Method and device for log correlation analysis
A correlation analysis and log technology, applied in computer security devices, special data processing applications, instruments, etc., can solve problems such as increasing I/O load, and achieve the effect of reducing quantity, improving efficiency, and improving mining efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] Hereinafter, the principle of the present invention will be described with reference to the embodiments. It should be understood that the given examples are only for those skilled in the art to better understand and practice the present invention, rather than limiting the scope of the present invention. Therefore, implementation details contained in this specification should not be construed as limitations on the scope of the invention or of what may be claimed, but rather as descriptions specific to the embodiments.
[0017] figure 1 is a schematic diagram of a method for log correlation analysis according to an embodiment of the present invention. This embodiment attempts to find the maximum frequent itemsets. The obtained maximum frequent itemsets can be used to correlate items in log records with specific events, and detect system intrusions dynamically. Such as figure 1 As shown, the steps of the method are described below.
[0018] In step 110, a bit vector f...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com