龙门, 夏靖波, 张子阳. 一种基于日志的攻击模式挖掘方法[J]. 微电子学与计算机, 2011, 28(5): 171-175.
引用本文: 龙门, 夏靖波, 张子阳. 一种基于日志的攻击模式挖掘方法[J]. 微电子学与计算机, 2011, 28(5): 171-175.
LONG Men, XIA Jing-bo, ZHANG Zi-yang. Mining Model of Attacking Mode Based on Log Information[J]. Microelectronics & Computer, 2011, 28(5): 171-175.
Citation: LONG Men, XIA Jing-bo, ZHANG Zi-yang. Mining Model of Attacking Mode Based on Log Information[J]. Microelectronics & Computer, 2011, 28(5): 171-175.

一种基于日志的攻击模式挖掘方法

Mining Model of Attacking Mode Based on Log Information

  • 摘要: 建立“择优”和“劣汰”过程结合的攻击模式挖掘模型对日志信息进行分析.“择优”过程运用改进正交化算法的稀疏化策略对数据集进行重新组合, 提高了最小二乘支持向量机分类模型的效率.“劣汰”过程提出了基于相关度检测法的改进滑动窗策略, 剔除了虚假攻击事件, 避免重复的攻击模式在“择优”过程的结果集中反复出现.实验证明, 该方法能够高效准确地挖掘出网络中存在的复杂的攻击模式, 实时对网络安全进行监控.

     

    Abstract: This paper built the mining model of attacking mode to analyze log information combined the process "optimized selection" and "elimination".The process "optimized selection" used the sparseness tactic based on Modified Classical Gram Schmidt (MCGS) to reset dataset, improved the efficiency of taxonomy model of Least Squares Support Vector Machines (LS-SVM) .The "elimination" process eliminated the unreal attacking events, and presented the tactic of modified sliding-window based on correlated detection to avoid attacking modes repeating in the result set got from the process of "optimized selection".The experiment validated this method can find out complex attacking modes in network efficiently and correctly.

     

/

返回文章
返回