Extraction and analysis method for heterogeneous security log information under complex network system

A complex network and analysis method technology, applied in the field of extraction and analysis of heterogeneous security log information, can solve the problems of high error probability of manual writing, poor adaptability of SYSLOG information, high project implementation cost, etc., to achieve high error probability and high implementation cost Effect

Inactive Publication Date: 2016-05-04
GUIZHOU POWER GRID INFORMATION & TELECOMM
View PDF3 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to provide a method for extracting and analyzing heterogeneous security log information in a complex network system, so as to solve the problem that the security log information extraction and analysis methods in the prior art are based on parsing t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Extraction and analysis method for heterogeneous security log information under complex network system
  • Extraction and analysis method for heterogeneous security log information under complex network system
  • Extraction and analysis method for heterogeneous security log information under complex network system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] A method for extracting and analyzing heterogeneous security log information under a complex network system, which includes:

[0038] Step A. Learning phase: Continuously collect heterogeneous security log data, use word segmentation tools to split the log data structure, define the content attributes of the field data at the specified location in the log according to regular matching, and dynamically construct the log information extraction decision tree. LIDT tree, the decision tree information is constantly updated with the addition of new log structures;

[0039] Step B. Cache stage: extract the decision tree information from the log information constructed by learning and cache it in the computer memory, the cache is updated in real time according to the dynamic learning process of the decision tree; it is stored in the hard disk in text form, and the stored information is updated periodically;

[0040] Step C. Parsing stage: Newly collect log data, extract the decision t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an extraction and analysis method for heterogeneous security log information under a complex network system. The method includes the steps of A, a learning stage; B, a caching stage; C, an analysis stage, wherein log data is newly acquired, a decision-making tree is extracted according to log data information for analysis, analysis is conducted layer by layer according to log submission addresses, log types and log position fields, and security log information data in a standard format is formed. The technical problems that in the prior art, an extraction and analysis mode for security log information is based on the analysis template technology, an analysis template needs to be manually compiled for each new log type, in this way, project implementation cost is high, the manual compiling error probability is high, and the adaptability to complex network environment SYSLOG information extraction is poor are solved.

Description

Technical field: [0001] The invention belongs to the technical field of information security, and particularly relates to a method for extracting and analyzing heterogeneous security log information under a complex network system. Background technique: [0002] The power system is an important infrastructure for the national economy and people’s lives. The safety of its network and application system is the guarantee of the safe operation of the power system and the reliable power supply to the society. It is directly related to the development of various industries in our country, the stability of the society and the lives of the people. Level. The main goal of power system security protection is to prevent key business information system data or information from being stolen or tampered with, to prevent malicious infiltration or monitoring of the network, to ensure that there are no grid accidents and large-scale power outages caused by information security, and to realize info...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30G06Q50/06
CPCG06F16/1815G06F16/116G06Q50/06H04L41/069
Inventor 王皓然罗念华龙玉江汪浩严彬元
Owner GUIZHOU POWER GRID INFORMATION & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products