Malicious behavior mining method and device
A behavioral and malicious technology, applied in the field of cloud computing, can solve problems such as inability to guarantee information security, difficulty in attack behavior, and inability to make full use of the high dimensionality and deep correlation of big data, so as to achieve accurate and fast judgment results
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0032] Please refer to figure 2 , the present embodiment provides a malicious behavior mining method, the method comprising:
[0033] Step S200: collecting multi-dimensional heterogeneous data;
[0034] In this embodiment, multi-dimensional heterogeneous data can be collected in real time from SDN, VMI, and entities, and the multi-dimensional heterogeneous data can include: network data, access logs, data in virtual machines, and system logs. The multi-dimensional heterogeneous data can be common network intrusion monitoring information, specifically from: log files of the system and network, data in the network, data in the virtual machine (through virtual machine self-examination technology), directory and file Unexpected behavior; unexpected behavior in program execution; physical form of intrusion information and data flow information within a certain period of time, etc.
[0035] The log files record various behavior types, and each type contains different information,...
no. 2 example
[0078] Please refer to Figure 9 , this embodiment provides a malicious behavior mining device 900, which includes:
[0079] The collection module 910 is configured to collect multi-dimensional heterogeneous data, wherein the multi-dimensional heterogeneous data includes: network data, access logs, data in virtual machines, and system logs;
[0080] The processing module 920 is configured to perform distributed real-time processing on the multi-dimensional heterogeneous data to generate a real-time data stream;
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


