A network security event visualization method based on text processing

A network security and security event technology, applied in the field of network security event visualization based on text processing, can solve the problems of no internal correlation mechanism and principles of security events, and the lack of a complete set of processing solutions for network security events, etc., to achieve the model Strong innovation, strong applicability, and high classification accuracy

Active Publication Date: 2019-06-21
XIDIAN UNIV +1
View PDF2 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (1) There is no complete set of solutions for the handling of actual network security incidents, and only countermeasures are proposed for different aspects of different security incidents
[0007] (2) The research on network security incidents mainly focuses on the proposal of the response model, and does not further reveal the mechanism and principle of the internal correlation between security incidents, that is, the relationship between the temporal and spatial semantics of security incidents
[0008] (3) The main sources of security event data are concentrated in intrusion detection data and log data, and there is no analysis and research on the text data of network security events

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network security event visualization method based on text processing
  • A network security event visualization method based on text processing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, and the protection scope of the present invention can be more clearly defined.

[0034] see figure 1 , the embodiments of the present invention include:

[0035] A method for visualizing network security events based on text processing, comprising the following steps:

[0036] 1) Obtain actual network security incidents: By investigating well-known security information websites at home and abroad, certain security information websites with high reliability, strong professionalism and timely information update are identified. Using the Python-based Scrapy framework to obtain text information, and using selenium to simulate the browser environment to complete the information crawling of the website built by Ajax and the page ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security event visualization method based on text processing, and the method comprises the steps: 1) obtaining a plurality of network security events to generate an event set, and converting the event set into a structured feature vector; 2) carrying out classified labeling on each network security event; 3) annotating the segmented words in each network securityevent according to a set extraction target, and extracting security event contents of each network security event according to the annotations; 4) constructing a basic FP tree according to the security event content of each network security event, obtaining a conditional pattern base from the basic FP tree, and constructing a new conditional FP tree by using the conditional pattern base until thenew conditional FP tree only contains one element item to obtain an associated frequent set of the network security events; And 5) according to the correlation frequency set, determining the correlation degree of the corresponding network security events and the connection relationship between the network security events, and visualizing the event set.

Description

technical field [0001] The invention belongs to the technical field of network security, and further relates to a method for visualizing network security events based on text processing. The invention is mainly used to realize the establishment of the semantic correlation model of the security event, reveal the chain reaction mechanism of the security event, and lay the foundation for proposing the security event description frame and the measurement index system. The model can be applied to the timely processing and response of constantly updated network security events, and also has extremely positive significance for the analysis and prediction of the development trend of offensive and defensive technologies. Background technique [0002] The evaluation and measurement of network security refers to extracting elements related to network security in a certain time and space for analysis, comprehensively processing security data, determining the attack behavior of the syste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/35G06F16/951G06F16/958
Inventor 姬逸潇张玉清
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products