CN1492336A - Information system auditing method based on data storehouse - Google Patents
Information system auditing method based on data storehouse Download PDFInfo
- Publication number
- CN1492336A CN1492336A CNA031507778A CN03150777A CN1492336A CN 1492336 A CN1492336 A CN 1492336A CN A031507778 A CNA031507778 A CN A031507778A CN 03150777 A CN03150777 A CN 03150777A CN 1492336 A CN1492336 A CN 1492336A
- Authority
- CN
- China
- Prior art keywords
- data
- analysis
- dimension
- audit
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (7)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB031507778A CN100359495C (en) | 2003-09-04 | 2003-09-04 | Information system auditing method based on data storehouse |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB031507778A CN100359495C (en) | 2003-09-04 | 2003-09-04 | Information system auditing method based on data storehouse |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1492336A true CN1492336A (en) | 2004-04-28 |
CN100359495C CN100359495C (en) | 2008-01-02 |
Family
ID=34240631
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB031507778A Expired - Fee Related CN100359495C (en) | 2003-09-04 | 2003-09-04 | Information system auditing method based on data storehouse |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100359495C (en) |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006136055A1 (en) * | 2005-06-22 | 2006-12-28 | Zte Corporation | A text data mining method |
CN100568237C (en) * | 2004-11-30 | 2009-12-09 | 国际商业机器公司 | Report form template in the multidimensional enterprise software system generates method and system |
CN101039186B (en) * | 2007-05-08 | 2010-08-04 | 中国科学院软件研究所 | Method for auditing safely system log |
CN1917445B (en) * | 2006-09-07 | 2010-09-29 | 上海交通大学 | Method for auditing log event of fire wall, and teaching experimental system |
CN101453378B (en) * | 2008-12-30 | 2011-01-12 | 杭州华三通信技术有限公司 | Method and system for log dump and audit |
CN101425936B (en) * | 2007-10-30 | 2011-08-31 | 北京启明星辰信息技术股份有限公司 | Macro network security status assessment method based on exception measurement |
CN101694661B (en) * | 2009-10-22 | 2012-05-09 | 中兴通讯股份有限公司 | Method and device for generating statistical form and statistical server |
CN102457475A (en) * | 2010-10-15 | 2012-05-16 | 中国人民解放军国防科学技术大学 | Integration and conversion system for network security data |
WO2013026312A1 (en) * | 2011-08-23 | 2013-02-28 | 中兴通讯股份有限公司 | Alarming method and system based on log detection |
CN1713180B (en) * | 2004-06-22 | 2013-05-08 | 微软公司 | Combining multidimensional expressions and data mining extensions to mine OLAP cubes |
CN103548019A (en) * | 2011-02-21 | 2014-01-29 | 阿玛得斯两合公司 | Method and system for providing statistical from a data warehouse |
CN104219088A (en) * | 2014-08-21 | 2014-12-17 | 南京邮电大学 | Hive-based network alarm information OLAP method |
CN104376254A (en) * | 2013-08-16 | 2015-02-25 | 北京神州泰岳软件股份有限公司 | Method and system for auditing log |
CN105787052A (en) * | 2016-02-26 | 2016-07-20 | 广州品唯软件有限公司 | Data processing model building method and data screening method based on data processing model |
CN106598827A (en) * | 2016-12-19 | 2017-04-26 | 东软集团股份有限公司 | Method and device for extracting log data |
CN107395570A (en) * | 2017-06-28 | 2017-11-24 | 青岛以太科技股份有限公司 | Cloud platform auditing system based on big data administrative analysis |
CN108351940A (en) * | 2015-09-03 | 2018-07-31 | 策安保安有限公司 | High frequency heuristic data for information security events obtains the system and method with analysis |
CN108664777A (en) * | 2018-03-16 | 2018-10-16 | 济宁医学院 | A kind of secure information storage method |
CN109508541A (en) * | 2018-10-18 | 2019-03-22 | 杭州安恒信息技术股份有限公司 | A kind of credible behavior library generating method based on semantic analysis |
CN109993454A (en) * | 2019-04-10 | 2019-07-09 | 贵州电网有限责任公司 | Audit risk processing method, device, computer equipment and storage medium |
CN110855747A (en) * | 2019-10-14 | 2020-02-28 | 上海辰锐信息科技公司 | Method for collecting behavior audit data of user access application |
CN111026759A (en) * | 2019-12-11 | 2020-04-17 | 中盈优创资讯科技有限公司 | Hbase-based report generation method and device |
CN113157191A (en) * | 2021-02-21 | 2021-07-23 | 上海帕科信息科技有限公司 | Data visualization method based on OLAP system |
CN116975136A (en) * | 2023-09-25 | 2023-10-31 | 北京众图识人科技有限公司 | Processing method and device of application program interface, terminal equipment and storage medium |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4757533A (en) * | 1985-09-11 | 1988-07-12 | Computer Security Corporation | Security system for microcomputers |
US5978475A (en) * | 1997-07-18 | 1999-11-02 | Counterpane Internet Security, Inc. | Event auditing system |
CN1196296C (en) * | 2001-12-04 | 2005-04-06 | 上海复旦光华信息科技股份有限公司 | Easy-to-expand network invasion detecting and safety auditing system |
CN1417690A (en) * | 2002-12-03 | 2003-05-14 | 南京金鹰国际集团软件系统有限公司 | Application process audit platform system based on members |
-
2003
- 2003-09-04 CN CNB031507778A patent/CN100359495C/en not_active Expired - Fee Related
Cited By (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1713180B (en) * | 2004-06-22 | 2013-05-08 | 微软公司 | Combining multidimensional expressions and data mining extensions to mine OLAP cubes |
CN100568237C (en) * | 2004-11-30 | 2009-12-09 | 国际商业机器公司 | Report form template in the multidimensional enterprise software system generates method and system |
CN101151843B (en) * | 2005-06-22 | 2010-05-12 | 中兴通讯股份有限公司 | Text data digging method |
WO2006136055A1 (en) * | 2005-06-22 | 2006-12-28 | Zte Corporation | A text data mining method |
CN1917445B (en) * | 2006-09-07 | 2010-09-29 | 上海交通大学 | Method for auditing log event of fire wall, and teaching experimental system |
CN101039186B (en) * | 2007-05-08 | 2010-08-04 | 中国科学院软件研究所 | Method for auditing safely system log |
CN101425936B (en) * | 2007-10-30 | 2011-08-31 | 北京启明星辰信息技术股份有限公司 | Macro network security status assessment method based on exception measurement |
CN101453378B (en) * | 2008-12-30 | 2011-01-12 | 杭州华三通信技术有限公司 | Method and system for log dump and audit |
CN101694661B (en) * | 2009-10-22 | 2012-05-09 | 中兴通讯股份有限公司 | Method and device for generating statistical form and statistical server |
CN102457475A (en) * | 2010-10-15 | 2012-05-16 | 中国人民解放军国防科学技术大学 | Integration and conversion system for network security data |
CN103548019B (en) * | 2011-02-21 | 2017-07-07 | 阿玛得斯两合公司 | Method and system for providing statistical information according to data warehouse |
US9710506B2 (en) | 2011-02-21 | 2017-07-18 | Amadeus S.A.S. | Method and system for providing statistical data from a data warehouse |
CN103548019A (en) * | 2011-02-21 | 2014-01-29 | 阿玛得斯两合公司 | Method and system for providing statistical from a data warehouse |
WO2013026312A1 (en) * | 2011-08-23 | 2013-02-28 | 中兴通讯股份有限公司 | Alarming method and system based on log detection |
CN104376254A (en) * | 2013-08-16 | 2015-02-25 | 北京神州泰岳软件股份有限公司 | Method and system for auditing log |
CN104376254B (en) * | 2013-08-16 | 2017-08-04 | 北京神州泰岳软件股份有限公司 | A kind of log audit method and system |
CN104219088A (en) * | 2014-08-21 | 2014-12-17 | 南京邮电大学 | Hive-based network alarm information OLAP method |
CN108351940A (en) * | 2015-09-03 | 2018-07-31 | 策安保安有限公司 | High frequency heuristic data for information security events obtains the system and method with analysis |
CN108351940B (en) * | 2015-09-03 | 2021-05-07 | 策安保安有限公司 | System and method for high frequency heuristic data acquisition and analysis of information security events |
CN105787052A (en) * | 2016-02-26 | 2016-07-20 | 广州品唯软件有限公司 | Data processing model building method and data screening method based on data processing model |
CN106598827A (en) * | 2016-12-19 | 2017-04-26 | 东软集团股份有限公司 | Method and device for extracting log data |
CN106598827B (en) * | 2016-12-19 | 2019-05-31 | 东软集团股份有限公司 | Extract the method and device of daily record data |
CN107395570A (en) * | 2017-06-28 | 2017-11-24 | 青岛以太科技股份有限公司 | Cloud platform auditing system based on big data administrative analysis |
CN107395570B (en) * | 2017-06-28 | 2022-09-06 | 青岛以太科技股份有限公司 | Cloud platform auditing system based on big data management analysis |
CN108664777A (en) * | 2018-03-16 | 2018-10-16 | 济宁医学院 | A kind of secure information storage method |
CN109508541B (en) * | 2018-10-18 | 2022-03-18 | 杭州安恒信息技术股份有限公司 | Credible behavior library generation method based on semantic analysis |
CN109508541A (en) * | 2018-10-18 | 2019-03-22 | 杭州安恒信息技术股份有限公司 | A kind of credible behavior library generating method based on semantic analysis |
CN109993454A (en) * | 2019-04-10 | 2019-07-09 | 贵州电网有限责任公司 | Audit risk processing method, device, computer equipment and storage medium |
CN110855747A (en) * | 2019-10-14 | 2020-02-28 | 上海辰锐信息科技公司 | Method for collecting behavior audit data of user access application |
CN111026759A (en) * | 2019-12-11 | 2020-04-17 | 中盈优创资讯科技有限公司 | Hbase-based report generation method and device |
CN111026759B (en) * | 2019-12-11 | 2024-03-12 | 中盈优创资讯科技有限公司 | Report generation method and device based on Hbase |
CN113157191A (en) * | 2021-02-21 | 2021-07-23 | 上海帕科信息科技有限公司 | Data visualization method based on OLAP system |
CN116975136A (en) * | 2023-09-25 | 2023-10-31 | 北京众图识人科技有限公司 | Processing method and device of application program interface, terminal equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN100359495C (en) | 2008-01-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100359495C (en) | Information system auditing method based on data storehouse | |
Debar et al. | Towards a taxonomy of intrusion-detection systems | |
Debar | An introduction to intrusion-detection systems | |
RU2417417C2 (en) | Real-time identification of resource model and resource categorisation for assistance in protecting computer network | |
Shanmugasundaram et al. | ForNet: A distributed forensics network | |
Vaarandi | Mining event logs with slct and loghound | |
EP1319285B1 (en) | Monitoring network activity | |
US7197762B2 (en) | Method, computer readable medium, and node for a three-layered intrusion prevention system for detecting network exploits | |
US7694115B1 (en) | Network-based alert management system | |
US8209759B2 (en) | Security incident manager | |
CN112738016A (en) | Intelligent security event correlation analysis system for threat scene | |
US20030084328A1 (en) | Method and computer-readable medium for integrating a decode engine with an intrusion detection system | |
US20110185426A1 (en) | Detection of network security breaches based on analysis of network record logs | |
CN113691566B (en) | Mail server secret stealing detection method based on space mapping and network flow statistics | |
CN1417690A (en) | Application process audit platform system based on members | |
Nazer et al. | Current intrusion detection techniques in information technology-a detailed analysis | |
Tiwari et al. | Refinements in Zeek intrusion detection system | |
AZIZI et al. | Log files analysis using MapReduce to improve security | |
Hermanowski | Open source security information management system supporting it security audit | |
Lee et al. | Automated Intrusion Detection Using NFR: Methods and Experiences. | |
Ramaki et al. | Towards event aggregation for reducing the volume of logged events during IKC stages of APT attacks | |
Ning et al. | Design and implementation of a decentralized prototype system for detecting distributed attacks | |
KR102250147B1 (en) | Security Policy Translation in Interface to Network Security Functions | |
Mukti et al. | Integration of Low Interaction Honeypot and ELK Stack as Attack Detection Systems on Servers | |
Zhong | The application of Apriori algorithm for network forensics analysis |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract |
Assignee: Shanghai Geer Automobile Accessory Co., Ltd. Assignor: Geer Software Co., Ltd., Shanghai Contract fulfillment period: 2009.6.1 to 2014.5.31 Contract record no.: 2009310000089 Denomination of invention: Information system auditing method based on data storehouse Granted publication date: 20080102 License type: Exclusive license Record date: 20090608 |
|
LIC | Patent licence contract for exploitation submitted for record |
Free format text: EXCLUSIVE LICENSE; TIME LIMIT OF IMPLEMENTING CONTACT: 2009.6.1 TO 2014.5.31; CHANGE OF CONTRACT Name of requester: SHANGHAI KOAL AUTOMOBILE ACCESSORY CO., LTD. Effective date: 20090608 |
|
EC01 | Cancellation of recordation of patent licensing contract |
Assignee: Shanghai Geer Automobile Accessory Co., Ltd. Assignor: Shanghai Ger Software Co., Ltd. Contract record no.: 2009310000089 Date of cancellation: 20170103 |
|
LICC | Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20080102 Termination date: 20190904 |