KR20120069130A - A realtime monitoring method based on log data - Google Patents
A realtime monitoring method based on log data Download PDFInfo
- Publication number
- KR20120069130A KR20120069130A KR1020100130541A KR20100130541A KR20120069130A KR 20120069130 A KR20120069130 A KR 20120069130A KR 1020100130541 A KR1020100130541 A KR 1020100130541A KR 20100130541 A KR20100130541 A KR 20100130541A KR 20120069130 A KR20120069130 A KR 20120069130A
- Authority
- KR
- South Korea
- Prior art keywords
- data
- log
- key
- application
- correlation
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Automation & Control Theory (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
Description
The present invention relates to a system monitoring method, and more particularly, to an apparatus, a method, and a recording medium for recording the method, which can detect in real time whether an application undermines security based on log data.
In the case of an application running on a server such as a web server, a file server, an e-mail server, a printer server, and an FTP server, only a plurality of authorized users can access the server and use the application. In particular, such a server-side application has a risk of being easily damaged by hacking and viruses due to the nature of storing data in a digital format at a remote location. As a result, the issue of confidentiality and reliability of the data used by server-side applications has always been one of the major issues in computer systems.
In order to solve this problem, various types of surveillance systems have been proposed. These surveillance systems consist of software and hardware that constantly monitor the computer's operational status and perform control and retrieval whenever necessary. In addition, it has a function of notifying the system administrator of an abnormal state of the system or a condition exceeding some predefined criteria or automatically recovering from such an abnormal state. Among these surveillance systems, audit and security related systems aim to protect the system from illegal data leakage or malicious attack by an attacker.
However, conventional auditing and security systems simply encrypt data or use firewalls to block attacks from the outside, and the countermeasures are merely mechanical defenses. Therefore, it is pointed out that such a conventional audit and security system cannot properly respond to malicious information leakage by an attacker or data leakage combining two or more heterogeneous applications.
The technical problem to be solved by the present invention is to overcome the limitation that the security measures through simple log analysis can only be an after-sales measure that can not adequately protect against confidential leakage occurring in real time, and in the case of a typical audit and security system, The combination of two or more heterogeneous applications solves the problem of being vulnerable to attempts to compromise confidentiality, and eliminates the inconvenience that an already established security system cannot actively cope with new patterns of attack behavior.
In order to solve the above technical problem, the system monitoring method according to the present invention comprises the steps of extracting a first key indicating the attribute of the data item from the log (log) of the first application; Extracting a second key corresponding to the extracted first key from a log of a second application generated in real time; Establishing a correlation between a log of the first application and a log of the second application by mapping the extracted first key and the extracted second key; Selecting data for obtaining a right to use a file object in a log of the first application by referring to an attribute of a data item; Monitoring generation of data corresponding to the selected data in the log of the second application in real time according to the set correlation; And detecting log data for obtaining an output right for a file object among the monitored data by referring to an attribute of the data item.
In the system monitoring method described above, the first key and the second key are preferably at least one of a user ID, an IP address, a file name, an occurrence time, or a job type included in a log.
In the above-described system monitoring method, the permission on the file object is at least one of reading, copying, or receiving, and the output permission on the file object is at least one of writing, moving, transmitting, or modifying. Do.
The system monitoring method may further include transmitting a warning message to a preset administrator when log data for acquiring the output right is detected.
Meanwhile, in order to solve the other technical problem, in the above-described system monitoring method, the correlation is an association rule modeled using an ontology, and the step of detecting log data for acquiring the output authority uses the inference device of the ontology. Is performed by querying whether data generated in real time corresponds to information leakage.
In addition, in order to solve the other technical problem, the above-described system monitoring method further comprises the step of receiving a modification to the association rule by repeating the query through the inference machine, the correlation by the input correction It is desirable to learn relationships.
Furthermore, the following provides a computer readable recording medium having recorded thereon a program for executing the above-described system monitoring method on a computer.
The present invention extracts and maps a key indicating a property of a data item from heterogeneous application logs so that an attacker can detect a combination of two or more heterogeneous applications and attempt to leak it, and generate a log of current interest data. By monitoring, it is possible to defend against confidential leak attempts occurring in real time, and actively defend against new patterns of attack behavior by learning query results by inferencing.
1 is a view for explaining the basic idea of the real-time system monitoring method according to an embodiment of the present invention.
2 is a flowchart illustrating a real-time system monitoring method based on log data according to an embodiment of the present invention.
3 is a diagram illustrating an implementation environment and an overall operating method of a real-time system monitoring method according to an exemplary embodiment of the present invention.
4 is a diagram illustrating a log of a file server as log data of a real-time system monitoring method according to an exemplary embodiment of the present invention.
FIG. 5 is a diagram illustrating data items and attributes of a mail archive server as log data of a real-time system monitoring method according to an exemplary embodiment of the present invention.
6 is a diagram illustrating a log of the print server as log data of the real-time system monitoring method according to an embodiment of the present invention.
7 is a diagram illustrating a log of an FTP (file transfer protocol) server as log data of a real-time system monitoring method according to an embodiment of the present invention.
Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings.
1 is a view for explaining the basic idea of the real-time system monitoring method according to an embodiment of the present invention, the past log data generated by the
In FIG. 1, a common attribute between log data generated by heterogeneous applications is found, and a relationship is formed from this to link past information with present information. First, the items and attributes of log data generated by each application are as follows.
Since the
At this time, the
Now, specific log data generated by heterogeneous applications can be concatenated according to the generated correlation. Embodiments of the present invention focus on the temporal order in such concatenation. Naturally, the log data of the
If the correlation according to the temporal priority is set as described above, it is necessary to purify the data meaningful for auditing and security among the connected data. To this end, embodiments of the present invention intend to define an act of an attacker undermining the security of the system as a two-step act as follows. First, the log data generated in advance due to the disclosure of confidentiality is data that acquires permission to use a file object. Second, log data generated by trailing time due to the leakage of confidential information is data for obtaining output authority for a file object. That is, the attacker will first try to obtain the subject secret that he wants to leak, and once he has obtained the confidential data, he will attempt to leak it.
Accordingly, embodiments of the present invention extract the operation of each application from the two log data connected in accordance with the correlation, and checks whether the operation of the extracted application corresponds to the leak pattern of the above two stages. As a result of the inspection, when the operations of the above-described application acquires the right to use the file object in chronological order, and then attempt to obtain the right to output, the series of actions are regarded as a confidential leak.
2 is a flowchart illustrating a real-time system monitoring method based on log data according to an embodiment of the present invention, and includes the following steps.
In
In
Now, if the correlation for the logs of the heterogeneous application is established, it is determined whether the set of data appearing therefrom is a confidential leakage behavior of the attacker described above with reference to FIG. 1.
In
In
In
For example, even if the log data for 'read a specific document', which is the first level of confidentiality, is found, if there is no trailing time, 'Send the document externally' This is not a confidential act. This is because, in the workgroup, the user is not allowed to simply browse the documents stored in the server. However, if an unauthorized release of such documents is carried out in succession, this may be considered a confidential disclosure.
Therefore, in the embodiments of the present invention, the detection of
According to the embodiments of the present invention described above, by extracting and mapping a key indicating a property of a data item from heterogeneous application logs, even if an attacker attempts to leak confidentially by combining two or more heterogeneous applications, the present invention can be detected. By monitoring log generation for data of interest, you can protect against confidential leak attempts that occur in real time.
3 is a view for explaining the implementation environment and the overall operating method of the real-time system monitoring method according to an embodiment of the present invention, the
Each of the
In addition, the
Furthermore, the embodiment of FIG. 3 has a
3 illustrates an example of an operation for such a
Meanwhile, embodiments of the present invention may utilize ontology in implementing the
Ontologies, a set of vocabulary described in formal language, are used for reasoning / inference. In this regard, the semantic web technology has emerged. The semantic web has a relationship between a resource and information about a resource (web document, various files, services, etc.) in a distributed environment such as the current Internet. ) Is a framework and technology that expresses in the form of a machine, that is, an ontology that can be processed by a computer, and let the automated machine process it. In other words, ontology is a tool that can implement semantic web, and it is a tool that can semantically connect knowledge concept.
Elements of ontology can be classified into class, instance, relationship, and property. Explain that a class is usually a name that we attach to things or concepts. Instances, on the other hand, mean the things or concepts that manifest themselves in the actual form of things or events. Relationships refer to relationships that exist between classes / instances and can generally be classified into a taxonomic relation and a non-taxonomic relation. A taxonomy relationship is a hierarchical relationship divided into broader concepts and concrete concepts for class / instance conception. A non-classification relationship is called a non-classification relationship. An attribute is a concatenation of a class or instance with a specific value to indicate a particular property / propensity of the class or instance.
Embodiments of the present invention described above can be conceptualized by utilizing the concept of the ontology, and this ontology enables new inference from the set correlation. More practically, implementing the correlation by using the ontology is beyond the scope of the essential or basic idea proposed by the embodiments of the present invention, and thus, only detailed examples will be presented here without omitting the detailed description.
The
Furthermore, by repeating the query through the ontology inference machine, it is possible to receive modifications to the association rule, and by learning the
Hereinafter, to illustrate the applications that can be utilized in the embodiments of the present invention.
FIG. 4 is a diagram illustrating a log of a file server as log data of a real-time system monitoring method according to an embodiment of the present invention. The detailed data items include 'time', 'user', 'server name', 'File name', 'Operation type' and 'Operation number' are shown.
In FIG. 4, the log of the file server has four read operations after five logon operations. That is, it can be seen that the act of acquiring the use right for the file object, which is the first act of the confidential leakage act, has occurred. In addition, in the case of FIG. 4, the user 'xxxAP' may be utilized as a key, and may be mapped and monitored with the log data of the heterogeneous application which is later than the file manipulation time.
FIG. 5 is a diagram illustrating data items and attributes of a mail archive server as log data of a real-time system monitoring method according to an exemplary embodiment of the present invention. Although the data items illustrated in FIG. 5 generally correspond to information that can be obtained by sending / receiving mails from a mail server, particularly meaningful data includes 'sender address', 'receiver address', and 'attached file name'. Will be In this case, if the character after '@' is cut from the 'sender address', the same data as the user ID may be extracted. As described above, in order to map the log data of heterogeneous applications, some data items may be processed as necessary.
FIG. 6 is a diagram illustrating a log of a printer server as log data of a real-time system monitoring method according to an embodiment of the present invention. The detailed data items include 'time', 'user', 'server name', and 'file name'. , 'Type of operation' and 'number of operations'. Confidential leaks can be leaked not only by electronic file transfer but also by hard copy, so it is also useful to monitor log data on the print server. In this case, as in FIG. 4, 'user' may be used as a key, and if there is a file reading action among the log data mapped before the file output action, this series of actions may be regarded as a confidential leaking action.
FIG. 7 is a diagram illustrating a log of a file transfer protocol (FTP) server as log data of a real-time system monitoring method according to an embodiment of the present invention. The detailed data items are 'time', 'IP address', and 'file'. Size ',' file path / file name 'and' user '. In the case of FIG. 7, as in FIG. 4 to FIG. 6 described above, the user may be used as a key to check whether the second level confidentiality is satisfied.
Furthermore, the present invention can be embodied as computer readable codes on a computer readable recording medium. The computer-readable recording medium includes all kinds of recording devices in which data that can be read by a computer system is stored.
Examples of the computer-readable recording medium include a ROM, a RAM, a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device and the like, and also a carrier wave (for example, transmission via the Internet) . In addition, the computer-readable recording medium may be distributed over network-connected computer systems so that computer readable codes can be stored and executed in a distributed manner. In addition, functional programs, codes, and code segments for implementing the present invention can be easily deduced by programmers skilled in the art to which the present invention belongs.
The present invention has been described above with reference to various embodiments thereof. It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. Therefore, the disclosed embodiments should be considered in an illustrative rather than a restrictive sense. The scope of the present invention is defined by the appended claims rather than by the foregoing description, and all differences within the scope of equivalents thereof should be construed as being included in the present invention.
10: first application
13: first application log (past data)
20: second application
23: second application log (current data)
15, 25: parser 27: monitor
30: correlation
Claims (10)
Extracting a second key corresponding to the extracted first key from a log of a second application generated in real time;
Establishing a correlation between a log of the first application and a log of the second application by mapping the extracted first key and the extracted second key;
Selecting data for obtaining a right to use a file object in a log of the first application by referring to an attribute of a data item;
Monitoring generation of data corresponding to the selected data in the log of the second application in real time according to the set correlation; And
And detecting log data for obtaining an output right for a file object among the monitored data by referring to an attribute of the data item.
And the first key and the second key are each at least one of a user ID, an IP address, a file name, an occurrence time, or a job type included in a log.
And the usage right for the file object is at least one of reading, copying, or receiving.
The detecting of the log data may further include considering at least one of a security level or a target IP address of the file object.
And the output authority for the file object is at least one of writing, moving, transmitting, or modifying.
The correlation is set according to a predefined association rule,
And the association rule maps the extracted first key and the extracted second key in consideration of a probabilistic relationship between log generation times.
The correlation is an association rule modeled using an ontology,
The step of detecting the log data to obtain the output authority is performed by querying whether the data generated in real time corresponding to the information leakage using the reasoning machine of the ontology.
Receiving a modification to the association rule by repeating the query through the inferred, further comprising:
And the correlation is learned by the input correction.
And transmitting a warning message to a preset administrator when log data for acquiring the output right is detected.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020100130541A KR20120069130A (en) | 2010-12-20 | 2010-12-20 | A realtime monitoring method based on log data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020100130541A KR20120069130A (en) | 2010-12-20 | 2010-12-20 | A realtime monitoring method based on log data |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20120069130A true KR20120069130A (en) | 2012-06-28 |
Family
ID=46687447
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020100130541A KR20120069130A (en) | 2010-12-20 | 2010-12-20 | A realtime monitoring method based on log data |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20120069130A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20140054964A (en) | 2012-10-30 | 2014-05-09 | 에스케이플래닛 주식회사 | Streaming service system, method and apparatus for providing streming servise in the system |
KR20180079049A (en) * | 2016-12-30 | 2018-07-10 | 국방과학연구소 | Detection system of cyber information leaking action |
-
2010
- 2010-12-20 KR KR1020100130541A patent/KR20120069130A/en active IP Right Grant
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20140054964A (en) | 2012-10-30 | 2014-05-09 | 에스케이플래닛 주식회사 | Streaming service system, method and apparatus for providing streming servise in the system |
KR20180079049A (en) * | 2016-12-30 | 2018-07-10 | 국방과학연구소 | Detection system of cyber information leaking action |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Friedberg et al. | Combating advanced persistent threats: From network event correlation to incident detection | |
US9654510B1 (en) | Match signature recognition for detecting false positive incidents and improving post-incident remediation | |
US11122061B2 (en) | Method and server for determining malicious files in network traffic | |
US11985142B2 (en) | Method and system for determining and acting on a structured document cyber threat risk | |
CN112217835B (en) | Message data processing method and device, server and terminal equipment | |
US20140201526A1 (en) | System, method, and apparatus for data, data structure, or encryption key cognition incorporating autonomous security protection | |
Gupta et al. | A holistic view on data protection for sharing, communicating, and computing environments: Taxonomy and future directions | |
US20240061937A1 (en) | Anti-malware behavioral graph engines, systems and methods | |
US10681068B1 (en) | System and method for analyzing data and using analyzed data to detect cyber threats and defend against cyber threats | |
Kaushik et al. | Attack penetration system for SQL injection | |
Shin et al. | Focusing on the weakest link: A similarity analysis on phishing campaigns based on the att&ck matrix | |
Henriques et al. | A forensics and compliance auditing framework for critical infrastructure protection | |
Henriques et al. | A survey on forensics and compliance auditing for critical infrastructure protection | |
CN117792741A (en) | Network attack detection and tracing method based on behavior feature analysis | |
KR20120069130A (en) | A realtime monitoring method based on log data | |
[Retracted] Design of a Network Security Audit System Based on Log Data Mining | ||
Khan | Advanced persistent threat: Detection and defence | |
Frincke et al. | From Intrusion Detection to Self Protection | |
Syarova et al. | Data Leakage Prevention and Detection in Digital Configurations: А Survey | |
Sorge | IT Security measures and their relation to data protection | |
Janith et al. | SentinelPlus: A Cost-Effective Cyber Security Solution for Healthcare Organizations | |
Benham et al. | Network attack analysis and the behaviour engine | |
Siraj et al. | Alert correlation with abstract incident modeling in a multi-sensor environment | |
Khan | Categorising cyber security threats for standardisation | |
Amarantidou | Computer and Network Forensics: investigating network traffic |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E701 | Decision to grant or registration of patent right | ||
NORF | Unpaid initial registration fee |