Key host event identification method based on information flow analysis
A key event and information flow technology, which is applied to computer components, character and pattern recognition, computer security devices, etc., can solve the problem of inability to record, copy, compress, dump, decompress, accurately capture information flow, and event chains. Accurately extract and other issues to achieve the effect of alleviating the problem of clue explosion, simplifying clues, and reducing analysis costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the purpose, features and advantages of the present invention more obvious and easy to understand, the technical core of the present invention will be further explained below in conjunction with the accompanying drawings and examples Detailed description.
[0030] This embodiment provides a key host event identification method based on information flow analysis, such as figure 1 The flow chart shown specifically includes the following steps:
[0031] Step 100: Use the ETW framework to collect kernel audit logs to capture host events, including process events and file events.
[0032]Step 200: Perform preprocessing on the host event, including filtering the host event according to the operation code, and performing a merge operation of the file event by using the event attribute. The event attribute is a description of the mu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


