CN112925805B - Big data intelligent analysis application method based on network security - Google Patents

Big data intelligent analysis application method based on network security

Info

Publication number
CN112925805B
CN112925805B CN202110401931.2A CN202110401931A CN112925805B CN 112925805 B CN112925805 B CN 112925805B CN 202110401931 A CN202110401931 A CN 202110401931A CN 112925805 B CN112925805 B CN 112925805B
Authority
CN
China
Prior art keywords
data
analysis
network
security
establishing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110401931.2A
Other languages
Chinese (zh)
Other versions
CN112925805A (en
Inventor
战文宗
尹家波
李勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Guoxin'an Network Technology Co ltd
Original Assignee
Jiangsu Guoxin'an Network Technology Co ltd
Filing date
Publication date
Application filed by Jiangsu Guoxin'an Network Technology Co ltd filed Critical Jiangsu Guoxin'an Network Technology Co ltd
Priority to CN202110401931.2A priority Critical patent/CN112925805B/en
Publication of CN112925805A publication Critical patent/CN112925805A/en
Application granted granted Critical
Publication of CN112925805B publication Critical patent/CN112925805B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a big data intelligent analysis application method based on network security, which comprises the following steps: acquiring and preprocessing network data, storing the network data and forming a distributed storage management system; establishing a mathematical model library according to the network data to complete the definition of a data structure; providing an entry for data mining analysis, establishing a corresponding model according to algorithm parameters, and generating an analysis result. The invention can be based on security big data, and all-weather all-round network security situation sensing is realized; by utilizing the existing real-time monitoring technology, abnormal behaviors are found through long-time data analysis; establishing visual analysis capability through data modeling, rapidly studying and judging the influence range, attack path, purpose and means of threat, and making effective security decision and response; and establishing a risk notification and threat early warning mechanism, comprehensively grasping information such as the purpose, technical tactics, attack tools and the like of an attacker, and perfecting a defense system.

Description

Big data intelligent analysis application method based on network security
Technical Field
The invention relates to the technical field of network security, in particular to a big data intelligent analysis application method based on network security.
Background
Currently, network security technologies generally detect persistent threats of all suspicious network activities through big data analysis and detection of known network threats and attack behaviors, namely through technologies of analyzing network traffic, threat data, behaviors and the like, so as to protect.
However, although the technology can synchronously perform network detection and file detection, the technology lacks the capabilities of data acquisition, analysis and prediction, early warning of research and judgment, solution and the like of unknown threats.
Disclosure of Invention
The invention aims to provide a big data intelligent analysis application method based on network security, which can effectively monitor various network threats.
In order to achieve the above purpose, the present invention provides a big data intelligent analysis application method based on network security, which is characterized in that the application method comprises: acquiring and preprocessing network data, storing the network data and forming a distributed storage management system; establishing a mathematical model library according to the network data to complete the definition of a data structure; providing an entry for data mining analysis, establishing a corresponding model according to algorithm parameters, and generating an analysis result.
Preferably, the step of "acquiring and preprocessing network data, storing the network data and forming a distributed storage management system" includes: and capturing network data through the threat information feature library, carrying out data aggregation, and carrying out unified preprocessing on the network data according to the big data distributed computing characteristics and the algorithm characteristics to form a unified distributed storage management system.
Preferably, the "uniformly preprocessing the network data according to the big data distributed computing characteristic and the algorithm characteristic" includes: the method comprises the steps of carrying out hierarchical aggregation, reorganization, cleaning, extraction, conversion, management, slicing and other pretreatment operations on network data by utilizing data slicing, data classification and data aggregation, and utilizing a data index marking technology.
Preferably, the step of "establishing a mathematical model library according to the network data, and completing the definition of the data structure" includes: and carrying out intelligent analysis, mining and exploration on the network data, establishing a mathematical model library, realizing data structure definition of a big data format, and carrying out unified management on algorithm parameters, the mathematical model library, a model evaluation system and mining analysis results.
Preferably, the step of "establishing a mathematical model library according to the network data, and completing the definition of the data structure" includes: an event understanding engine is established, the integrated security log is subjected to association analysis based on event understanding rules, the security log is understood as a security event, and the alarm accuracy is improved; abstract analysis model, and implement the analysis model in Spark-streaming.
Preferably, the step of "establishing a mathematical model library according to the network data, and completing the definition of the data structure" includes: and establishing an attack chain analysis model, generating network security events by analyzing the security logs and the flow security logs collected by each network security device, and carrying out forward and backward reasoning, forward reasoning and early warning potential threat and backward reasoning and restoring attack scenes.
Preferably, the method further comprises: the attack chain mining program aggregates all security events according to the dimension of the destination asset on the basis of network security events and corresponds to all stages of an attack chain so as to discover vulnerable hosts in the current network.
Preferably, the step of "establishing a mathematical model library according to the network data, and completing the definition of the data structure" includes: establishing an information association model, and realizing potential threat alarm through association analysis of cloud information and local events; wherein the potential threats include malicious IP, malicious URL.
Preferably, the step of "establishing a mathematical model library according to the network data, and completing the definition of the data structure" includes: when the security log passes through the analysis engine, the security log is matched with a knowledge base, the security log is labeled to generate a security event, and the event is uploaded to cloud information for information verification, so that analysis accuracy is improved.
Preferably, the step of "establishing a mathematical model library according to the network data, and completing the definition of the data structure" includes: establishing a risk assessment model, carrying out risk assessment on external threats and asset vulnerabilities in combination with asset values, obtaining risk scores through the risk assessment, generating a decision of a treatment mode based on the risk scores, and carrying out vulnerability repair and threat blocking.
Compared with the prior art, the intelligent analysis application method for the big data based on the network security can be used for sensing the network security situation in all weather and all directions based on the security big data; by utilizing the existing real-time monitoring technology, abnormal behaviors are found through long-time data analysis; establishing visual analysis capability through data modeling, rapidly studying and judging the influence range, attack path, purpose and means of threat, and making effective security decision and response; and establishing a risk notification and threat early warning mechanism, comprehensively grasping information such as the purpose, technical tactics, attack tools and the like of an attacker, and perfecting a defense system.
Drawings
Fig. 1 is a flow chart of a big data intelligent analysis application method based on network security according to an embodiment of the present invention;
Fig. 2 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
Detailed Description
For a further understanding of the objects, construction, features and functions of the invention, reference should be made to the following detailed description of the preferred embodiments.
Certain terms are used throughout the description and claims to refer to particular components. It will be appreciated by those of ordinary skill in the art that manufacturers may refer to a component by different names. The description and claims do not take the form of an element differentiated by name, but rather by functional differences. In the following description and in the claims, the terms "include" and "comprise" are used in an open-ended fashion, and thus should be interpreted to mean "include, but not limited to.
Referring to fig. 1, fig. 1 is a flow chart of a network security-based intelligent analysis application method according to an embodiment of the present invention.
As shown in FIG. 1, the big data intelligent analysis application method provided by the application comprises the following steps:
step S100, acquiring and preprocessing network data, storing the network data and forming a distributed storage management system;
Step S200, a mathematical model library is established according to the network data, and data structure definition is completed;
Step S300, providing an entry for data mining analysis, establishing a corresponding model according to algorithm parameters, and generating an analysis result.
In the specific implementation, the application is based on the comprehensive application of data analysis, information research and judgment and monitoring and early warning of the network security situation, takes a security comparison module as a core, and comprises a data grabbing aggregation unit, an active analysis module, a storage unit module, a display unit module, a real-time monitoring module and a behavior auxiliary module;
In step S100, the threat information feature library is utilized to perform data capture and data aggregation, and the data is uniformly preprocessed according to the large data distributed computing characteristics and the algorithm characteristics to form a uniform distributed storage management system. And (3) carrying out rapid calculation and mining analysis on the data by using a distributed computing architecture, and constructing a corresponding service model and visual analysis based on the collected big data so as to discover and reveal hidden elements and associations. The data acquisition mode is mainly implemented by a syslog and flow technology, for a large number of multi-source heterogeneous data sources, a front probe is adopted, the data are collected in a centralized mode, normalized and the like, the data are integrated and then are uniformly transmitted to a big data application system, and the application system carries out association analysis according to the correlation among security events to obtain more accurate monitoring information and discover attack sources.
The large data preprocessing utilizes data slicing, data classification, data aggregation, data index marking technology to perform hierarchical preprocessing operations such as aggregation, recombination, cleaning, extraction, conversion, management, cutting and dividing on original data, unifies standard interfaces and unified data standards, and realizes safe, reliable, quick and effective unified storage management on multiple types and multiple formats of data on the basis of meeting consistency requirements through a distributed storage management technology.
In step S200, the active analysis module performs intelligent analysis, mining and exploration on the big data. And establishing a mathematical model library to realize data structure definition of a big data format, uniformly managing algorithm parameters, the mathematical model library, a model evaluation system and results of mining analysis, providing an entry for data mining analysis, and automatically calling an algorithm used for mining analysis and a corresponding model thereof according to the input algorithm parameters.
In step S300, an event understanding engine is established, and the log after merging is subjected to association analysis based on a certain event understanding rule, so that the log is understood as a security event, and the alarm accuracy is improved; abstract analysis model, and implement the analysis model in Spark-streaming, thereby completing the intelligent analysis scheme from the past security service analysis to the present big data.
Further, an attack chain analysis model is established, network security events are generated by analyzing security logs and flow logs collected by each network security device, forward and backward reasoning is carried out, potential threats are early-warned by forward reasoning, and attack scenes are restored by backward reasoning. The attack chain mining program aggregates all security events according to the dimension of the destination asset on the basis of network security events and corresponds to all stages of an attack chain so as to discover vulnerable hosts in the current network. The current security situation of the whole network is convenient to know, and fragile assets are reinforced.
Further, an information association model is established, and potential threat alarming is achieved through association analysis of cloud information and local events. When the security log passes through the analysis engine, the security log is matched with a knowledge base, a security event is generated by marking the log, the event is uploaded to cloud information for information verification, analysis accuracy is improved, in addition, malicious IP information in the cloud information is queried, other attack behaviors of the malicious IP are analyzed, and feedback is carried out, so that an early warning function is realized.
Further, a risk assessment model is established, external threats and asset vulnerabilities are combined with asset values to carry out risk assessment, risk scores are obtained through the risk assessment, decisions of treatment modes are generated based on the risk scores, vulnerability repair is carried out, and threat blocking is carried out.
The risk of the whole system is evaluated by the system, and for each asset, some security events initiated outside the system, such as intrusion events, abnormal flow events, stiff wood vermicular events and the like, are scored as threats; some vulnerabilities of the inside itself, such as system vulnerabilities, website security, etc., are scored. Finally, comprehensive analysis is carried out by combining the asset value, and the security score based on the asset group, the business domain and even the whole system is obtained.
Referring to fig. 2, fig. 2 is a schematic structural diagram of a preferred embodiment of a terminal device according to the present invention. The terminal device comprises a processor 301, a memory 302 and a computer program stored in the memory 302 and configured to be executed by the processor 301, wherein the processor 301 implements the network security based big data intelligent analysis application method according to any of the above embodiments when executing the computer program.
Preferably, the computer program may be divided into one or more modules/units (e.g. computer program 1, computer program 2, … …) stored in the memory 302 and executed by the processor 301 to complete the present invention. The one or more modules/units may be a series of computer program instruction segments capable of performing the specified functions, which instruction segments are used for describing the execution of the computer program in the terminal device.
The Processor 301 may be a central processing unit (Central Processing Unit, CPU), other general purpose Processor, digital signal Processor (DIGITAL SIGNAL Processor, DSP), application SPECIFIC INTEGRATED Circuit (ASIC), field-Programmable gate array (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic device, discrete gate or transistor logic device, discrete hardware components, etc., or the Processor 301 may be a microprocessor, or the Processor 301 may be any conventional Processor, the Processor 301 being a control center of the terminal device, connecting the various parts of the terminal device using various interfaces and lines.
The memory 302 mainly includes a program storage area, which may store an operating system, application programs required for at least one function, and the like, and a data storage area, which may store related data and the like. In addition, the memory 302 may be a high-speed random access memory, a nonvolatile memory such as a plug-in hard disk, a smart memory card (SMART MEDIA CARD, SMC), a Secure Digital (SD) card, a flash memory card (FLASH CARD), etc., or the memory 302 may be other volatile solid-state memory devices.
It should be noted that the above-mentioned terminal device may include, but is not limited to, a processor, a memory, and those skilled in the art will understand that the schematic structural diagram of fig. 2 is merely an example of the above-mentioned terminal device, and does not limit the above-mentioned terminal device, and may include more or fewer components than those shown, or may combine some components or different components.
The embodiment of the invention also provides a computer readable storage medium, which comprises a stored computer program, wherein when the computer program runs, the equipment where the computer readable storage medium is located is controlled to execute the big data intelligent analysis application method based on network security.
The embodiment of the invention provides a big data intelligent analysis application method based on network security, which can carry out clue mining according to the resources of various open platforms, integrate the resources through technologies such as data packet capturing, reverse analysis and the like, and search deep data through manual deep analysis.
It should be noted that the system embodiments described above are merely illustrative, and that the units described as separate units may or may not be physically separate, and that units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. In addition, in the system embodiment of the present invention, the connection relationship between the modules represents that there is a communication connection between them, and may be specifically implemented as one or more communication buses or signal lines.
In conclusion, the application can sense the network security situation in all weather and all directions based on the security big data; by utilizing the existing real-time monitoring technology, abnormal behaviors are found through long-time data analysis; establishing visual analysis capability through data modeling, rapidly studying and judging the influence range, attack path, purpose and means of threat, and making effective security decision and response; and establishing a risk notification and threat early warning mechanism, comprehensively grasping information such as the purpose, technical tactics, attack tools and the like of an attacker, and perfecting a defense system.
The invention has been described with respect to the above-described embodiments, however, the above-described embodiments are merely examples of practicing the invention. It should be noted that the disclosed embodiments do not limit the scope of the invention. On the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention.

Claims (4)

1. The intelligent big data analysis application method based on network security is characterized by comprising the following steps:
Acquiring and preprocessing network data, storing the network data and forming a distributed storage management system;
Establishing a mathematical model library according to the network data to complete the definition of a data structure;
Intelligent analysis, mining and exploration are carried out on the network data, a mathematical model library is established, data structure definition of a big data format is realized, and algorithm parameters, the mathematical model library, a model evaluation system and mining analysis results are uniformly managed;
An event understanding engine is established, the integrated security log is subjected to association analysis based on event understanding rules, the security log is understood as a security event, and the alarm accuracy is improved; abstracting an analysis model, and implementing codes of the analysis model in Spark-streaming;
Establishing an attack chain analysis model, generating network security events by analyzing the security logs and the flow security logs collected by each network security device, and carrying out forward and backward bidirectional reasoning, forward reasoning and early warning potential threat, and backward reasoning and restoring attack scenes;
The attack chain mining program aggregates all security events according to the dimension of the destination asset on the basis of network security events and corresponds to all stages of an attack chain, so that a fragile host in the current network is found;
Establishing an information association model, and realizing potential threat alarm through association analysis of cloud information and local events;
Wherein the potential threats include malicious IP, malicious URL;
When the safety log passes through the analysis engine, the safety log is matched with a knowledge base, the safety log is labeled to generate a safety event, and the event is uploaded to cloud information for information verification, so that analysis accuracy is improved;
providing an entry for data mining analysis, establishing a corresponding model according to algorithm parameters, and generating an analysis result.
2. The intelligent analysis application method for big data based on network security according to claim 1, wherein the step of acquiring and preprocessing network data, storing the network data and forming a distributed storage management system comprises:
and capturing network data through the threat information feature library, carrying out data aggregation, and carrying out unified preprocessing on the network data according to the big data distributed computing characteristics and the algorithm characteristics to form a unified distributed storage management system.
3. The intelligent analysis application method of big data based on network security according to claim 2, wherein the step of uniformly preprocessing the network data according to the big data distributed computing characteristic and the algorithm characteristic comprises the following steps:
the method comprises the steps of carrying out hierarchical aggregation, reorganization, cleaning, extraction, conversion, management, slicing and other pretreatment operations on network data by utilizing data slicing, data classification and data aggregation, and utilizing a data index marking technology.
4. The intelligent analysis application method of big data based on network security according to claim 1, wherein the step of establishing a mathematical model library based on the network data to complete the definition of the data structure comprises:
establishing a risk assessment model, carrying out risk assessment on external threats and asset vulnerabilities in combination with asset values, obtaining risk scores through the risk assessment, generating a decision of a treatment mode based on the risk scores, and carrying out vulnerability repair and threat blocking.
CN202110401931.2A 2021-04-14 Big data intelligent analysis application method based on network security Active CN112925805B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110401931.2A CN112925805B (en) 2021-04-14 Big data intelligent analysis application method based on network security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110401931.2A CN112925805B (en) 2021-04-14 Big data intelligent analysis application method based on network security

Publications (2)

Publication Number Publication Date
CN112925805A CN112925805A (en) 2021-06-08
CN112925805B true CN112925805B (en) 2024-07-09

Family

ID=

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107196910A (en) * 2017-04-18 2017-09-22 国网山东省电力公司电力科学研究院 Threat early warning monitoring system, method and the deployment framework analyzed based on big data
CN110334155A (en) * 2019-07-09 2019-10-15 佛山市伏宸区块链科技有限公司 A kind of block chain threat intelligence analysis method and system based on big data integration

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107196910A (en) * 2017-04-18 2017-09-22 国网山东省电力公司电力科学研究院 Threat early warning monitoring system, method and the deployment framework analyzed based on big data
CN110334155A (en) * 2019-07-09 2019-10-15 佛山市伏宸区块链科技有限公司 A kind of block chain threat intelligence analysis method and system based on big data integration

Similar Documents

Publication Publication Date Title
US9369484B1 (en) Dynamic security hardening of security critical functions
US9191398B2 (en) Method and system for alert classification in a computer network
CN110213226B (en) Network attack scene reconstruction method and system based on risk full-factor identification association
US10505986B1 (en) Sensor based rules for responding to malicious activity
EP3623983A1 (en) Method and device for identifying security threats, storage medium, processor and terminal
US20230087309A1 (en) Cyberattack identification in a network environment
CN114531283B (en) Method, system, storage medium and terminal for measuring robustness of intrusion detection model
Colbert et al. A process-oriented intrusion detection method for industrial control systems
CN117220961B (en) Intrusion detection method, device and storage medium based on association rule patterns
CN117478433A (en) Network and information security dynamic early warning system
CN112925805B (en) Big data intelligent analysis application method based on network security
CN116668054A (en) Security event collaborative monitoring and early warning method, system, equipment and medium
CN114006719B (en) AI verification method, device and system based on situation awareness
CN115987544A (en) Network security threat prediction method and system based on threat intelligence
CN115277472A (en) Network security risk early warning system and method for multidimensional industrial control system
Protic et al. WK-FNN design for detection of anomalies in the computer network traffic
CN110881016A (en) Network security threat assessment method and device
CN112925805A (en) Big data intelligent analysis application method based on network security
Song Public cloud network intrusion and internet legal supervision based on abnormal feature detection
Yu et al. Mining anomaly communication patterns for industrial control systems
Polozhentsev et al. Novel Cyber Incident Management System for 5G-based Critical Infrastructures
CN113032774A (en) Training method, device and equipment of anomaly detection model and computer storage medium
CN115085965B (en) Power system information network attack risk assessment method, device and equipment
CN117609990B (en) Self-adaptive safety protection method and device based on scene association analysis engine
CN112637142B (en) Security threat tracing method and system based on power network environment

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant