A network attack event analysis method and device associated with alarm logs
An analysis method and network attack technology, applied in the field of network security incident analysis, can solve problems such as leakage of confidential documents within the company, leakage of company personnel information, etc., to facilitate timely processing and improve detection efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0089] figure 1 The flow block diagram of the network attack event analysis method associated with the alarm log provided by the first embodiment of the present invention, such as figure 1 In the embodiment of the present invention, an alarm log associated network attack event analysis method, including:
[0090] S1, get the original file of the log and preprocess the original file;
[0091] The original files of the acquisition log include:
[0092] 1) Through the core switch port mirroring technology, the acquisition of network traffic information in the information network is realized, and the PCAP file is generated; the PCAP is a packet capture library;
[0093] 2) The SYSLOG log for the collection of table tube systems, antivirus systems, IDS (Intrusion Detection Systems), WAF (WebApplication Firewall), Firewall, Attack Traceability System, Vulnerability Scanning Equipment, etc.
[0094] The original file pretreatment includes:
[0095] Applying a big data platform for pre-p...
Embodiment 2
[0130] figure 2 Structure of network attack event analysis device for the alarm log associated with the second embodiment of the present invention, such as figure 2 A analyzer of network attack event analysis methods associated with alarm log, including:
[0131] The pre-processing module is used to obtain the original file; and pretreate the original file;
[0132] Attack rule fingerprint setup module, used to make an abnormal judgment analysis of the original file after the pre-treatment; based on judgment analysis results, establish an attack rule fingerprint library, and then improve and update the attack rules fingerprint library;
[0133] Association module for associating the attack rules fingerprint library with the event of the alarm log; for summarizing, merging, merge, and forming alarm event libraries;
[0134] Response and processing module for event response and processing in accordance with the alarm event library.
[0135] Further, acquiring the original file in t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


