CN112765603B - 一种结合系统日志与起源图的异常溯源方法 - Google Patents
一种结合系统日志与起源图的异常溯源方法 Download PDFInfo
- Publication number
- CN112765603B CN112765603B CN202110122056.4A CN202110122056A CN112765603B CN 112765603 B CN112765603 B CN 112765603B CN 202110122056 A CN202110122056 A CN 202110122056A CN 112765603 B CN112765603 B CN 112765603B
- Authority
- CN
- China
- Prior art keywords
- log
- logs
- grained
- graph
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/33—Querying
- G06F16/3331—Query processing
- G06F16/334—Query execution
- G06F16/3344—Query execution using natural language analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/35—Clustering; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/20—Natural language analysis
- G06F40/279—Recognition of textual entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/044—Recurrent networks, e.g. Hopfield networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/045—Combinations of networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
- G06N3/088—Non-supervised learning, e.g. competitive learning
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Artificial Intelligence (AREA)
- Software Systems (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Molecular Biology (AREA)
- Evolutionary Computation (AREA)
- Biophysics (AREA)
- Mathematical Physics (AREA)
- Biomedical Technology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computer Hardware Design (AREA)
- Debugging And Monitoring (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
Claims (7)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110122056.4A CN112765603B (zh) | 2021-01-28 | 2021-01-28 | 一种结合系统日志与起源图的异常溯源方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110122056.4A CN112765603B (zh) | 2021-01-28 | 2021-01-28 | 一种结合系统日志与起源图的异常溯源方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112765603A CN112765603A (zh) | 2021-05-07 |
CN112765603B true CN112765603B (zh) | 2022-04-05 |
Family
ID=75706561
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110122056.4A Active CN112765603B (zh) | 2021-01-28 | 2021-01-28 | 一种结合系统日志与起源图的异常溯源方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112765603B (zh) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113890821B (zh) * | 2021-09-24 | 2023-11-17 | 绿盟科技集团股份有限公司 | 一种日志关联的方法、装置及电子设备 |
CN114584379B (zh) * | 2022-03-07 | 2023-05-30 | 四川大学 | 基于优化特征提取粒度的日志异常检测方法 |
CN115185525B (zh) * | 2022-05-17 | 2023-07-18 | 贝壳找房(北京)科技有限公司 | 数据倾斜代码块定位方法、装置、设备及介质 |
CN115296832B (zh) * | 2022-06-06 | 2024-01-26 | 清华大学 | 应用服务端的攻击溯源方法及装置 |
CN115065556B (zh) * | 2022-07-28 | 2022-11-22 | 国网浙江省电力有限公司 | 一种基于图对比学习的日志恶意行为检测方法及系统 |
CN115146271B (zh) * | 2022-09-02 | 2022-11-25 | 浙江工业大学 | 一种基于因果分析的apt溯源研判方法 |
CN115333874B (zh) * | 2022-10-18 | 2023-04-28 | 北京珞安科技有限责任公司 | 一种工业终端主机监测方法 |
CN115543951B (zh) * | 2022-11-30 | 2023-04-07 | 浙江工业大学 | 一种基于起源图的日志采集、压缩、存储方法 |
CN115622802B (zh) * | 2022-12-02 | 2023-04-07 | 北京志翔科技股份有限公司 | 攻击溯源方法、装置、设备和存储介质 |
CN116074092B (zh) * | 2023-02-07 | 2024-02-20 | 电子科技大学 | 一种基于异构图注意力网络的攻击场景重构系统 |
CN116155626B (zh) * | 2023-04-20 | 2023-07-25 | 浙江工业大学 | 一种基于跨主机异常行为识别的复杂网络攻击检测方法 |
CN116881903B (zh) * | 2023-07-14 | 2024-02-06 | 暨南大学 | 一种面向溯源图入侵检测的恶意行为子图分级提取方法及系统 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104008053A (zh) * | 2014-05-28 | 2014-08-27 | 电子科技大学 | 一种用于漏洞发掘的动态符号执行路径搜索方法 |
CN106341426A (zh) * | 2016-11-11 | 2017-01-18 | 中国南方电网有限责任公司 | 一种防御apt攻击的方法及安全控制器 |
CN108712369A (zh) * | 2018-03-29 | 2018-10-26 | 中国工程物理研究院计算机应用研究所 | 一种工业控制网多属性约束访问控制决策系统和方法 |
CN112269316A (zh) * | 2020-10-28 | 2021-01-26 | 中国科学院信息工程研究所 | 一种基于图神经网络的高鲁棒性威胁狩猎系统与方法 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101286979B (zh) * | 2008-06-03 | 2011-02-09 | 电子科技大学 | 一种网络攻击检测方法 |
US10454940B2 (en) * | 2016-05-11 | 2019-10-22 | Oracle International Corporation | Identity cloud service authorization model |
CN107659543B (zh) * | 2016-07-26 | 2020-12-01 | 北京计算机技术及应用研究所 | 面向云平台apt攻击的防护方法 |
CN107103252A (zh) * | 2017-04-27 | 2017-08-29 | 电子科技大学 | 基于区块链的数据访问控制方法 |
CN107832619B (zh) * | 2017-10-10 | 2020-12-15 | 电子科技大学 | Android平台下应用程序漏洞自动化挖掘系统及方法 |
CN109861844B (zh) * | 2018-12-07 | 2021-09-03 | 中国人民大学 | 一种基于日志的云服务问题细粒度智能溯源方法 |
US11520877B2 (en) * | 2018-12-12 | 2022-12-06 | Raytheon Company | Resilient multi-variant execution verification |
CN110704874B (zh) * | 2019-09-27 | 2023-06-20 | 西北大学 | 一种基于数据溯源的隐私泄露防护方法 |
CN111523588B (zh) * | 2020-04-20 | 2022-04-29 | 电子科技大学 | 基于改进的lstm对apt攻击恶意软件流量进行分类的方法 |
CN112131249B (zh) * | 2020-09-28 | 2024-07-26 | 绿盟科技集团股份有限公司 | 一种攻击意图识别方法及装置 |
-
2021
- 2021-01-28 CN CN202110122056.4A patent/CN112765603B/zh active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104008053A (zh) * | 2014-05-28 | 2014-08-27 | 电子科技大学 | 一种用于漏洞发掘的动态符号执行路径搜索方法 |
CN106341426A (zh) * | 2016-11-11 | 2017-01-18 | 中国南方电网有限责任公司 | 一种防御apt攻击的方法及安全控制器 |
CN108712369A (zh) * | 2018-03-29 | 2018-10-26 | 中国工程物理研究院计算机应用研究所 | 一种工业控制网多属性约束访问控制决策系统和方法 |
CN112269316A (zh) * | 2020-10-28 | 2021-01-26 | 中国科学院信息工程研究所 | 一种基于图神经网络的高鲁棒性威胁狩猎系统与方法 |
Also Published As
Publication number | Publication date |
---|---|
CN112765603A (zh) | 2021-05-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112765603B (zh) | 一种结合系统日志与起源图的异常溯源方法 | |
Mahdavifar et al. | Application of deep learning to cybersecurity: A survey | |
Yadav et al. | A survey on log anomaly detection using deep learning | |
Zhang et al. | Log sequence anomaly detection based on local information extraction and globally sparse transformer model | |
Sahu et al. | Data processing and model selection for machine learning-based network intrusion detection | |
Yu et al. | Attention-based Bi-LSTM model for anomalous HTTP traffic detection | |
CN113194064B (zh) | 基于图卷积神经网络的webshell检测方法及装置 | |
CN113011889A (zh) | 账号异常识别方法、系统、装置、设备及介质 | |
CN117081858B (zh) | 一种基于多决策树入侵行为检测方法、系统、设备及介质 | |
Duan et al. | A Generative Adversarial Networks for Log Anomaly Detection. | |
Luo et al. | TINET: learning invariant networks via knowledge transfer | |
Li et al. | Large-scale malicious software classification with fuzzified features and boosted fuzzy random forest | |
Singh et al. | User behaviour based insider threat detection in critical infrastructures | |
CN115514558A (zh) | 一种入侵检测方法、装置、设备及介质 | |
Wang et al. | Intrusion detection using few-shot learning based on triplet graph convolutional network | |
CN117874662A (zh) | 基于图模式的微服务日志异常检测方法 | |
CN117938430A (zh) | 基于Bert模型的Webshell检测方法 | |
CN117170922A (zh) | 日志数据分析方法、装置、终端设备以及存储介质 | |
CN115567306B (zh) | 基于双向长短时记忆网络的apt攻击溯源分析方法 | |
Zhang et al. | Web log anomaly detection based on isolated forest algorithm | |
Qin et al. | ADSAD: An unsupervised attention-based discrete sequence anomaly detection framework for network security analysis | |
Bhanage et al. | Improving classification-based log analysis using vectorization techniques | |
Zhou et al. | A GMM-based anomaly IP detection model from security logs | |
Shao et al. | Low-latency Dimensional Expansion and Anomaly Detection empowered Secure IoT Network | |
CN114090850A (zh) | 日志分类方法、电子设备及计算机可读存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Niu Weina Inventor after: Yu Zhenqi Inventor after: Zhang Xiaosong Inventor after: Zhang Runzi Inventor after: Li Xinqiang Inventor after: Zhao Zhenfei Inventor before: Niu Weina Inventor before: Yu Zhenqi Inventor before: Zhang Xiaosong Inventor before: Zhang Zirun Inventor before: Li Xinqiang Inventor before: Zhao Zhenfei |
|
GR01 | Patent grant | ||
GR01 | Patent grant |