Threat tracking method and device for log access relation and electronic equipment

A technology for accessing relationships and logs, applied in the field of information security, can solve problems such as difficult real-time search data, huge log data volume, and difficult to achieve second-level search response, so as to achieve the effect of improving search speed and realizing real-time search

Active Publication Date: 2021-12-24
SANGFOR TECH INC
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the threat tracking scheme of log access relationship in the existing technology is often difficult to achieve second-level response of search due to the huge amount of log data; and it is difficult to search for the latest data in real time under the premise of ensuring search performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat tracking method and device for log access relation and electronic equipment
  • Threat tracking method and device for log access relation and electronic equipment
  • Threat tracking method and device for log access relation and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0045] Please refer to figure 1 , figure 1 It is a flow chart of a threat tracking method for log access relationships provided by an embodiment of the present invention. The method can include:

[0046] Step 101: Obtain an access relationship query request; wherein, the access relationship query request includes a query target and a query...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a threat tracking method and device for a log access relation, electronic equipment and a readable storage medium. The method comprises the following steps: obtaining an access relation query request, wherein the access relation query request comprises query targets and query types; if the query types comprise detail types, searching for detail data corresponding to the query targets from a detail database; and if the query types comprise form types, searching for form data corresponding to the query targets from a form database, wherein the form database stores form data corresponding to original access logs. According to the invention, the form database is used for storing the form data corresponding to each query target, and the search speed of log access relations is increased through storage of the form data; and the detail database is utilized to store the detail data corresponding to each query target, so that the latest log details can be quickly stored in the detail database. Therefore, real-time search of the latest data is realized on the premise of ensuring the search performance of the log access relations.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method, device, electronic device and readable storage medium for threat tracing of log access relations. Background technique [0002] At present, the main purpose of the threat tracking system for log access relations is to discover threats in the logs by searching key information such as IP (Internet Protocol, Internet Protocol), URL (Uniform Resource Locator, Uniform Resource Locator) and domain names, and through Extended search to track the path of threat propagation; enabling people to vividly observe existing threats and their extended propagation path from the intricate logs. [0003] However, the threat tracking scheme of log access relationship in the prior art is often difficult to achieve second-level search response due to the huge amount of log data; and it is difficult to search for the latest data in real time under the premise of ensuring ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1425H04L67/02
Inventor 刘飞夏章杰柯超建
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products