged through the first alarm information, when judging that the first virus program exists in the server, whether the first virus program is threatened or not is judged, if the first virus program is threatened, the first virus program is removed, and a worker does not need to process the safety alarm information, so the alarm information processing efficiency is improved, and the phenomenon of omission is avoided.

Description

technical field [0001] The invention relates to the field of network information security, in particular to a method, system and device for processing server alarms. Background technique [0002] Hackers can use virus programs to make the server access malicious domain names. When the server accesses the malicious domain name, the malicious domain name will obtain the address of the server, and then transmit malicious code to the server to steal the information in the server, causing user information leakage and property loss. , when the big data security analysis system detects that a server accesses a malicious domain name, it will generate a security alarm message. In order to judge the threat of security alarm information, the existing technology usually judges the threat of the security alarm information based on the factors such as the alarm start time, alarm duration and scope of influence in the security alarm information, and then the staff judges the threat of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/568
Inventor 宋振范渊刘博
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products