Unlock instant, AI-driven research and patent intelligence for your innovation.

Malicious behavior mining method and device

A behavioral and malicious technology, applied in the field of cloud computing, can solve problems such as inability to guarantee information security, difficulty in attack behavior, and inability to make full use of the high dimensionality and deep correlation of big data, so as to achieve accurate and fast judgment results

Active Publication Date: 2021-06-25
HUAZHONG NORMAL UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The above-mentioned methods are all based on traditional data mining techniques. In today's era of big data, the existing mining methods for malicious behaviors do not take into account the unobvious features, strong correlations, and dimensions of network attacks under the new situation. Due to its advanced characteristics, traditional mining algorithms for malicious behavior cannot be directly transplanted to the cloud computing big data model, which cannot make full use of the high-dimensional and deep correlation characteristics of big data, and cannot guarantee information security in the era of big data
In the context of big data, the scale and speed of network traffic are astonishing. In this case, it is difficult to capture and analyze the correlation of content in network data streams in a timely manner, and network attacks in network data streams are easily mixed into the system; In addition, due to the good latent characteristics of network attacks in the new situation, it is very difficult to dig out the attack behavior of potential platforms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious behavior mining method and device
  • Malicious behavior mining method and device
  • Malicious behavior mining method and device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0032] Please refer to figure 2 , the present embodiment provides a malicious behavior mining method, the method comprising:

[0033] Step S200: collecting multi-dimensional heterogeneous data;

[0034] In this embodiment, multi-dimensional heterogeneous data can be collected in real time from SDN, VMI, and entities, and the multi-dimensional heterogeneous data can include: network data, access logs, data in virtual machines, and system logs. The multi-dimensional heterogeneous data can be common network intrusion monitoring information, specifically from: log files of the system and network, data in the network, data in the virtual machine (through virtual machine self-examination technology), directory and file Unexpected behavior; unexpected behavior in program execution; physical form of intrusion information and data flow information within a certain period of time, etc.

[0035] The log files record various behavior types, and each type contains different information,...

no. 2 example

[0078] Please refer to Figure 9 , this embodiment provides a malicious behavior mining device 900, which includes:

[0079] The collection module 910 is configured to collect multi-dimensional heterogeneous data, wherein the multi-dimensional heterogeneous data includes: network data, access logs, data in virtual machines, and system logs;

[0080] The processing module 920 is configured to perform distributed real-time processing on the multi-dimensional heterogeneous data to generate a real-time data stream;

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a malicious behavior mining method and device, and relates to the technical field of cloud computing. The malicious behavior mining method includes: collecting multi-dimensional heterogeneous data; performing distributed real-time processing on the multi-dimensional heterogeneous data to generate a real-time data stream; based on a pre-established malicious behavior attack feature library, judging the real-time data stream Whether there is any malicious behavior in it; if not, standardize the real-time data flow to form a behavior data chain and input it into the database for mining. The present invention obtains the attack feature library by training the extracted data features in each dimension, can quickly judge whether it is malicious behavior data when processing real-time data, and can continuously update the feature library through these data, so that the model can be used in the judgment result. It is more accurate and can make complete and rapid judgments on a large amount of complex data more continuously.

Description

technical field [0001] The present invention relates to the technical field of cloud computing, in particular to a malicious behavior mining method and device. Background technique [0002] With the advent of the era of big data, the rapid development of other network trends such as mobile communication, cloud computing, and virtualization has brought new problems to traditional network information security, especially with the expansion of the scale of cloud computing platforms or data centers and The network traffic of the cloud platform is growing rapidly, and many malicious attacks (such as APT) are hidden in large-scale network traffic to attack or steal the cloud platform or the number of cores. Therefore, how to effectively detect malicious behaviors on the cloud platform and carry out effective protection, so as to ensure the security of confidential data on the platform, is a key issue that needs to be solved urgently in the field of information security. [0003] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F16/2458G06F16/28
CPCG06F21/552G06F21/554G06F16/2465G06F16/283
Inventor 张浩黄涛刘三女牙杨华利李永丹
Owner HUAZHONG NORMAL UNIV