Network safety log template extraction method and device
A network security and log technology, applied in the field of information security, can solve the problems that analysts are difficult to extract log templates, log format changes, etc., achieve high accuracy, reduce system load, and improve computing efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0032] In order to make the above-mentioned objects, features and advantages of the present invention more obvious and understandable, the present invention will be further described below through specific embodiments and drawings.
[0033] The main steps of the network security log template extraction method provided by the present invention include data cleaning, information clustering and template extraction, such as figure 1 Shown. Among them, data cleaning is to first filter the log data with a specific format, including date, IP address, etc.; information clustering is to use the clustering algorithm to divide the logs with similar formats into one category on the data after cleaning. Medium; template extraction is to extract the template words describing the format in the log for the logs in each category, and only retain the template words in the original log to obtain the log format.
[0034] 1. Data cleaning
[0035] The data cleaning in this method is mainly to filter out...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap