CN115801353A - Linkage script processing method after real-time aggregation of safety event logs based on big data level - Google Patents

Linkage script processing method after real-time aggregation of safety event logs based on big data level Download PDF

Info

Publication number
CN115801353A
CN115801353A CN202211367585.1A CN202211367585A CN115801353A CN 115801353 A CN115801353 A CN 115801353A CN 202211367585 A CN202211367585 A CN 202211367585A CN 115801353 A CN115801353 A CN 115801353A
Authority
CN
China
Prior art keywords
security event
script
log
event
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211367585.1A
Other languages
Chinese (zh)
Inventor
朱琪
周淼淼
方波
梁忠辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Smart Net Anyun Wuhan Information Technology Co ltd
Original Assignee
Smart Net Anyun Wuhan Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Smart Net Anyun Wuhan Information Technology Co ltd filed Critical Smart Net Anyun Wuhan Information Technology Co ltd
Priority to CN202211367585.1A priority Critical patent/CN115801353A/en
Publication of CN115801353A publication Critical patent/CN115801353A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a linkage script processing method after real-time aggregation of safety event logs based on a big data level, which comprises the following steps: accepting logs from kafka; judging whether the log conforms to the safety event rule, if so, entering a step S3; otherwise, not processing; performing attribute enhancement operation on the log to obtain an enhanced log; checking the occurrence time of the log and generating a unique ID of the security event; inserting the security event ID into a security event table of the kudu, and simultaneously forwarding the security event to a service theme corresponding to the kafka; and utilizing a script disposal program in the business theme to carry out safety event disposal. The invention has the advantages of greatly reducing the load of the security event log and script processing program on the storage layer and improving the real-time performance of the whole system.

Description

Linkage script processing method after real-time aggregation of safety event logs based on big data level
Technical Field
The invention relates to the field of computer data processing, in particular to a linkage script processing method after real-time aggregation of safety event logs based on a big data level.
Background
At present, in the prior art, if security events need to be generated by aggregation according to occurrence time, log warehousing is usually adopted, and then a timing task is called to generate security events by aggregation of logs (for example, query 3.
Disclosure of Invention
In order to solve the problems of data omission and poor real-time performance in the process of processing the security logs in the prior art, the invention provides a linkage script processing method based on real-time aggregation of large-data-level security event logs, which comprises the following steps:
s1, receiving logs from kafka;
s2, judging whether the log conforms to the safety event rule, and if so, entering a step S3; otherwise, not processing;
s3, performing attribute enhancement operation on the log to obtain an enhanced log;
s4, checking the occurrence time of the log and generating a unique ID of the security event;
s5, inserting the security event ID into a security event table of the kudu, and simultaneously forwarding the security event to a service theme corresponding to the kafka;
and S6, carrying out safety event handling by using a script handling program in the business theme.
The beneficial effects provided by the invention are as follows: the method has the advantages that the logic of generating the security events by the common timing query library aggregation logs is modified into the logic of generating the security events in real time, and the script program does not depend on a table look-up mode to process the security events, so that the load of the security event logs and the script processing program on a storage layer is greatly reduced, and the real-time performance of the whole system is improved.
Drawings
FIG. 1 is a schematic flow diagram of the process of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be further described with reference to the accompanying drawings.
Before elaborating on the present application, a unified description of related concepts is first provided, as follows:
1. kudu: the novel column-type storage system is a novel column-type storage system with an open source of Cloudera, is one of members (incubating) of an Apache Hadoop ecosphere, is specially used for quickly analyzing quickly changing data, and fills the vacancy of the conventional Hadoop storage layer.
2. Kafka: is an open source stream processing platform developed by the Apache software foundation and written by Scala and Java. Kafka is a high-throughput distributed publish-subscribe messaging system that can handle all the action flow data of a consumer in a web site.
3. topic: is merely a logical concept, representing a class of messages, and may also be considered a place to which a message is sent; topic is usually used to distinguish actual services, such as service a using one topic and service B using another topic.
4. Postgres database: the system is a free software object-relational database management system with very complete characteristics.
Referring to fig. 1, fig. 1 is a flow chart of the method of the present invention. The invention provides a linkage script processing method after real-time aggregation of safety event logs based on a big data level, which comprises the following steps:
s1, receiving logs from kafka;
it should be noted that the log from kafka is obtained by a log collector, or collected by a database collection service logstack, managed by corresponding configuration, normalized, and then forwarded by http, so as to obtain a log file. This is not important to the present application and is only explained briefly.
S2, judging whether the log conforms to the safety event rule, and if so, entering a step S3; otherwise, not processing;
it should be noted that, for example, the original log is:
<14> -Mon Oct 31 2022 14: 2022-10-31: brute force cracking alarm name: brute force alarm rating: high risk alarm category: other trigger conditions: content [ A ] "id": content [ A ] "jsonrpc": content [ A ] "error" content [ A ] "result" content [ A ] "status": alarm type: data flow characteristic value alert source IP address: 37.59.65.41 source port: 10 destination IP address: 192.168.181.236 destination port: 1212 cumulative number of triggers: 1;
security event rules:
1. the log risk level is high risk, medium risk and low risk
2. The alarm name and the link name contain brute force cracking, and the log type is classified into a brute force cracking type security event.
If the two rules are met, the log is classified as a safety event log and is subsequently processed. Then the log is in accordance with the safety event rule and is further processed; since the security events are mainly processed in the application, the non-security events are not processed in the application.
S3, performing attribute enhancement operation on the log to obtain an enhanced log;
it should be noted that, the attribute enhancement specifically refers to supplementing some information to the acquired log, for example, the original log is:
<14> Mon Oct 31 2022 14 family 40.192.168.184.111 family network full traffic safety analysis System-Server trigger time: 2022-10-31: brute force cracking alarm name: brute force alarm rating: high-risk alarm types: other trigger conditions: content: [ A ] "id": content: [ A ] "jsonrpc": content: [ A ] "error" content: [ A ] "result" content: [ A ] "status": alarm type: data flow characteristic value alert source IP address: 37.59.65.41 source port: 10 destination IP address: 192.168.181.236 destination port: 1212 cumulative number of triggers: 1;
log structure after enhancing attributes:
"id": 37.59.65.41, 10, 192.168.182.173, 1212| password attack | violence crack |2022-10-29, 05: "password attack", "dst _ ip": 4325 ": result _ port", 1212"," depth ": 192.168.184.111", "alarm _ name", violence crack "," category ":": password attack "," event _ chip _ type ", etc", "attack _ stage", attack "," type strand ",", "hierarchy": height "," trigger _ start _ e ", 2022-10-29", 09 "02", "pointer _ end _ time", 2022-10-19 ", and" pointer _ end _ pointer ": result": "event _ name": brute force crack "," rule _ id ": null", "src _ ip _ long":624640297 "," dst _ ip _ long ": 3232282285", "date _ time": 2022-10-29"}
Therefore, after processing, the attributes such as the ip address, the ip associated asset, the event category to which the log belongs and the like are enhanced.
S4, checking the occurrence time of the log and generating a unique ID of the security event;
as an embodiment, the unique ID of the security event in this application is composed of a source IP, a destination IP, a source port, a destination port, an event type, an event subtype and the event section of the log; for example, the ID is: 37.59.65.41 inducing no current 192.168.184.1 inducing no current 1212| password attack | brute force cracking | 2020-10-20; this application is intended to be illustrative only. Of course, in some other embodiments, other components may be included, which are not intended to be limiting herein.
S5, inserting the security event ID into a security event table of the kudu, and simultaneously forwarding the security event to a service theme corresponding to the kafka;
it should be noted that the warehousing of the security event and the forwarding of the security event are simultaneously performed, so that the real-time property of log processing is ensured, and a scenario handling program is not required to look up a security event table (network _ attack) stored in kudu to process the security event, which is a key point of the present application.
The description about simultaneous operation is as follows: the Spark computing task itself supports two degrees of parallelism:
1. data parallel: each job in spark is equivalent to one application, each application execution can generate a plurality of jobs, when one jobs is triggered by one attach, one jobs can be divided into a plurality of stages, one jobb can be divided when a shuffle occurs, and data parallelism is achieved, and the task is completed.
2. Physical parallelism: the spark task itself can be distributed into a plurality of tasks, and run on different machines.
Since the security event is already confirmed when the security event is generated, there is no context between the two actions (actions) of warehousing the security event and forwarding the security event, and the security event can be executed simultaneously by using spark characteristics.
The actions are performed simultaneously, when the processed event data is inserted into the database by the code, a copy of the security data is made at the same time and is forwarded to topic of kafka.
And S6, carrying out safety event handling by using a script handling program in the business theme.
The whole process can be simplified into a security event generation part and a script disposal part, after the log arrives, the security event can be directly generated according to the occurrence time of the log and stored into a security event table of kudu after analysis and enhancement operation, meanwhile, the security event is forwarded to topic corresponding to kafka, the security event storage and the security event forwarding run simultaneously, and the real-time performance of log processing is guaranteed.
The scenario processing procedure in step S6 is performed by using a postgres database scenario table; and executing corresponding handling operation after filtering the corresponding safety event according to the information provided by the script table.
Specifically, first accept the forwarded security event from kafka; reading a database filtering rule by adopting a postgres database script table, and judging whether the security event meets the rule or not;
judging whether the security event is processed or not according to the unique ID of the security event, if not, adding security event information in a script table of a postgres database; if the processing is finished, corresponding processing operations are executed, such as closing the security event, blocking the ip which initiates the attack through a firewall or informing related personnel of the security event information.
And finally, updating the handling state of the related security events, and simultaneously saving the related security events to a postgres database.
The script table comprises a script configuration table, a script node table and a script sub node table.
As an example, please refer to table 1, where table 1 is a field description of the scenario configuration table.
Scenario configuration table: the method mainly comprises the steps of recording script id, script name, script description, data source type, script node set, creation time, modification time and latest response time, and distinguishing data according to the data source type.
Table 1 script configuration table
Figure BDA0003923790540000061
Referring to table 2, table 2 is a field description of the scenario node table.
Script node table: the method mainly comprises the steps of recording node id, node type, node name, child node set and node sequence, and distinguishing rules and dispositions according to the node type, wherein the child node set records attributes and data of child nodes.
Table 2 script node table
Figure BDA0003923790540000062
Figure BDA0003923790540000071
Referring to table 3, table 3 is a description of the script child node table field.
A script child node table: the method mainly comprises the steps of recording child node id, child node name, attribute, operational character and value, and recording the attribute and the value according to the node name.
Table 3 script node table
Figure BDA0003923790540000072
Finally, for the implementation of the present invention, the timed task may be written into the jar packet run by spark, and the spark executes the security event generation program (i.e., steps S1 to S5), while enabling another scenario processing program (step S6), which may be a distributed program or a java program.
In conclusion, the beneficial effects of the invention are as follows: the method has the advantages that the logic of generating the security events by the common timing query library aggregation logs is modified into the logic of generating the security events in real time, and the script program does not depend on a table look-up mode to process the security events, so that the load of the security event logs and the script processing program on a storage layer is greatly reduced, and the real-time performance of the whole system is improved.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and should not be taken as limiting the scope of the present invention, which is intended to cover any modifications, equivalents, improvements, etc. within the spirit and scope of the present invention.

Claims (7)

1. The linkage script processing method after real-time aggregation of the safety event logs based on the big data level is characterized by comprising the following steps of: the method comprises the following steps:
s1, receiving logs from kafka;
s2, judging whether the log conforms to the safety event rule, and if so, entering a step S3; otherwise, not processing;
s3, performing attribute enhancement operation on the log to obtain an enhanced log;
s4, checking the occurrence time of the log and generating a unique ID of the security event;
s5, inserting the security event ID into a security event table of the kudu, and simultaneously forwarding the security event to a service theme corresponding to the kafka;
and S6, carrying out safety event handling by using a script handling program in the business theme.
2. The big data level security event log based real-time aggregation post-linkage scenario processing method as claimed in claim 1, wherein: in step S5, if the corresponding security event ID exists in the kudu security event table, the corresponding security event is updated, and the updated security event is forwarded to the service topic corresponding to kafka.
3. The big data level security event log based real-time aggregation post-linkage scenario processing method as claimed in claim 1, wherein: the script processing procedure in the step S6 is carried out by adopting a postgres database script table; and executing corresponding handling operation after filtering the corresponding safety event according to the information provided by the script table.
4. The big data level security event log real-time aggregation based linkage scenario processing method of claim 3, wherein: the script table comprises a script configuration table, a script node table and a script sub node table.
5. The big data level security event log based real-time aggregation post-linkage scenario processing method of claim 4, wherein: the scenario configuration table includes: the method comprises the steps of filtering information of the script, and distinguishing data by adopting the data source type.
6. The big data level security event log based real-time aggregation post-linkage scenario processing method of claim 4, wherein: the scenario node table includes: the method comprises the steps of node id, node type, node name, child node set and node sequence, and distinguishing rules and treatment according to the node type, wherein the child node set records attributes and data of child nodes.
7. The big data level security event log based real-time aggregation post-linkage scenario processing method of claim 6, wherein: the script child node table includes: and recording the attributes and the values according to the node names.
CN202211367585.1A 2022-11-03 2022-11-03 Linkage script processing method after real-time aggregation of safety event logs based on big data level Pending CN115801353A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211367585.1A CN115801353A (en) 2022-11-03 2022-11-03 Linkage script processing method after real-time aggregation of safety event logs based on big data level

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211367585.1A CN115801353A (en) 2022-11-03 2022-11-03 Linkage script processing method after real-time aggregation of safety event logs based on big data level

Publications (1)

Publication Number Publication Date
CN115801353A true CN115801353A (en) 2023-03-14

Family

ID=85435135

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211367585.1A Pending CN115801353A (en) 2022-11-03 2022-11-03 Linkage script processing method after real-time aggregation of safety event logs based on big data level

Country Status (1)

Country Link
CN (1) CN115801353A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007059057A2 (en) * 2005-11-12 2007-05-24 Logrhythm, Inc Log collection, structuring and processing
CN101075256A (en) * 2007-06-08 2007-11-21 北京神舟航天软件技术有限公司 System and method for real-time auditing and analyzing database
CN105007278A (en) * 2015-07-31 2015-10-28 中国电建集团成都勘测设计研究院有限公司 Automatic real-time acquisition system and acquisition method for network safety log
CN106951552A (en) * 2017-03-27 2017-07-14 重庆邮电大学 A kind of user behavior data processing method based on Hadoop
CN108334556A (en) * 2017-12-31 2018-07-27 江苏易润信息技术有限公司 A kind of method and system of analysis internet finance massive logs
CN112100148A (en) * 2020-07-31 2020-12-18 紫光云(南京)数字技术有限公司 Increment processing method for packed log
CN112350989A (en) * 2020-09-21 2021-02-09 西安交大捷普网络科技有限公司 Log data analysis method
CN112988516A (en) * 2021-03-18 2021-06-18 上海新炬网络技术有限公司 Method for realizing global service monitoring based on log enhancement

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007059057A2 (en) * 2005-11-12 2007-05-24 Logrhythm, Inc Log collection, structuring and processing
CN101075256A (en) * 2007-06-08 2007-11-21 北京神舟航天软件技术有限公司 System and method for real-time auditing and analyzing database
CN105007278A (en) * 2015-07-31 2015-10-28 中国电建集团成都勘测设计研究院有限公司 Automatic real-time acquisition system and acquisition method for network safety log
CN106951552A (en) * 2017-03-27 2017-07-14 重庆邮电大学 A kind of user behavior data processing method based on Hadoop
CN108334556A (en) * 2017-12-31 2018-07-27 江苏易润信息技术有限公司 A kind of method and system of analysis internet finance massive logs
CN112100148A (en) * 2020-07-31 2020-12-18 紫光云(南京)数字技术有限公司 Increment processing method for packed log
CN112350989A (en) * 2020-09-21 2021-02-09 西安交大捷普网络科技有限公司 Log data analysis method
CN112988516A (en) * 2021-03-18 2021-06-18 上海新炬网络技术有限公司 Method for realizing global service monitoring based on log enhancement

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李洋;吕家恪;: "基于Hadoop与Storm的日志实时处理系统研究", 西南师范大学学报(自然科学版), no. 04, pages 1 *

Similar Documents

Publication Publication Date Title
US11343268B2 (en) Detection of network anomalies based on relationship graphs
CN105243159B (en) A kind of distributed network crawler system based on visualization script editing machine
JP7120350B2 (en) SECURITY INFORMATION ANALYSIS METHOD, SECURITY INFORMATION ANALYSIS SYSTEM AND PROGRAM
EP2341437A2 (en) Monitoring and tracking application usage
US11693958B1 (en) Processing and storing event data in a knowledge graph format for anomaly detection
WO2015149062A1 (en) System and method for predicting impending cyber security events using multi channel behavioral analysis in a distributed computing environment
US20210385251A1 (en) System and methods for integrating datasets and automating transformation workflows using a distributed computational graph
CN112636957B (en) Early warning method and device based on log, server and storage medium
CN111835777B (en) Abnormal flow detection method, device, equipment and medium
US11374970B2 (en) Phishing attempt categorization/aggregation interface
US20220229657A1 (en) Extensible resource compliance management
CN113254445B (en) Real-time data storage method, device, computer equipment and storage medium
Dosis et al. Semantic representation and integration of digital evidence
CN103235918B (en) The collection method of trusted file and system
Las-Casas et al. A big data architecture for security data and its application to phishing characterization
CN114006765A (en) Method and device for detecting sensitive information in message and electronic equipment
CN115514558A (en) Intrusion detection method, device, equipment and medium
US11200267B2 (en) Mail room intent analyzer
Sun et al. Design and Application of an AI‐Based Text Content Moderation System
CN113918954A (en) Automated vulnerability scanning integration method, device, equipment and storage medium
CN115801353A (en) Linkage script processing method after real-time aggregation of safety event logs based on big data level
CN114205146B (en) Processing method and device for multi-source heterogeneous security log
CN115470489A (en) Detection model training method, detection method, device and computer readable medium
CN112272165A (en) Rule matching method and device for message
Gruschka et al. A stateful web service firewall for BPEL

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20230314