Equipment safety state comprehensive analysis method and computer readable storage medium

A security state, comprehensive analysis technology, applied in the computer field, can solve the problem of low accuracy of equipment abnormality detection, and achieve the effect of accurately detecting abnormal behavior and solving low accuracy rate

Active Publication Date: 2020-09-11
北京志翔科技股份有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The invention provides a method for comprehensive analysis of equipment security status and a computer-r

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment safety state comprehensive analysis method and computer readable storage medium
  • Equipment safety state comprehensive analysis method and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0021] Aiming at the problem of low accuracy of device abnormality detection in the prior art, the embodiments of the present invention perform abnormality detection on devices by acquiring comprehensive log data, so as to accurately detect abnormal behaviors, thereby effectively solving the problem of device abnormality detection in the prior art. The problem of low anomaly detection accuracy. The present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to illustrate the present invention, but not to limit the present invention.

[0022] The first embodiment of the present invention provides a method for comprehensive analysis of equipment security status, see figure 1 , on the tester side, the method includes:

[0023] S101. Obtain log data;

[0024] That is, obtain all log data of the device under test.

[0025] It should b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an equipment safety state comprehensive analysis method and a computer readable storage medium. The method comprises the following steps of acquiring comprehensive log data comprehensively; extracting features from the acquired log data; training and generating a detection model through an XGboost algorithm based on the extracted features; compared with the prior art, the invention has the advantages that the abnormal behaviors are detected through the detection model, namely, the abnormal detection is performed on the equipment based on the comprehensive log data, so that the abnormal behaviors are accurately detected, and the problem of low equipment abnormal detection accuracy in the prior art is effectively solved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method for comprehensive analysis of equipment security status and a computer-readable storage medium. Background technique [0002] In the prior art, the method for analyzing the information security status of computer equipment such as equipment is mainly: based on a certain type of log data, through keyword matching or rule matching to identify whether it is currently safe. For example, a firewall mainly detects the network connection log of the equipment. To determine whether there is an attack, the anti-virus software mainly detects the file operation log of the device to determine whether there is a virus and so on. [0003] That is to say, the existing method mainly uses a single log data to detect anomalies in equipment, and this security status analysis method based on the rule matching and keyword matching of a single type of log has many false positives and negativ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55H04L29/06G06K9/62
CPCG06F21/552H04L63/1425G06F18/2135G06F18/2148G06F18/24323
Inventor 巩国栋严朝豪薛野宋洋孙凯
Owner 北京志翔科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products