A Redundancy Removal Method Based on Multi-source Alarm Log Security Event Characteristic Analysis
A security event and feature analysis technology, applied in the field of redundancy removal, can solve problems such as redundancy of security events, accidental deletion of alarms, dispersion, etc., to achieve the effect of ensuring the amount of data information, efficient processing, and improving judgment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0039] Such as Figures 1 to 3 As shown, it is an embodiment 1 of a de-redundancy method based on multi-source alarm log security event feature analysis of the present invention, and its steps include in turn:
[0040] (1) Discretized alarm log attributes; such as figure 2 As shown, it specifically includes the following steps:
[0041] (1.1) Attribute definition: define C as a conditional attribute, including src_ip, dst_ip, src_port, dst_port, sid, which are respectively recorded as conditional attribute value C i (i=1, 2, 3, 4, 5); define D as a decision attribute, including Scan, Dos, U2R, R2L, Misc, UE six categories;
[0042] (1.2) Sample space classification: Divide the sample space into six categories according to Scan, Dos, U2R, R2L, Misc, and UE, and record them as decision attribute classes D j (j=1, 2, 3, 4, 5, 6);
[0043] (1.3) Interval construction: according to the condition attribute value C i (i=1, 2, 3, 4, 5), with C i1 As an example, for each class D...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


