期刊文献+

电信网络海量安全事件关联分析引擎技术研究

Correlation Analysis Approach About Numerous Security Information and Event in Telecommunication Network
下载PDF
导出
摘要 关联分析引擎通过把孤立的安全事件集合关联为一个安全事件链,从大量误报告警与低级别告警中找出真正威胁告警,是安全运营中心分析安全态势、做出及时响应的关键技术模块。提出了一种结合状态机与推理机两类关联分析机制优点的关联分析引擎技术——基于序列状态推导的关联分析引擎,通过自动序列控制攻击场景规则的匹配,实现高效准确的海量安全事件的关联分析,能够较好地解决传统关联分析引擎在电信级网络应用中的问题。 Correlation analysis engine which correlate isolated security event as a chain to find out the real threat from a large number of false alarms or low level ones,is a key module of security operations centre (SOC).The traditional correlation analysis mechanism is divided into two types:state machine and inference-engine.For poor precision and low efficiency,they don't adapt telecom network application.A new correlation analysis mechanism based on consecutive state by inference-engine was presented,which executed efficiently and accurately,to solve the problems of correlation analysis engine applied in telecom network.
出处 《电信科学》 北大核心 2013年第10期168-172,共5页 Telecommunications Science
关键词 安全运营中心 关联分析引擎 序列状态 电信级网络 security operations centre correlation analysis engine consecutive state telecommunication network
  • 相关文献

参考文献5

二级参考文献27

  • 1GB/T9387.2-1995.信息处理系统开放系统互连基本参考模型-第二部分:安全体系结构.[S].,..
  • 2http://www. topsec. com. cn
  • 3Case J, et al. Message Processing and Dispatching for Simple Network Management Protocol(SNMP)RFC3412,Dec. 2002
  • 4Moore B,Ellesson E,Strassner J,Westerinen A. Policy CorPe Information Model-Version 1 Specification ,RFC 3060. Available at:http://www. ietf. org ,Feb. 2001
  • 5White T, Bieszczad A,Pagurek B. Distributed Fault Location in Networks Using Mobile Agents. In: Proc. of the Workshop on Intelligent Agents for Telecommunications Application (IATA'98) ,July, 1998
  • 6Lupu E, Sloman M. Conflict Analysis for Management Policies. In: Proc. of Vth Intl. Symposium on Integrated Network Management IM'97,San-Diego,May 1997
  • 7Lee W. A Data Mining Framework for Constructing Features and Models for Intrusion Detection System: [PHD thesis]. Columbia University, 1999
  • 8Lee W, Stolfo S J, Mok K W. A Data Mining Framework for Building Intrusion Detection models. In: Proc. of the 1999 IEEE Symp on Security and Privacy,May 1999
  • 9Lindqvist U,Porras P A. Detecting computer and network misuse through the production-based expect system toolset (P-BEST).In: Proc. of the 1999 IEEE Symp on Security and Privacy,Oakland,CA,May 1999
  • 10Porras P. STAT-A state transition analysis tool for intrusion detection: [Master's thesis]. Computer Science Dept. ,Uni. of California,Santa and Barbara,June 1992

共引文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部