An event correlation alarm method and device
An event correlation and event technology, applied in the computer field, can solve problems such as low efficiency and achieve the effect of improving efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0062] refer to figure 1 , which shows a flow chart of an event-related alarm method in Embodiment 1 of the present invention, which may specifically include the following steps:
[0063] Step 101, receiving an event stream transmitted by a sliding time window, where the event stream is composed of multiple sub-events.
[0064] When hackers attack computer systems, a large number of events, namely information security events, will be generated. The event flow is a queue composed of a large number of events. Before the data flow processing engine receives the event flow and performs event correlation analysis on the event flow, a sliding time window is set, and the event flow is transmitted to the data flow processing engine through the sliding time window. Sliding time windows allow for control over flow data. In this embodiment of the application, each event has its own data size, and the sliding time window can determine how many data-sized events in the event stream enter...
Embodiment 2
[0095] refer to figure 2 , which shows a flow chart of an event-related alarm method in Embodiment 2 of the present invention, which may specifically include the following steps:
[0096] Step 201, creating and defining multiple attack scenarios for the data stream processing engine.
[0097] When creating multiple attack scenarios, different attack scenarios can be set according to actual experience, what kind of attack scenarios are set, and how many attack scenarios are set, which is not limited in the embodiment of the present invention. Reference attached Figure 5 , Figure a shows that multiple different attack scenarios are set in the data stream processing engine.
[0098] Step 202, based on the created multiple attack scenarios, create a plurality of attack modes in each attack scenario, wherein the preceding and subsequent attack modes in the multiple attack modes have a logical relationship, and the preceding and subsequent attack modes are connected in series th...
Embodiment 3
[0130] refer to image 3 , which shows a block flow diagram of an event-related alarm device according to Embodiment 3 of the present invention, which may specifically include the following modules:
[0131] The receiving module 301 is configured to receive the event flow transmitted by the sliding time window, the event flow is composed of multiple sub-events;
[0132] The event correlation analysis module 302 is configured to perform event correlation analysis on the event flow and each attack scenario by the data flow processing engine based on the acquired event flow, and determine the attack scenario of the event flow; the attack scenario includes multiple an attack mode;
[0133] An alarm module 303, configured to perform alarm processing based on the attack scenario;
[0134] Wherein, the event association analysis module 302 includes:
[0135] An attack pattern matching module 3021, configured to match the sub-events in the event flow with the attack pattern;
[01...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


