Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Log stream anomaly detecting method and system

An anomaly detection and logging technology, applied in the field of network security, which can solve problems such as difficulty in dealing with new anomalies

Active Publication Date: 2017-09-12
SANGFOR TECH INC
View PDF11 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the field of network security, the existing technology analyzes various log streams to perform anomaly discovery and security detection to protect network security. Prior knowledge detection methods are difficult to cope with new anomalies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log stream anomaly detecting method and system
  • Log stream anomaly detecting method and system
  • Log stream anomaly detecting method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0047] see below figure 1 , figure 1 It is a flow chart of a method for log stream anomaly detection provided by the embodiment of the present application;

[0048] Specific steps can include:

[0049] Step S101: Use the detection model to perform anomaly detection on the log stream to be inspected, and judge whether there is anomaly in the log str...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a log stream anomaly detecting method. The method comprises the steps of utilizing a detecting model to perform anomaly detection on log stream to be detected and judging whether the log stream to be detected is abnormal or not according to detection results, wherein the detecting model is obtained by training an initial model according to training log stream and an anomaly detecting algorithm; if the log stream to be detected has anomaly, judging whether the anomaly is a known threat or not; if the anomaly is not the known threat, updating the detecting model according to received anomaly rechecking information. The method can recognize the anomaly in the log stream and autonomously learn the new anomaly, not only recognizes the known threat, but also can learn unknown events and improves safety of a network environment. The invention further discloses a log stream anomaly detecting system which also has the beneficial effects.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method and system for abnormal detection of log streams. Background technique [0002] Today, with the rapid development of science and technology, ensuring network security has become a prerequisite for the development of Internet technology. If there is a problem with network security, it will cause unimaginable blows to some enterprises. Therefore, network security has become the top priority of various Internet technologies. [0003] With the improvement of data processing and analysis capabilities, and the maturity of artificial intelligence technologies such as machine learning, technologies to solve network security problems emerge in an endless stream, but at the technical level, the principles of these technologies are basically the same. In the field of network security, the existing technology analyzes various log streams to perform anomaly discovery and security dete...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1425
Inventor 梁玉陈瑞钦王大伟古亮
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products