CN101442449A - Method for completely auditing user behaviors under centralization access mode - Google Patents

Method for completely auditing user behaviors under centralization access mode Download PDF

Info

Publication number
CN101442449A
CN101442449A CNA2008101633913A CN200810163391A CN101442449A CN 101442449 A CN101442449 A CN 101442449A CN A2008101633913 A CNA2008101633913 A CN A2008101633913A CN 200810163391 A CN200810163391 A CN 200810163391A CN 101442449 A CN101442449 A CN 101442449A
Authority
CN
China
Prior art keywords
network
user
audit
application software
auditing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008101633913A
Other languages
Chinese (zh)
Inventor
徐良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Zhejiang Co Ltd
Original Assignee
China Mobile Group Zhejiang Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Zhejiang Co Ltd filed Critical China Mobile Group Zhejiang Co Ltd
Priority to CNA2008101633913A priority Critical patent/CN101442449A/en
Publication of CN101442449A publication Critical patent/CN101442449A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Debugging And Monitoring (AREA)
  • Computer And Data Communications (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method for overall auditing behavior of a customer under an integrated access pattern, wherein an integrated issuing platform consisting of a plurality of issuing machines is provided, each issuing machine is provided with application software and a network monitoring program; and an auditing server is linked to the network in a bypass mode, and a network acquisition module of the method acquires a network behavior log operated by a user to an auditing server which matches the network access information of the user transmitted by the monitoring program with the network operation log to form complete auditing information for search and analysis, thereby realizing complete auditing data based on the operator. The invention achieves complementarity of advantages of the monitoring program and network behavior auditing methods through the combination of two technological means, thereby ensuring the completeness of the auditing data and improving the auditing efficiency.

Description

The method of user behavior complete audit under a kind of central access pattern
Technical field
The invention belongs to field of information security technology, particularly relate in network environment, user behavior is carried out the method for complete audit.
Background technology
Constantly perfect along with business system and supporting network, business event server zone and data are concentrated in a large number, and data security becomes clear day by day; Safeguard protection to the enterprise key data also becomes the emphasis that each enterprise information security is built.
Resist technology at business data safety mainly is by enterprises user's operation behavior being audited, promptly monitoring at present.The method of audit mainly contains following several:
A kind of audit of intercepting that is based on network level is deployed in the user data convergence-level with snooping equipment, by network traffics monitoring, analysis, agreement reorganization etc. are represented user's operation behavior.This method is used and is concentrated distribution platform issue application program, application client is presented in user's desktop by proprietary protocol, the mutual of user and client finished on user's desktop, but finishes in the program that in fact response of application client moves on concentrating distribution platform.Application client moves in the mode of process on the backstage of concentrating distribution platform, the process of these operations all is that ip address with the server at its place is as source ip when initiating access to netwoks, and destination address all is the server address that will visit, when a plurality of users were connected to same concentrated publisher server and use identical client operation, the information that network behavior is audited was exactly the Audit data that a plurality of users carry out access to netwoks simultaneously like this.Like this, the network behavior audit can't be distinguished the Audit data that obtains according to the user who uses, and makes the information of original auditing system audit lose due effectiveness.
Another kind is based on the audit of the application of Bastion Host, and promptly all users realize that by unified inlet registering service system host, database the user operates audit on Bastion Host.This method causes taking of system's ample resources because the concentrated access of a large number of users is very huge for the expense of system resource, reduces the efficient of system.And the audit module of application layer may clash the phenomenon that loss of data occurs with other application.
Summary of the invention
The objective of the invention is at the problems referred to above, the method for the complete audit that a kind of application combines with network behavior be provided, realize audit accurately and full and accurate.
For this reason, the technical solution used in the present invention is as follows.
The method of user behavior complete audit under a kind of central access pattern is characterized in that: the concentrated distribution platform of being made up of some issue machines is set, issue machine deploy application software and network monitoring program; Audit server adopts the mode of bypass to link network, its network collection module with user's network operating behavior log collection to audit server; The subscriber network access information that audit server sends oracle listener and the network operation daily record complete audit information of composition that is complementary is used for query analysis, thereby realizes the complete Audit data based on the operator.
The present invention specifically comprises the steps:
1) the concentrated distribution platform of being made up of some issue machines is set, issue machine deploy application software and network monitoring program;
2) user is by concentrating the web interface request access software application of distribution platform;
3) concentrate distribution platform according to the application software on the load-balancing mechanism designated user visit particular delivery machine;
4) user uses me to connect the issue machine by the client of concentrating distribution platform by primary account number, starts this application software on the issue machine;
5) concentrate the client of distribution platform that the application software on the issue machine is pushed reuse family terminal with image mode;
6) user imports me from number of the account, cryptographic acess specific transactions system in application software;
7) the network monitoring program on the issue machine is intercepted and captured the access to netwoks of application software;
8) network access information of network monitoring program record application software sends to audit server;
9) audit server adopts the mode of bypass to link network, and its network collection module is gathered user's network operating behavior daily record;
10) audit server information that oracle listener on the issue machine is sent and network behavior daily record are complementary and form complete audit information, are used for query analysis, thereby realize the complete Audit data based on the operator.
Application program on certain the issue machine of user in the concentrated distribution platform of client-access, during the application access network, the access to netwoks meeting is via the network monitoring program that is installed on the issue machine, it is which application program is initiated that oracle listener can obtain this access to netwoks, what the system's account number that starts application program is, and these information are sent to auditing system.
Because before concentrating on the distribution platform application start on every issue machine, need the login of complete operation system, and application program to be identity by the account number of register system start, the oracle listener that is deployed on the issue machine can be intercepted and captured the host program of access to netwoks, and obtain its session information, thereby obtain to start the operating system account number of this program by session information according to the process handle of this program in operating system.
The network monitoring program that is deployed in the issue machine can obtain the source ip of access to netwoks, source port, purpose ip, destination interface, timestamp, operating system of user number of the account network access informations such as (primary account numbers), source ip, purpose ip, the destination interface of using each access to netwoks session for each all are identical, but source port is at random, even start two identical programs simultaneously, its source port also is different, can distinguish on the issue machine same program to the different sessions between background server by source port like this.
Oracle listener on the issue machine with the identity of access to netwoks with the corresponding differentiation of system's account number user, is distinguished source port on the one hand on the other hand, can distinguish different BlueDramas like this.The audit of network level is carried out record according to BlueDrama, information such as the source ip that wherein also comprises, source port, purpose ip, destination interface, timestamp, oracle listener on the issue machine is obtained network access information to be associated with information that network layer is audited and just to have obtained complete behavior audit information, comprise user's identity, the application program of use, the information of application access network, the operation information that the user carries out, time of operation or the like content can intactly show.
As seen, the present invention resolves application program and session by the oracle listener that is deployed on the issue machine, realizes using principal and subordinate's account number corresponding relation of operating with behavior; By combining of oracle listener and network behavior audit measure, realize the mutual supplement with each other's advantages of two kinds of technological means, guarantee the integrality of Audit data and improve audit efficient.The present invention is the organic combination of two kinds of prior aries, has solved the problem and the auditing system performance issue of Data Audit integrality.
Description of drawings
Fig. 1 is a schematic diagram of the present invention.
Fig. 2 is a sequential chart of the present invention.
Embodiment
Referring to accompanying drawing.The present invention is provided with concentrated distribution platform between client and background server, be made up of some issue machines, and the network monitoring program is installed on the issue machine.
Concrete steps of the present invention are as follows:
Step 1 is provided with the concentrated distribution platform of being made up of some issue machines, issue machine deploy application software and network monitoring program;
Step 2, the user is by concentrating the web interface request access software application of distribution platform;
Step 3 concentrates distribution platform according to the application software on the load-balancing mechanism designated user visit particular delivery machine;
Step 4, the user uses me number of the account (primary account number) to connect the issue machine by the client of concentrating distribution platform, starts this application software on the issue machine;
Step 5 concentrates the client of distribution platform that the application software on the issue machine is pushed reuse family terminal with image mode;
Step 6, the user imports account number (from number of the account), cryptographic acess specific transactions system in application software;
Step 7, the network monitoring program on the issue machine is intercepted and captured the access to netwoks of application software;
Step 8, the network access information of network monitoring program record application software (as user's primary account number, source order IP, source eye end mouth, access time stamp etc.) sends to audit server;
Step 9, audit server adopt the mode of bypass to link network, network collection module wherein gather user's network operating behavior daily record (as source order IP, source eye end mouth, access time stab, from account number, operand, content of operation etc.);
Information that step 10, audit server send oracle listener on the issue machine and network behavior daily record are complementary and form complete audit information, are used for query analysis, thereby realize the complete Audit data based on the operator.
The data integrity of present embodiment audit, the efficient height can be finished goal of the invention.

Claims (2)

1. the method for user behavior complete audit under the central access pattern is characterized in that: the concentrated distribution platform of being made up of some issue machines is set, issues machine deploy application software and network monitoring program; Audit server adopts the mode of bypass to link network, its network collection module with user's network operating behavior log collection to audit server; Audit server is complementary into complete audit information with the subscriber network access information that oracle listener sends with the network operation daily record, is used for query analysis, thereby realizes the complete Audit data based on the operator.
2. the method for claim 1 is characterized in that comprising the steps:
1) the concentrated distribution platform of being made up of some issue machines is set, issue machine deploy application software and network monitoring program;
2) user is by concentrating the web interface request access software application of distribution platform;
3) concentrate distribution platform according to the application software on the load-balancing mechanism designated user visit particular delivery machine;
4) user uses me to connect the issue machine by the client of concentrating distribution platform by primary account number, starts this application software on the issue machine;
5) concentrate the client of distribution platform that the application software on the issue machine is pushed reuse family terminal with image mode;
6) user imports me from number of the account, cryptographic acess specific transactions system in application software;
7) the network monitoring program on the issue machine is intercepted and captured the access to netwoks of application software;
8) network access information of network monitoring program record application software sends to audit server;
9) audit server adopts the mode of bypass to link network, and its network collection module is gathered user's network operating behavior daily record;
10) audit server information that oracle listener on the issue machine is sent and network behavior daily record are complementary and form complete audit information, are used for query analysis, thereby realize the complete Audit data based on the operator.
CNA2008101633913A 2008-12-18 2008-12-18 Method for completely auditing user behaviors under centralization access mode Pending CN101442449A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008101633913A CN101442449A (en) 2008-12-18 2008-12-18 Method for completely auditing user behaviors under centralization access mode

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008101633913A CN101442449A (en) 2008-12-18 2008-12-18 Method for completely auditing user behaviors under centralization access mode

Publications (1)

Publication Number Publication Date
CN101442449A true CN101442449A (en) 2009-05-27

Family

ID=40726701

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008101633913A Pending CN101442449A (en) 2008-12-18 2008-12-18 Method for completely auditing user behaviors under centralization access mode

Country Status (1)

Country Link
CN (1) CN101442449A (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102065147A (en) * 2011-01-07 2011-05-18 深圳市易聆科信息技术有限公司 Method and device for obtaining user login information based on enterprise application system
CN102857388A (en) * 2012-07-12 2013-01-02 上海云辰信息科技有限公司 Cloud detection safety management auditing system
CN102868738A (en) * 2012-08-30 2013-01-09 福建富士通信息软件有限公司 Hyper text transfer protocol (HTTP)/hypertext transfer protocol secure (HTTPS) behavior management and control auditing method based on Web proxy
CN104092746A (en) * 2014-06-30 2014-10-08 江苏华大天益电力科技有限公司 Operation and maintenance auditing system and network load balancing method used for system
CN104125304A (en) * 2014-08-13 2014-10-29 北京华夏威科软件技术有限公司 Session-level application auditing method and system
CN104378228A (en) * 2014-09-30 2015-02-25 上海宾捷信息科技有限公司 Network data security management system and method
CN104468537A (en) * 2014-11-25 2015-03-25 公安部第三研究所 System and method for achieving safety audit
CN104506519A (en) * 2014-12-22 2015-04-08 中软信息系统工程有限公司 Web site access security audit method for MIPS (Million Instructions Per Second) platform
CN104572398A (en) * 2015-01-27 2015-04-29 成都千牛信息技术有限公司 Method for user monitoring encrypted disks
CN104869155A (en) * 2015-04-27 2015-08-26 腾讯科技(深圳)有限公司 Data auditing method and device
CN104993952A (en) * 2015-06-19 2015-10-21 成都艾尔普科技有限责任公司 Network user behavior audit and responsibility management system
CN105049232A (en) * 2015-06-19 2015-11-11 成都艾尔普科技有限责任公司 Network information log audit system
CN105162614A (en) * 2015-06-19 2015-12-16 成都艾尔普科技有限责任公司 Network user behavior auditing and responsibility management method
CN105791308A (en) * 2016-04-11 2016-07-20 北京网康科技有限公司 Active identification domain user registration event information method, device and system
CN107370761A (en) * 2017-08-31 2017-11-21 中国航空工业集团公司沈阳飞机设计研究所 A kind of safe and secret management method of LCA systems
CN108616415A (en) * 2018-03-16 2018-10-02 新华三大数据技术有限公司 data correlation method and device
CN110417736A (en) * 2019-06-25 2019-11-05 平安银行股份有限公司 Across the isolated area software distribution method of bank, device and computer readable storage medium
CN110457627A (en) * 2019-07-04 2019-11-15 杭州安恒信息技术股份有限公司 It is audited using web and optimizes the method for website

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102065147A (en) * 2011-01-07 2011-05-18 深圳市易聆科信息技术有限公司 Method and device for obtaining user login information based on enterprise application system
CN102857388A (en) * 2012-07-12 2013-01-02 上海云辰信息科技有限公司 Cloud detection safety management auditing system
CN102868738A (en) * 2012-08-30 2013-01-09 福建富士通信息软件有限公司 Hyper text transfer protocol (HTTP)/hypertext transfer protocol secure (HTTPS) behavior management and control auditing method based on Web proxy
CN104092746A (en) * 2014-06-30 2014-10-08 江苏华大天益电力科技有限公司 Operation and maintenance auditing system and network load balancing method used for system
CN104092746B (en) * 2014-06-30 2018-04-13 北京华电天益信息科技有限公司 A kind of O&M auditing system and the network load balancing method in its system
CN104125304B (en) * 2014-08-13 2017-09-19 北京华夏威科软件技术有限公司 A kind of session level application auditing method and system
CN104125304A (en) * 2014-08-13 2014-10-29 北京华夏威科软件技术有限公司 Session-level application auditing method and system
CN104378228A (en) * 2014-09-30 2015-02-25 上海宾捷信息科技有限公司 Network data security management system and method
CN104468537A (en) * 2014-11-25 2015-03-25 公安部第三研究所 System and method for achieving safety audit
CN104506519A (en) * 2014-12-22 2015-04-08 中软信息系统工程有限公司 Web site access security audit method for MIPS (Million Instructions Per Second) platform
CN104572398A (en) * 2015-01-27 2015-04-29 成都千牛信息技术有限公司 Method for user monitoring encrypted disks
CN104572398B (en) * 2015-01-27 2018-04-17 成都千牛信息技术有限公司 A kind of method of User space monitoring encryption disk
CN104869155B (en) * 2015-04-27 2018-09-18 腾讯科技(深圳)有限公司 Data Audit method and device
CN104869155A (en) * 2015-04-27 2015-08-26 腾讯科技(深圳)有限公司 Data auditing method and device
CN105162614A (en) * 2015-06-19 2015-12-16 成都艾尔普科技有限责任公司 Network user behavior auditing and responsibility management method
CN105049232A (en) * 2015-06-19 2015-11-11 成都艾尔普科技有限责任公司 Network information log audit system
CN104993952A (en) * 2015-06-19 2015-10-21 成都艾尔普科技有限责任公司 Network user behavior audit and responsibility management system
CN105049232B (en) * 2015-06-19 2019-06-21 成都艾尔普科技有限责任公司 Network information Log Audit System
CN105791308B (en) * 2016-04-11 2019-12-31 北京网康科技有限公司 Method, device and system for actively identifying domain user login event information
CN105791308A (en) * 2016-04-11 2016-07-20 北京网康科技有限公司 Active identification domain user registration event information method, device and system
CN107370761A (en) * 2017-08-31 2017-11-21 中国航空工业集团公司沈阳飞机设计研究所 A kind of safe and secret management method of LCA systems
CN108616415A (en) * 2018-03-16 2018-10-02 新华三大数据技术有限公司 data correlation method and device
CN108616415B (en) * 2018-03-16 2020-11-27 新华三大数据技术有限公司 Data association method and device
CN110417736A (en) * 2019-06-25 2019-11-05 平安银行股份有限公司 Across the isolated area software distribution method of bank, device and computer readable storage medium
CN110417736B (en) * 2019-06-25 2022-10-14 平安银行股份有限公司 Method and device for issuing bank cross-isolated area software and computer readable storage medium
CN110457627A (en) * 2019-07-04 2019-11-15 杭州安恒信息技术股份有限公司 It is audited using web and optimizes the method for website

Similar Documents

Publication Publication Date Title
CN101442449A (en) Method for completely auditing user behaviors under centralization access mode
CN112615849B (en) Micro-service access method, device, equipment and storage medium
CN108712426B (en) Crawler identification method and system based on user behavior buried points
CN106341429B (en) A kind of authentication method for protecting server data safety
CN103546343B (en) The network traffics methods of exhibiting of network traffic analysis system and system
CN101447064B (en) Auditing management system and auditing management method
CN109213790A (en) A kind of data circulation analysis method and system based on block chain
CN101034983A (en) System and method for realizing on-Internet true name of the network access user
CN104333556B (en) Based on resource service management system Security Certificate gateway decentralized configuration management method
CN104065731A (en) FTP file transfer system and transfer method
CN103701783A (en) Preprocessing unit, data processing system consisting of same, and processing method
CN102663294A (en) Automatic analysis of software license usage in a computer network
CN101751712A (en) Centralized invoice authentification system and authentification method
CN103475727A (en) Database auditing method based on bridged mode
CN101355427A (en) Internally-control safety method for information gateway-service support system
CN104951524A (en) Mobile platform for database operation and maintenance and using method of mobile platform
CN101482826A (en) Off-line form making system and processing method
CN100366002C (en) Shared access testing system of internet
CN101968815B (en) Processing method of concurrent requests
CN107451469A (en) A kind of process management system and method
CN116668191B (en) Internet of things application virtual gateway with data encryption convergence function
CN101312396B (en) Electronic workform management system and resource authority control method thereof
CN106572103A (en) Hidden port detection method based on SDN network architecture
CN109600395A (en) A kind of device and implementation method of terminal network access control system
CN110110510A (en) A kind of engineering calculation model management method based on cloud computing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20090527