CN103401711A - Security log-based network state analysis system - Google Patents

Security log-based network state analysis system Download PDF

Info

Publication number
CN103401711A
CN103401711A CN201310327303XA CN201310327303A CN103401711A CN 103401711 A CN103401711 A CN 103401711A CN 201310327303X A CN201310327303X A CN 201310327303XA CN 201310327303 A CN201310327303 A CN 201310327303A CN 103401711 A CN103401711 A CN 103401711A
Authority
CN
China
Prior art keywords
security log
security
network
log
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310327303XA
Other languages
Chinese (zh)
Other versions
CN103401711B (en
Inventor
姜学峰
李威
李健俊
董惠良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Tobacco Zhejiang Industrial Co Ltd
Original Assignee
China Tobacco Zhejiang Industrial Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Tobacco Zhejiang Industrial Co Ltd filed Critical China Tobacco Zhejiang Industrial Co Ltd
Priority to CN201310327303.XA priority Critical patent/CN103401711B/en
Publication of CN103401711A publication Critical patent/CN103401711A/en
Application granted granted Critical
Publication of CN103401711B publication Critical patent/CN103401711B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention relates to a security log-based network state analysis system. The system comprises a security log management subsystem, an equipment asset management subsystem and a network performance and fault management subsystem. According to the security log-based network state analysis system, adjustment is performed according to different influences of different security logs on the network situation and with the attribute change of the equipment asset and the change of a network performance fault event. According to the system, analytical processing is performed on each security log to obtain the influence of each security log on the network, wherein the security log with the maximum influence value is an event which has the most serious influence on the network situation; thus a reliable basis is provided for an administrator to solve the network security problem.

Description

Network state analytical system based on security log
Technical field
The present invention relates to belong to areas of information technology, relate in particular to a kind of analytical system for network operation situation in Intranet.
Background technology
At present, monitoring and analysis for the main performance Network Based of the analysis of network operation state and fault, the major technique that adopts is snmp protocol, the network monitoring management system is obtained the operational factor of the network equipment and main frame by SNMP, by the analysis to operational factor, obtain performance and the failure condition of network, thereby realize the monitoring to network operation state.Development and application along with network security technology, increasing safety means in network, have been disposed, these safety means can produce a large amount of security logs or security incident, they have reflected the safe condition of the network operation, security status is the important indicator of network overall operation state, need to the person of being managed enforcement pay close attention to and monitoring.Present network management system only, for the analysis monitoring of network performance and fault, lacks analysis and monitoring to network security, can not reflect network in general ruuning situation.Simultaneously, although a lot of safety management systems are realized the management to security log or security incident, but often only realized the functions such as collection, storage, inquiry, statistics of security log record, lacked security log analysis mining function, can not reflect the impact of security log on network state.
Every security log has reflected security attack, potential safety hazard or the residing safe condition that certain equipment of network is suffered, shows certain local state information in network.It is different that identical security incident simultaneously occurs in the impact that produces on different equipment, need to the Different Effects of equipment availability, confidentiality, three aspects of integrality, analyze according to this event, for example, if the main security incident that confidentiality or the integrality of data are threatened occurs on switch, the harm that it causes is far smaller than the harm that occurs on server.Therefore to the analysis of security incident, not only need to analyze the seriousness of this security log, also need to analyze the main equipment that this security incident occurs, each security incident need to be navigated on the equipment that occurs, according to the attribute of equipment, analyze the impact of this event of ability Obtaining Accurate on network integral body.
Present existing network management system is only analyzed and monitoring for performance and the fault of the network equipment, main frame, and safety management system is only analyzed for security log and security incident, does not realize security log and device attribute are carried out to analysis-by-synthesis.The present invention utilizes security log, bonding apparatus attribute and network performance, failure monitoring, thus realize the analysis monitoring function to the network in general operation situation.
Summary of the invention
In order to solve above-mentioned technical problem, the purpose of this invention is to provide a kind of analytical system of Network Situation based on security log, it not only can carry out analyzing and processing to security log, the impact of the determined property security log of the main body that can also occur according to security log on Network Situation, and then overcome the defect of existing network management and supervisory control system.
In order to realize above-mentioned purpose, the present invention has adopted following technical scheme:
Based on this system of Network Situation analytical system of security log by security log ADMINISTRATION SUBSYSTEM, plant asset management subsystem and network performance and Fault management subsystem, wherein:
The security log ADMINISTRATION SUBSYSTEM comprises security log acquisition module, security log sort module and security log locating module; The security log acquisition module receives the security log that each safety means send over, and be stored in database, while is according to the attribute of security log, by the security log sort module, to the security log that the receives processing of classifying, security log is concluded in availability, confidentiality and integrality three major types; Then according to the IP address in security log, by the security log locating module, every security log is navigated to a concrete equipment;
The plant asset management subsystem comprises asset of equipments information management module and device security attribute management module, and the asset of equipments information management module manages each facility information in network, simultaneously the assets information table of service equipment; The assets information table will offer the security log ADMINISTRATION SUBSYSTEM and carry out the security log location; The device security attribute management module is according to availability, confidentiality and the integrality three aspects: attribute of device type and purposes define equipment, and the security attribute administration module of equipment is associated with the security classification module of security log;
Network performance and Fault management subsystem comprise performance monitoring module and fault alarm module, by the performance monitoring module, regularly obtain the performance data of the network equipment and main frame, according to the performance condition of each equipment of performance data analysis, produce performance event; The fault alarm module is further analyzed performance data, and, according to the failure condition of fault threshold values judgment device, produces event of failure; Performance event and event of failure will be analyzed security log for the security log ADMINISTRATION SUBSYSTEM and provide foundation to the influence value of Network Situation;
Above-mentioned system is carried out the Network Situation analysis by following method:
A: each safety product is set and sends security log to the Network Situation analytical system, automatically send to the Study on Trend system when safety product produces security log;
B: after system acquisition to a security log, this security log is carried out to analyzing and processing;
C: the security log that collects is classified from availability, confidentiality and three aspects of integrality according to its attribute, this security log is concluded to wherein a certain class;
D: this daily record spot main body is navigated on an equipment of a network domains according to the IP address of security log generation main body;
E: whether the classification that judges security log is consistent with the security attribute of daily record generation main equipment;
F: if the security attribute of the classification of security log and daily record generation main equipment is inconsistent, this security log factor of influence A is set to 0.5;
G: if the classification of security log is consistent with the security attribute of daily record generation main equipment, this security log factor of influence A is set to 1;
H: the performance and the event of failure that obtain this equipment according to the main equipment of security log generation;
I: whether judgment device generation performance and event of failure;
J: if equipment does not have generation performance and event of failure, this security log influence value B is set to 0;
K: if performance and event of failure have occurred equipment, this security log influence value B is set to 100;
L: according to security log factor of influence A and influence value B, calculate this security log and to the influence value of Network Situation be: A * B.
The present invention is according to the affect difference of different security logs on Network Situation, and along with the variation of the attribute change of asset of equipments and network performance event of failure and adjust.This system is all carried out analyzing and processing to every security log, draw the impact of every security log on network, wherein, the security log of influence value maximum is exactly that this provides reliable basis for the keeper solves network security problem on the most serious event of Network Situation impact.
The accompanying drawing explanation
Fig. 1 is the structural representation of Network Situation analytical system of the present invention.
Fig. 2 is Study on Trend flow chart of the present invention.
Embodiment
The present invention is Network Situation analytical system and the analytical method of a kind of use in field of network management.Below with specific embodiment, the present invention is made and illustrating.
As shown in Figure 1, Network Situation analytical system 1 of the present invention operates on the Linux server, and at first the security log ADMINISTRATION SUBSYSTEM 2 during security log is sent to analytical system is set in each safety product.Security log acquisition module 3 in security management subsystem receives the security log that each safety means send over, and be stored in database, while is according to the attribute of security log, by the processing of classifying of 4 pairs of security logs that receive of security log sort module, security log is concluded in availability, confidentiality and integrality three major types.Then according to the IP address in security log, by security log locating module 5, every security log is navigated to a concrete equipment.
The responsible network equipment of plant asset management subsystem 6 and the asset of equipments attribute of main frame, the management of device security attribute, by each facility information in 7 pairs of networks of asset of equipments information management module, manage, the function such as increase, deletion, modification, inquiry that comprises equipment, the assets information table of service equipment, comprise device name, type, IP address, purposes, belonging network etc. simultaneously.The assets information table will offer the security log ADMINISTRATION SUBSYSTEM and carry out the security log location.Device security attribute management module 8 is according to availability, confidentiality and the integrality three aspects: attribute of device type and purposes define equipment, and for example: the availability attributes value of switch is high, and confidentiality and integrity properties value are low; The confidentiality of file server and integrity properties value are high, and the availability attributes value is low.The security attribute of equipment is associated with the security classification of security log, if a security log is large to the availability impact of equipment, it occurs in again on switch simultaneously, and this daily record is 1 to the factor of influence of Network Situation; If this daily record occurs on file server, this daily record is 0.5 to the factor of influence of Network Situation.
Performance and the fault of network performance and 9 pairs of networks of Fault management subsystem are carried out monitoring analysis, by performance monitoring module 10, regularly obtain the performance data of the network equipment and main frame, according to the performance condition of each equipment of performance data analysis, produce performance event.By 11 pairs of performance datas of fault alarm module, be further analyzed simultaneously, and, according to the failure condition of fault threshold values judgment device, produce event of failure.Performance event and event of failure will be analyzed security log for the security log ADMINISTRATION SUBSYSTEM and provide foundation to the influence value of Network Situation.
As shown in Figure 2, be the analysis process figure of analytical system of the present invention.
After safety product invasion check system (IDS) produced a security log dos attack, this daily record was sent to the Network Situation analytical system.The journal receiver of Network Situation analytical system will collect this security log, step S1.Analytical system is classified to the attribute of this daily record of dos attack, and it is concluded to the event that affects equipment availability, step S2.System is from security log, extracting IP address ip a, and according to asset of equipments information, this security log navigated to the switch device A that the IP address is IPa, step S3.
The security attribute of the security attribute of checkout facility A and the security log of dos attack, step S4.Both security attributes are all availabilities, so security log factor of influence=1, step S6; Otherwise, security log factor of influence=0.5, step S5.Obtain performance and the event of failure of device A, step S7, check whether performance and event of failure exist, step S8.If device A also has performance and event of failure to occur when security log occurs, this security log is 100 to the influence value of equipment, step S10, otherwise influence value is 0, step S9.Finally, according to factor of influence and the influence value of this security log, calculate the influence value S=1*100=100 of security log to Network Situation, step S11.
The present invention by security log reach the device security attribute that impact on safety, security log occur, whether equipment and the network that security log occurs exists performance and event of failure three aspect factor to carry out the overall operation situation of analysis-by-synthesis network.

Claims (1)

1. based on the Network Situation analytical system of security log, it is characterized in that this system is by security log ADMINISTRATION SUBSYSTEM, plant asset management subsystem and network performance and Fault management subsystem, wherein:
The security log ADMINISTRATION SUBSYSTEM comprises security log acquisition module, security log sort module and security log locating module; The security log acquisition module receives the security log that each safety means send over, and be stored in database, while is according to the attribute of security log, by the security log sort module, to the security log that the receives processing of classifying, security log is concluded in availability, confidentiality and integrality three major types; Then according to the IP address in security log, by the security log locating module, every security log is navigated to a concrete equipment;
The plant asset management subsystem comprises asset of equipments information management module and device security attribute management module, and the asset of equipments information management module manages each facility information in network, simultaneously the assets information table of service equipment; The assets information table will offer the security log ADMINISTRATION SUBSYSTEM and carry out the security log location; The device security attribute management module is according to availability, confidentiality and the integrality three aspects: attribute of device type and purposes define equipment, and the security attribute administration module of equipment is associated with the security classification module of security log;
Network performance and Fault management subsystem comprise performance monitoring module and fault alarm module, by the performance monitoring module, regularly obtain the performance data of the network equipment and main frame, according to the performance condition of each equipment of performance data analysis, produce performance event; The fault alarm module is further analyzed performance data, and, according to the failure condition of fault threshold values judgment device, produces event of failure; Performance event and event of failure will be analyzed security log for the security log ADMINISTRATION SUBSYSTEM and provide foundation to the influence value of Network Situation;
Above-mentioned system is carried out the Network Situation analysis by following method:
A: each safety product is set and sends security log to the Network Situation analytical system, automatically send to the Study on Trend system when safety product produces security log;
B: after system acquisition to a security log, this security log is carried out to analyzing and processing;
C: the security log that collects is classified from availability, confidentiality and three aspects of integrality according to its attribute, this security log is concluded to wherein a certain class;
D: this daily record spot main body is navigated on an equipment of a network domains according to the IP address of security log generation main body;
E: whether the classification that judges security log is consistent with the security attribute of daily record generation main equipment;
F: if the security attribute of the classification of security log and daily record generation main equipment is inconsistent, this security log factor of influence A is set to 0.5;
G: if the classification of security log is consistent with the security attribute of daily record generation main equipment, this security log factor of influence A is set to 1;
H: the performance and the event of failure that obtain this equipment according to the main equipment of security log generation;
I: whether judgment device generation performance and event of failure;
J: if equipment does not have generation performance and event of failure, this security log influence value B is set to 0;
K: if performance and event of failure have occurred equipment, this security log influence value B is set to 100;
L: according to security log factor of influence A and influence value B, calculate this security log and to the influence value of Network Situation be: A * B.
CN201310327303.XA 2013-07-30 2013-07-30 Network state based on security log analyzes system Active CN103401711B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310327303.XA CN103401711B (en) 2013-07-30 2013-07-30 Network state based on security log analyzes system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310327303.XA CN103401711B (en) 2013-07-30 2013-07-30 Network state based on security log analyzes system

Publications (2)

Publication Number Publication Date
CN103401711A true CN103401711A (en) 2013-11-20
CN103401711B CN103401711B (en) 2016-11-02

Family

ID=49565242

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310327303.XA Active CN103401711B (en) 2013-07-30 2013-07-30 Network state based on security log analyzes system

Country Status (1)

Country Link
CN (1) CN103401711B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104598369A (en) * 2014-12-23 2015-05-06 北京畅游天下网络技术有限公司 Method and device for monitoring software in mobile device
CN112866044A (en) * 2019-11-27 2021-05-28 中盈优创资讯科技有限公司 Network equipment state information acquisition method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101436967A (en) * 2008-12-23 2009-05-20 北京邮电大学 Method and system for evaluating network safety situation
CN101741595A (en) * 2008-11-26 2010-06-16 华为技术有限公司 Method, device and system for appraisal of network reliability
CN103748999B (en) * 2010-06-09 2012-02-08 北京理工大学 A kind of network safety situation integrated estimation system
CN102624696A (en) * 2011-12-27 2012-08-01 中国航天科工集团第二研究院七〇六所 Network security situation evaluation method
CN103166794A (en) * 2013-02-22 2013-06-19 中国人民解放军91655部队 Information security management method with integration security control function

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101741595A (en) * 2008-11-26 2010-06-16 华为技术有限公司 Method, device and system for appraisal of network reliability
CN101436967A (en) * 2008-12-23 2009-05-20 北京邮电大学 Method and system for evaluating network safety situation
CN103748999B (en) * 2010-06-09 2012-02-08 北京理工大学 A kind of network safety situation integrated estimation system
CN102624696A (en) * 2011-12-27 2012-08-01 中国航天科工集团第二研究院七〇六所 Network security situation evaluation method
CN103166794A (en) * 2013-02-22 2013-06-19 中国人民解放军91655部队 Information security management method with integration security control function

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
D"AMBROSIO B等: "Security situation assessment and response evaluation(SSARE)", 《DARPA INFORMATION SURVIVABILITY CONF.&EXPOSITIONII》, 31 December 2001 (2001-12-31) *
陈秀真等: "网络化系统安全态势评估的研究", 《西安交通大学学报》, vol. 38, no. 4, 30 April 2004 (2004-04-30) *
韦勇: "网络安全态势评估模型研究", 《CNKI博士学位论文全文库》, 28 April 2009 (2009-04-28) *
韦勇;连一峰: "基于日志审计与性能修正算法的网络安全态势评估模型", 《计算机学报》, vol. 32, no. 4, 15 April 2009 (2009-04-15) *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104598369A (en) * 2014-12-23 2015-05-06 北京畅游天下网络技术有限公司 Method and device for monitoring software in mobile device
CN112866044A (en) * 2019-11-27 2021-05-28 中盈优创资讯科技有限公司 Network equipment state information acquisition method and device
CN112866044B (en) * 2019-11-27 2023-05-12 中盈优创资讯科技有限公司 Network equipment state information acquisition method and device

Also Published As

Publication number Publication date
CN103401711B (en) 2016-11-02

Similar Documents

Publication Publication Date Title
CN105407103B (en) A kind of Cyberthreat appraisal procedure based on more granularity abnormality detections
CN208227074U (en) Electric power monitoring system network security monitors terminal
CN101325520B (en) Method for locating and analyzing fault of intelligent self-adapting network based on log
CN106371986A (en) Log treatment operation and maintenance monitoring system
CN110175451A (en) A kind of method for safety monitoring and system based on electric power cloud
CN107229556A (en) Log Analysis System based on elastic components
CN104852927A (en) Safety comprehensive management system based on multi-source heterogeneous information
CN110300100A (en) The association analysis method and system of log audit
CN107295010A (en) A kind of enterprise network security management cloud service platform system and its implementation
CN108270716A (en) A kind of audit of information security method based on cloud computing
CN105812200A (en) Abnormal behavior detection method and device
CN108259202A (en) A kind of CA monitoring and pre-alarming methods and CA monitoring and warning systems
CN104574557A (en) Alarm-based site polling method, alarm-based site polling manipulation device and alarm-based site polling system
CN104574219A (en) System and method for monitoring and early warning of operation conditions of power grid service information system
CN103208049B (en) Abnormality alarming quick accident analysis method and system
CN107547228A (en) A kind of safe operation management platform based on big data realizes framework
CN109033813A (en) The auditing system and method for Linux operation log
CN106254125A (en) The method and system of security incident correlation analysiss based on big data
CN104219193A (en) Method and system for correlation analysis of security events
CN110618977B (en) Login anomaly detection method, device, storage medium and computer equipment
CN115378711A (en) Industrial control network intrusion detection method and system
CN116257021A (en) Intelligent network security situation monitoring and early warning platform for industrial control system
CN108833442A (en) A kind of distributed network security monitoring device and its method
CN109032904A (en) Monitored, management server and data acquisition, analysis method and management system
CN105739408A (en) Business monitoring method used for power scheduling system and business monitoring system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant