CN105808368B - A kind of method and system of the information security abnormality detection based on random probability distribution - Google Patents

A kind of method and system of the information security abnormality detection based on random probability distribution Download PDF

Info

Publication number
CN105808368B
CN105808368B CN201610145685.8A CN201610145685A CN105808368B CN 105808368 B CN105808368 B CN 105808368B CN 201610145685 A CN201610145685 A CN 201610145685A CN 105808368 B CN105808368 B CN 105808368B
Authority
CN
China
Prior art keywords
alarm
time
abnormality detection
distribution
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610145685.8A
Other languages
Chinese (zh)
Other versions
CN105808368A (en
Inventor
李木金
凌飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Liancheng Science And Technology Development Ltd By Share Ltd
Original Assignee
Nanjing Liancheng Science And Technology Development Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Liancheng Science And Technology Development Ltd By Share Ltd filed Critical Nanjing Liancheng Science And Technology Development Ltd By Share Ltd
Priority to CN201610145685.8A priority Critical patent/CN105808368B/en
Publication of CN105808368A publication Critical patent/CN105808368A/en
Application granted granted Critical
Publication of CN105808368B publication Critical patent/CN105808368B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0706Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
    • G06F11/0709Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a distributed system consisting of a plurality of standalone computer nodes, e.g. clusters, client-server systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information
    • G06F11/327Alarm or error message display

Abstract

The method and system for the information security abnormality detection based on random probability distribution that the invention discloses a kind of, comprising: Real-time Alarm module, history alarm module, offline abnormality detection modeling module, online abnormality detection module and knowledge base.Using the present invention, security attack event in magnanimity security alarm that be able to detect that isomery, that the dynamic and complicated IT enterprises network equipment generates, can trace to the source or play back event, it can be found that the root of failure or source, the fast quick-recovery business of IT enterprises can be helped, guarantees its normal operation.

Description

A kind of method and system of the information security abnormality detection based on random probability distribution
Technical field
The present invention relates to the magnanimity announcements that information security applied technical field, more particularly to SNMP, syslog etc. report Alert method for detecting abnormality and system.
Background technique
The English abbreviation for including in the present invention is as follows:
The simple Moving Average of SMA:Simple Moving Average
ACF:AutoCorrelation Function Autocorrelation function
Position absolute deviation in MAD:Median Absolute Deviation
LR:linear regression linear regression
OLS:ordinary least squares least square method
MA:moving average rolling average
WMA:weighted moving average weighted moving average
EWMA:exponential weighted moving average exponentially weighted moving average (EWMA)
AR:autoregressive autoregression
ARMA:auto regressive moving average auto regressive moving average
ARIMA:integrated ARMA integrates auto regressive moving average
CUSUM:Cumulative Sum Test accumulation and inspection
SOC:Security Operation Center security management center
IDS:Intrusion Detection Systems intruding detection system
SNMP:Simple Network Management Protocol Simple Network Management Protocol
HDFS:Hadoop Distribute File SystemHadoop distributed file system
MQ:Message Queue message queue
Safety in production is always the premise for ensureing work in every and orderly carrying out, and the rejection of examination leading cadres at various levels refers to Mark.Network and information security operation and maintenance system is the important component of all kinds of enterprise safety operation work.Logistics networks are efficiently steady Surely it runs, is the basis of all market management activities and normal operation of enterprise.
With the construction of all kinds of enterprise information systems and perfect, effectively improve labor productivity, reduce operation at This.Once each operation system of enterprise security incident occurs or breaks down or forming properties bottleneck, cannot find in time, in time Processing restores in time, certainly will directly result in the operation for being carried thereon all business, influence the normal operation order of enterprise, look forward to Industry business cannot normally carry out.Therefore, the safety guarantee implemented for government and the basis enterprise IT just seems increasingly important.
As government and IT application in enterprises degree are continuously improved.It is contacted between each operation system more and more closely, data exchange More and more frequently, each system has complex network or logical connection, and there are mass data exchanges or even a failure can trigger As enterprise's the whole network failure, a little or a kind of operation system starts a leak virus infection or under attack, other by involving rapidly Operation system and network even result in the paralysis of enterprise's the whole network.
Enterprise IT System produces a large amount of alarm, with the reduction of storage equipment cost, has no reason to abandon these numbers According to however, currently, can prevent from these mass alarms there are no corresponding method and its analysis tool or discovery is safe Attack, traces to the source or finds the root of failure;Can't help information safety engineer restore IT business as early as possible.
For this purpose, optimizing enterprise information security management how using information-based means raising enterprise security manager O&M benefit O&M service, information safety operation and maintenance management service that allow it to provide profession for all kinds of enterprises and high performance, becomes Especially the important topic solved is had in the design of information security management O&M.
Summary of the invention
The present invention mentions after the defect and deficiency for analyzing above-mentioned all kinds of enterprise information security management O&M service platforms A kind of method and system of information security abnormality detection based on random probability distribution are gone out.
Core of the invention thought is: building one method and system based on distribution for security exception detection.Institute Information security abnormality detection model can be established by alarm time sequence by stating method and system, and the model is with offline mode It establishes, and is safety on line abnormality detection system providing method guide.
Further, the method and system, including Real-time Alarm module, history alarm module, offline abnormality detection are built Mould module, online abnormality detection module, and knowledge base.
The Real-time Alarm module receives reported from various safety equipments by agreements such as SNMP, syslog in real time Alarm, and be sent respectively to history alarm module and the abnormal on-line checking model module based on distribution.
The history alarm module, can be used as the backup of alarm time sequence, or offline secure attack is abnormal It detects modeling module and alarm data is provided.
The offline abnormality detection modeling module to the alarm time Series Modeling, and provides the exception based on thresholding The guide of detection method, the method for detecting abnormality based on recurrence and the method for detecting abnormality based on random distribution.It is described to be based on back The method for detecting abnormality returned, by calculate in real time median m, interquartile-range IQR iqr, interval of events k, cycle T,WithSituation is come Decide whether to select the information security method for detecting abnormality based on distribution, and Real-time Feedback is to the exception inspection online based on distribution Survey module.
The online abnormality detection module detects to real-time online real-time announcement using the method based on random probability distribution The exception of alert module institute report and alarm time series, also, will test result and be reported to related display module or safety analysis teacher Further handle.
The knowledge base stores various statistical parameters, method for detecting abnormality and its application scenarios etc..
Preferably, the median m, interquartile-range IQR iqr, interval of events k, cycle T,WithSituation works as satisfaction, And k1,T!=0 HeWhen, then use the security exception detection method based on distribution.
The magnanimity security alarm that the present invention is generated for isomery and the dynamic IT enterprises network equipment, is able to detect that safety Event can be traced to the source or be played back to attack, it can be found that the root of failure or source, can help the fast quick-recovery industry of IT enterprises Business, guarantees its normal operation.
Detailed description of the invention
Fig. 1 is offline abnormality detection modeling module internal process schematic diagram of the present invention;
Fig. 2 is that a kind of actually detected alarm percentage of information security abnormality detection based on distribution of the present invention is real Apply example;
Fig. 3 be a kind of information security abnormality detection based on distribution of the present invention 3 kinds of alarms (wired wooden horse, Wifi wooden horse and external wooden horse) embodiment (alarm time sequence per hour);
Fig. 4 is that a kind of alarm statistics distribution box figure of information security abnormality detection based on distribution of the present invention is implemented Example;
Fig. 5 is a kind of statistical variance following Examples of the information security abnormality detection based on distribution of the present invention;
Fig. 6 is that a kind of 3 kinds of alarm Temporal dependencies of information security abnormality detection based on distribution of the present invention are implemented Example;
Fig. 7 is a kind of descriptive statistic stability signal of information security abnormality detection based on distribution of the present invention Figure;
Fig. 8 is a kind of index of stability value schematic diagram of the information security abnormality detection based on distribution of the present invention;
Fig. 9 is a kind of selection method for detecting abnormality signal of information security abnormality detection based on distribution of the present invention Figure;
Figure 10 is a kind of schematic diagram of the information security abnormality detection based on distribution of the present invention.
Specific embodiment
Here is with reference to the accompanying drawings with example to further description of the invention:
Fig. 1 is offline abnormality detection modeling module internal process schematic diagram of the present invention, comprising: 1. pre-processes and divides Group;2. time-based segmentation;3. descriptive statistic;4. descriptive statistical analysis;5. possible reconfigure.Double circles indicate Offline secure abnormality detection is output and input.Original input is the alarm from safety equipment (for example, firewall, invasion The equipment such as detection device and router).Final output is the algorithm guide for selecting security exception detection.Grey box is by dividing safely The parameter of teacher's input is analysed, different parameters can adapt to the purpose of different application scenarios and safety analysis.Application scenarios determine Alarm quantity (for example, 1 year alarm) needed for safety analysis, network topology (for example, node, subnet), number of nodes (because More for host and network equipment quantity, then alarm quantity is bigger).
It is described 1. to pre-process and be grouped, the topology of network and the mesh of safety analysis teacher are depended primarily on for how to be grouped , such as, it is only necessary to some subnet or certain one kind alarm are monitored.If alarm is generated by different safety equipments , then need to do security alarm attribute standardization and preliminary alarm correlation analysis.
Described 2. time-based segmentation is calculated alarm time sequence and is divided based on the time (for example, one day is divided into white It and at night).
3. the descriptive statistic, extracts the distribution of each alarm time sequence and the descriptive statistic of Temporal dependency. The distribution carrys out table by the dispersion (variance, quartile, coefficient of variation) of central tendency (mean value, median) and data Show.Furthermore it can also assess the stability of alarm distribution statistics.If alarm time sequence forms trend, has periodical, season Property can be predicted, then it shows Temporal dependency.Therefore, what Temporal dependency can be expressed as alarm time sequence can be pre- The property surveyed and/or periodicity.
4. the descriptive statistical analysis analyzes extracted descriptive statistic to infer the applicability of Outlier Detection Algorithm And validity.
It is described 5. possible to reconfigure, it is possible to safety analysis Shi Jianyi alarm time sequence to reconfigure, to build Found significantly more efficient security exception detection algorithm.For example, different time can be extracted if alarm quantity depends on the working time The descriptive statistic (for example, daytime, evening) of distribution.The thresholding of the abnormality detection of Temporal dependency can be determined at this time.
Further, 1. pretreatment and the grouping module, alarm received by the module can be any kind of Alarm, for example, original alarm, super alarm or member alarm that safety equipment reports.For without loss of generality, the present invention mainly examines Consider original alarm.
The pretreatment, i.e. warning information standardization, and eliminate and repeat alarm etc..Alarm packets pass through setting initial pool ParameterAnd it realizes.Different grouping method depends on the target of safety analysis teacher.Such as:
(1) alarm source: the source address of alarm;
(2) alarm type: either usual alarm type, is also possible to super alarm type.
(1) the alarm source, alarm source are also possible to external alarm either internal alarm.Internal alarm main presentation Behavior and user behavior at work, and external alarm mainly changes and noise.More fine-grained group of internal alarm Conjunction can the purpose based on network topology and safety analysis.For example, safety analysis teacher can be based on different network and firewall Strategy is grouped, such as different subnets, organization department and wired or wireless.
(2) the alarm type, different behaviors is disclosed based on different alarm types, otherwise, it is contemplated that the institute of a group There is alarm security exception will likely be interfered to detect.Such as, it is generally the case that a kind of alarm type produces a large amount of alarm, then Other types of alarm may be masked.
1. the output for pre-processing and being grouped, is exactly N number of alarm packets, i.e.,、…、.Such as consider certain enterprise The generated alarm over 5 months of industry IT network, can classify alarm according to the criterion of previous definition:
Alarm source: the alarm of wireline equipment, the alarm of wifi, external alarm;
Alarm type: wooden horse, etc..
Wired alarm and wifi alarm are why monitored respectively, be pc client and institute because of most of interior employees There is server all wire communication mode to be used to connect, and most interior employees for using laptop and smart phone (including guest) is all made of wireless communication mode connection.In addition, most of networks, the reason that wifi equipment is policy-limited makes Obtain certain PC(or notebook) Web and mail applications can only be accessed.For these reasons, security alarm analysis system it is expected Different historical behaviors can be obtained from alarm caused by wired alarm and wireless host.
The extraction of alarm type and the alarm quantity of each type are related.In Fig. 2, generated inhomogeneity is given The percentage (alarm less than 1%, ignore) of type alarm.See from Fig. 2, the alarm for producing 80% is wooden horse alarm class Type.This is the result is that believable, because the enterprise does not have the most of host equipments of direct monitoring.Fig. 1 is suitable for independently of institute There are alarm packets, and unrelated with alarm quantity.However, being highly useful for automatically analyzing for being grouped comprising mass alarm. Therefore, three most active alarm packets: wired wooden horse, wireless wooden horse, external wooden horse are mainly considered in next step.
Further, described 2. time-based segmentation, input are、…、;Also, extract descriptive statistic Three operating procedures: alarm time sequence calculates, the alarm sequence of invalidating label and time-based segmentation.
To each alarm packets, alarm time sequenceStatistics needs to input two parameters:
Time window w determines the alarm quantity that needs are analyzed;
(2) time granularity g assesses the minimum time unit of alarm (for example, alarm time daily, per hour, per minute Sequence).
Above-mentioned parameter is inputted by safety analysis teacher, according to scene and analysis target.For example, if which analysis target will find One day abnormal or alarm Situation Awareness, then time granularity be equally likely to one day (For daily alarm quantity), and the time Window w is 6 months or more.On the other hand, if whether analysis target is to assess daytime and be distributed at night with different alarms, Then time granularity is equally likely to one hour or less, and time window w is 1 month or more.In the scene of safety analysis, grain What degree g meticulous (for example, second) should avoid.
So, described 2. time-based segmentation, assessmentIt is whether active in time window w.The purpose master of this step If removing sluggish time series, this is because in order to further analyze.It is as inspection alarm time sequence No active criterion, if producing 50% or more alarm quantity in the time interval, such alarm be it is active, I.e. median ()> 0.Others such as filter the criterion and thresholding of inactive alarm sequence, depend on safety analysis target and Depending on the case where Enterprise IT System.
Calculating alarm time sequenceLater, if it be it is active, in input time combination parameterOn the basis of Further divide, whereinIt is defined as some time intervals (for example, daytime, evening), alarm time sequenceIt is divided For M subsequence, j ∈ { 1,2 ..., M }.On the other hand, if safety analysis teacher is not special for the timing behavior of alarm Expectation, then can be all alarm packetsDefine a kind of fine granularity time(for example, generally according to dividing per hour). This be for a fact, it is described 5. possible to reconfigure, can suggest that the possible coarseness time reconfigures automatically, with Analysis is in the extracted descriptive statistic of 3. descriptive statistic.
The output of described 2. time-based segmentation is exactly M subsequenceAnd sequence, i.e., for each alarm Grouping, export M+1 alarm sequence.
Now, then the example above is investigated, is primarily upon 3 most active alarm packets: wired wooden horse, wifi wood Horse, external wooden horse.The time window w of investigation is 5 months, and time granularity g is 1 hour.When this time granularity can investigate different Between section time behavior.Fig. 5 is the time series alerted in relation to wired wooden horse hourly, wifi wooden horse, external wooden horse.X Axis indicates time (hour), and Y-axis is the alarm quantity (0~800 alarm/hour) reported.Because these three are alerted The median of sequence be greater than zero (median () > 0, i=1,2,3), so they are active.From figure 3, it can be seen that wifi Wooden horse is the most active, and wired wooden horse takes second place, and external wooden horse alarm sequence is most weak.
Further, the 3. descriptive statistic, input areWith M subsequence.This module has extracted 3 groups of correlations Descriptive statistic, be related to random distribution, Temporal dependency and stability.
The random distribution, distribution characteristics have 2 underlying attributes: central tendency and discrete.For highly dynamic Application scenarios are investigated following statistics, and can intuitively be indicated by box figure.
(1) median m(, that is, median (m)), indicate the central tendency of data;
(2) quartile iqr indicates the dispersion for surrounding central tendency.
In order to indicate influence of the outlier to data dispersion, coefficient of variation is investigated, whereinWithIt is to accuse respectively The mean value and variance being distributed belonging to alert sequence.When for higher value, then it represents that the alarm sequence is discrete, and And/or there are exceptional values;However,When for smaller value, then it represents that be convergent distribution.
Furthermore for most active alarm sequence: wired wooden horse, WIFI wooden horse, external wooden horse consider ageing= Working time (daytime), working time (evening), festivals or holidays (daytime), festivals or holidays (evening) }, Fig. 4 gives ageing Box figure;Wherein, X-axis indicates time segmentation (daytime, evening), and Y-axis indicates the alarm quantity of every time quantum (for example, every The quantity for the alarm that hour reports).Each box figure gives following statistical attribute: lower quartile (q1), median (median), upper quartile (q3), interquartile-range IQR (iqr=q3-q1), lower antenna (=) and upper antenna=.It is allOn andUnder value, it is believed that be exceptional value.
Fig. 5 gives different ageingsCoefficient of variationThe value of coefficient.This statistics is for capturing data Variability is useful.
As can be seen from Figure 4, daytime on weekdays, most alarm are that wifi wooden horse generates.On the other hand, in festivals or holidays Daytime, wifi wooden horse alarm reduce, festivals or holidays night substantially without alarm.As can be seen from Figure 7, on weekdays white It, the variation coefficient of wifi wooden horse alarm is low, and this is high for other groups of composition and division in a proportion, this just illustrates that the alarm sequence exists and makes an uproar Sound, and/or there are certain exceptional values.
In all four ageings of Fig. 4 (a) and (d), the concentration that wired wooden horse alarm presents similar alarm becomes Gesture (m) and dispersion (iqr), and daytime on weekdays is somewhat high.However, on weekdays, either daytime, or evening On, there are higher exceptional values.These exceptional values are almost to be higher than an order of magnitude of central tendency;Also, it can from Fig. 5 Out, coefficient of variation is also higher value.
On the other hand, no matter external wooden horse is almost equal distribution on daytime or evening, and workaday daytime slightly has Point is low, this may be related with the attack from different time zone.The dispersion of external wooden horse alarm is low, also, sometimes Between in combination, coefficient of variation is close to 1.5.This suggests that external wooden horse alarm sequence independently of detection time, and can merge becomes One ageing (working time/festivals or holidays, daytime/evening are without difference).
The Time Dependent, descriptive statistic relevant to Temporal dependency are for the abnormality detection based on recurrence Useful.If an alarm sequence is there are if trend, periodicity and seasonality, it is shown as time dependence.Trend It is a general systematic component, for sufficiently long time range, a time series may display cycle property or season The mode of section property.
In order to extract the descriptive statistic of Temporal dependency, using the techniques of teime series analysis of filtering and auto-associating.Filter Wave energy enough reduces the noise of time series.It is useful trend and time that this noise, which may be concealed for model abnormality detection, Mode.In this case, using simple filtering technique;It is important to consider, because using more advanced filtering technique, It can change the property of data.Based on such reason, the present invention is used based on radius as the SMA of r hours center windows filtering. For clarity, it is assumed thatAs an alarm time sequence, andIt is the alarm quantity in t moment (for example, if the time Granularity g was equal to 1 day, thenIndicate the t days alarm quantities).SMA filtering generates new sequence SMA(t), wherein alarm sequence ColumnEach value quiltThe average value of 2r neighbours substituted, it may be assumed that
SMA(t)
Wherein,It is the alarm quantity in t moment, 2r+1 is the size of rolling average window.It is proposed that radius r The smothing filtering or radius r value that value is 1 are 5 gradual filtering.
After the filtering, following Autocorrelation function (ACF) is calculated:
Wherein,It is the time interval of auto-associating,It is alarm time sequence, E is mathematic expectaion operator,WithIt isMean value and variance.When auto correlation is higher value and slow decay, it means that future value is related to history value;Otherwise Very, i.e., when the auto-associating between two values goes to zero.If it, then a time series is considered It is predictable, and there is enough precision of predictions in k-th of window.Therefore, above-mentioned condition meets, the exception inspection based on recurrence Method of determining and calculating can be used effectively.
Different from the descriptive statistic of random distribution, Temporal dependency counts only from entire alarm time sequenceMiddle pumping It takes, this is because since Autocorrelation function needs the continuity of alarm time, for identifying predictability, trend and period Property.
In particular, the present invention is extracted following descriptive statistic about Temporal dependency:
(1) as predictable intervalValue;
Time seriesPrimary period(if any).
Wherein it is possible to have multiple periods (for example, 24 hours, 7 days), it can also be without the period (in this case,= 0).Furthermore, it is noted that in spite of to alarm sequenceFiltering is implemented, each statistics can be extracted.That is, There are 3 kinds of configurations (no SMA filtering, weak SMA filtering, strong SMA filtering), correspondingly extract 3 pairs of values (,).
Fig. 6 give wired wooden horse, WIFI wooden horse, external wooden horse ACF value.X-axis indicates time interval(hour), Y The value of axis ACF.Vertical dotted line expression is slided as unit of 24 hours, and horizontal dotted line indicates to alert with 0.3 for thresholding to determine Whether sequence can be predicted, and give without filtering,=1 HeThe result of=5 three kinds of configurations.
Fig. 4 (a) illustrates wired wooden horse alarm in one week 24 hour period, is slightly enhanced by SMA filtering, but still tieed up Hold (therefore, the period below 0.3 thresholding=0).Filtering slightly improves spacingPrediction, especially=5, still, the announcement Alert sequence still keeps weak rigidity.On the other hand, WIFI wooden horse alarm display strong 24 hour period, this be it will be apparent that even if Without using filtering.It means that the maximum probability for finding same each hour of value is every 24 hours.External wooden horse alarm The ACF of sequence illustrates a trend components, is reinforced by filtering, is reachedPrediction is higher than24 hours of=5 Value.
The stability of the descriptive statistics, each alarm time sequence, in order to show the descriptive statistic of its distribution Stability, consider median (median) and interquartile-range IQR.In invention, alarm time sequence will be analyzed by defining w conduct Time window.What is verified is that how distribution statistics develop in time window w.For this purpose, consider two ginsengs Number: the size (for example, 1 month) of sliding window S, time shift(for example, 1 week);Wherein,SW.By assigning these parameters difference Value, information security analysis teacher can assess descriptive statistic in the stability of different cycles.How determine abnormality detection parameter The information of the frequency reappraised is also useful.The present invention calculates median (median) and interquartile-range IQRValue, from when Between be spaced=[0, s] starts, then=[, s+], then=[2, s+2] etc., until covering entire time window w. This process is exactly descriptive statisticWith
Fig. 7 gives the descriptive statistic in relation to alarm data collection.X-axis indicates time shift, and Y-axis indicatesWith's It is worth (alarm quantity/hour).In this example, w=5 month, s=1 month,=1 week.For example, X=0, indicates 1st monthWith;X=1 indicates the 1st weekWith, etc..This make it possible to assess descriptive statistic on all bases how It develops.
It can be seen from figure 7 that it is then stable that the statistics on wired wooden horse daytime, which is unstable, in the initial period 's;On the other hand, WIFI wooden horse alerts steep increase at night almost without alarm, but on daytime.External wooden horse is in whole cycle It is always stable.
Here, the automatic verifying criterion whether stable about alarm distribution descriptive statistic is given.Assuming that d is descriptive Count (for example, iqr), also, descriptive statistic d be time shift t value (for example,5Value).In order to assess the steady of d It is qualitative, using a kind of dispersion measurement method of prevalence: middle position absolute deviation MAD.Particularly, for each descriptive statistic D passes through following formula computational stability index:
Wherein,Expression MAD, denominator m (d)=median (), this is the different scale for requiring to compare Descriptive statistic a normalization factor.It is lesser(almost nil) expression descriptive statistic d is stable, otherwise Very.Particularly, work as time seriesCentral tendency and dispersion when meeting following relationship, then be stable:
0
Wherein,It is stability thresholding, it can be adjusted by safety analysis teacher according to IT network environment situation.At this In invention application scenarios, for automatically identifying the stability and unstability of descriptive statistic, heuristically verify=0.2 is One sufficient thresholding.In above-mentioned formula, considerThe maximum value of stability index, because one descriptive The unstable of distribution can be considered enough by counting biggish difference.In fig. 8, wired wooden horse and wireless the wooden horse alarm on daytime It is unstable, and the stability index of other four distributions is less than thresholding.
Method for detecting abnormality based on distribution, alarm sequence can pass through parameter or nonparametric distribution modeling (Gauss (Gaussian) it is distributed,(Gamma) be distributed), also, anomalous event occur stochastic model low probability area or be distributed with Vary widely region.These algorithms only have ability when sequence relies on and be not suitable for the method based on recurrence when it be not present useful.Alarm It is that could be modeled by being distributed that sequence, which only keeps stabilization in central tendency and dispersion,.IfWithIt is all stable , then it can use the method for detecting abnormality based on distribution.Algorithm based on distribution can be parameter or nonparametric.
Parametric technology just thinks that when having the evidence or knowledge of some alarm sequence distributions be useful.For example, median It is stable, and concentrates on quartile region, then alarm sequence can be modeled by Gaussian Profile, although needing Further analysis, for example, Chi-square Test.Other common parameter distributions are γ distribution and Longtail distribution.More complicated Distribution can be approached by being distributed, for example, MoG(is approached by Gaussian Profile).
Imparametrization technology is just thought to be distributed alarm sequence just useful without priori knowledge.Common examples are based on histogram Technology and based on kernel function technology (for example, Parzen window estimate).
In addition, ifIt is unstable, andIt is stable, then, using median as descriptive statistic CUSUM-like method is effective to abnormality detection.
It is noted that external wooden horse (daytime, at night), wireless wooden horse (evening) and wired wooden horse (evening) alarm, Ke Yitong Distribution is crossed to model, and wireless wooden horse (daytime) constantly increases in terms of mean value and variance, such alarm sequence is by dividing Cloth to model increasingly complex.Wired wooden horse be in the initial period only it is unstable, it is then just stable always.That is, It is effective to wired wooden horse based on the method for distribution after the initial period is unstable.
The decision flow diagram, as shown in figure 9, the case where first step assesses convergence exponent: if alarm sequence is not to receive It holds back, still, does not also have Temporal dependency, then being also effective to abnormality detection based on the method for distribution.
Figure 10 is a kind of schematic diagram of the information security abnormality detection based on distribution of the present invention, including Real-time Alarm Module, history alarm module, offline abnormality detection modeling module, online abnormality detection module, and knowledge base.
The Real-time Alarm module receives reported from various safety equipments by agreements such as SNMP, syslog in real time Alarm, and be sent respectively to history alarm module and the abnormal on-line checking model module based on distribution.
The history alarm module, can be used as the backup of alarm time sequence, or offline secure attack is abnormal Detection model module provides alarm data.
The offline abnormality detection modeling module to the alarm time Series Modeling, and provides the exception based on thresholding The guide of detection method, the method for detecting abnormality based on recurrence and the method for detecting abnormality based on random distribution.It is described to be based on dividing The method for detecting abnormality of cloth, by calculate in real time median m, interquartile-range IQR iqr, interval of events k, cycle T,WithSituation is come Decide whether to select the information security method for detecting abnormality based on distribution.
The online abnormality detection module detects to real-time online Real-time Alarm module institute using the method based on distribution The exception of report and alarm time series, also, will test result and be reported to related display module or safety analysis's teacher work further Ground processing.
The knowledge base stores various statistical parameters, method for detecting abnormality and its application scenarios etc..
The foregoing is merely presently preferred embodiments of the present invention, practical range not for the purpose of limiting the invention;It is all according to this Equivalence changes made by inventing and modification, are considered as the scope of the patents of the invention and are covered.

Claims (1)

1. a kind of method of the information security abnormality detection based on random probability distribution, which is characterized in that the method, including such as Lower Main Stage:
(1) it pre-processes and is grouped;
(2) time-based segmentation;
(3) descriptive statistic;
(4) descriptive statistical analysis;
(5) possible to reconfigure;
The pretreatment and grouping, receive the input of various types alarm, and are pre-processed and be grouped;
The time-based segmentation is calculated alarm time sequence and is divided based on the time;
The distribution of each alarm time sequence and the descriptive statistic of Temporal dependency are extracted in the descriptive statistic;
The descriptive statistical analysis, analyze extracted descriptive statistic infer Outlier Detection Algorithm applicability and effectively Property, output safety method for detecting abnormality guide;
It is described possible to reconfigure, it is proposed that alarm time sequence is possible to be reconfigured, different to establish significantly more efficient safety Normal detection algorithm.
CN201610145685.8A 2016-03-15 2016-03-15 A kind of method and system of the information security abnormality detection based on random probability distribution Active CN105808368B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610145685.8A CN105808368B (en) 2016-03-15 2016-03-15 A kind of method and system of the information security abnormality detection based on random probability distribution

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610145685.8A CN105808368B (en) 2016-03-15 2016-03-15 A kind of method and system of the information security abnormality detection based on random probability distribution

Publications (2)

Publication Number Publication Date
CN105808368A CN105808368A (en) 2016-07-27
CN105808368B true CN105808368B (en) 2019-04-30

Family

ID=56468365

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610145685.8A Active CN105808368B (en) 2016-03-15 2016-03-15 A kind of method and system of the information security abnormality detection based on random probability distribution

Country Status (1)

Country Link
CN (1) CN105808368B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107239388A (en) * 2017-05-27 2017-10-10 郑州云海信息技术有限公司 A kind of monitoring alarm method and system
CN107451040B (en) * 2017-07-07 2020-12-01 深信服科技股份有限公司 Method and device for positioning fault reason and computer readable storage medium
CN110728290B (en) * 2018-07-17 2020-07-31 阿里巴巴集团控股有限公司 Method and device for detecting security of data model
CN111245538B (en) * 2018-11-29 2021-11-09 华为技术有限公司 Link quality detection method and related equipment
CN110751371B (en) * 2019-09-20 2022-06-07 苏宁云计算有限公司 Commodity inventory risk early warning method and system based on statistical four-bit distance and computer readable storage medium
CN117113260B (en) * 2023-10-19 2024-01-30 深圳市磐锋精密技术有限公司 Intelligent laminating equipment fault early warning system based on data analysis

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014031A (en) * 2010-12-31 2011-04-13 湖南神州祥网科技有限公司 Method and system for network flow anomaly detection
CN104113872A (en) * 2013-04-22 2014-10-22 中国移动通信集团湖北有限公司 Method and system for data service monitoring
CN104915846A (en) * 2015-06-18 2015-09-16 北京京东尚科信息技术有限公司 Electronic commerce time sequence data anomaly detection method and system
CN105071985A (en) * 2015-07-24 2015-11-18 四川大学 Server network behavior description method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8914317B2 (en) * 2012-06-28 2014-12-16 International Business Machines Corporation Detecting anomalies in real-time in multiple time series data with automated thresholding

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014031A (en) * 2010-12-31 2011-04-13 湖南神州祥网科技有限公司 Method and system for network flow anomaly detection
CN104113872A (en) * 2013-04-22 2014-10-22 中国移动通信集团湖北有限公司 Method and system for data service monitoring
CN104915846A (en) * 2015-06-18 2015-09-16 北京京东尚科信息技术有限公司 Electronic commerce time sequence data anomaly detection method and system
CN105071985A (en) * 2015-07-24 2015-11-18 四川大学 Server network behavior description method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
网络异常的检测与诊断方法;邹柏贤;《小型微型计算机系统》;20040430;第25卷(第4期);第506-510页

Also Published As

Publication number Publication date
CN105808368A (en) 2016-07-27

Similar Documents

Publication Publication Date Title
CN105808368B (en) A kind of method and system of the information security abnormality detection based on random probability distribution
CN105656693B (en) A kind of method and system of the information security abnormality detection based on recurrence
CN108292296B (en) Method for creating a time period profile of time series data using recurrent patterns
US10341430B1 (en) System and method for peer group detection, visualization and analysis in identity management artificial intelligence systems using cluster based analysis of network identity graphs
US10592308B2 (en) Aggregation based event identification
US10419268B2 (en) Automated scoring of unstructured events in information technology environments
EP3671466B1 (en) Unsupervised anomaly detection for arbitrary time series
US20160308725A1 (en) Integrated Community And Role Discovery In Enterprise Networks
US9712548B2 (en) Privileged analytics system
US11201865B2 (en) Change monitoring and detection for a cloud computing environment
Yang et al. A time efficient approach for detecting errors in big sensor data on cloud
CN111324639B (en) Data monitoring method, device and computer readable storage medium
US20140223555A1 (en) Method and system for improving security threats detection in communication networks
US10476752B2 (en) Blue print graphs for fusing of heterogeneous alerts
CN103441982A (en) Intrusion alarm analyzing method based on relative entropy
US11012289B2 (en) Reinforced machine learning tool for anomaly detection
US8661113B2 (en) Cross-cutting detection of event patterns
CN109597746A (en) fault analysis method and device
US20160162348A1 (en) Automated detection of a system anomaly
DE112020004572T5 (en) IDENTIFICATION OF PARTIAL EVENTS IN AN EVENT STORM IN OPERATIONS MANAGEMENT
CN114531338A (en) Monitoring alarm and tracing method and system based on call chain data
CN104852810A (en) Method and equipment for determining abnormity of business platform
Browning Entropy-Based Anomaly Detection for SAP z/OS Systems
CN115632855A (en) Network intrusion detection system, method, equipment and storage medium
CN113992496A (en) Abnormal operation warning method and device based on quartile algorithm and computing equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: A small road in Yuhuatai District of Nanjing City, Jiangsu province 210012 Building No. 158 Building 1 new ideal

Applicant after: Nanjing Liancheng science and technology development Limited by Share Ltd

Address before: A small road in Yuhuatai District of Nanjing City, Jiangsu province 210012 Building No. 158 Building 1 new ideal

Applicant before: NANJING LIANCHENG TECHNOLOGY DEVELOPMENT CO., LTD.

CB02 Change of applicant information
CB02 Change of applicant information

Address after: 210000, Nanjing high tech Zone, Jiangsu, Nanjing Software Park, No. 99 unity Road, Eagle building, block A, 14 floor

Applicant after: Nanjing Liancheng science and technology development Limited by Share Ltd

Address before: A small road in Yuhuatai District of Nanjing City, Jiangsu province 210012 Building No. 158 Building 1 new ideal

Applicant before: Nanjing Liancheng science and technology development Limited by Share Ltd

CB02 Change of applicant information
CB02 Change of applicant information

Address after: 210000 14F, building A, Eagle building, 99 solidarity Road, Nanjing Software Park, Nanjing hi tech Zone, Jiangsu

Applicant after: Nanjing Liancheng science and technology development Limited by Share Ltd

Address before: 210000, Nanjing high tech Zone, Jiangsu, Nanjing Software Park, No. 99 unity Road, Eagle building, block A, 14 floor

Applicant before: Nanjing Liancheng science and technology development Limited by Share Ltd

GR01 Patent grant
GR01 Patent grant