Function
Design Log information is dumped to the initial database on the log processing workstation. On one hand, data in the initial database is used to log statistic query; On the other hand, these data is detected by log auditing module. The structure of the log auditing module is shown in the Figure-1: Log auditing module compares acquired log information to intrusion feature in the created initial log database, and if it detects suspicious intrusion, warning would be sent and warning information would be insert into warning log database, which can be accessed by system administrator via the front-end user interface and gets warning log information. Various Log function and basic configuration is shown in log setting module. PHP combined with MySQL can implement quick log searching and exact log query in providing the network security solution for enterprises. [3]