期刊文献+

大数据分析下异构网络安全的关联算法研究 被引量:5

Research on Correlation Algorithm of Heterogeneous Network Security Based on Big Data Analysis
下载PDF
导出
摘要 正以指数速度迅速膨胀起来的大数据给人们带来了方便,也带来了一些安全隐患,而保证大数据环境下的网络安全已成为当今社会的一个重要课题。文中从大数据时代发展现状入手,分析大数据时代的网络安全问题,并探讨相应的方法措施,以此来促进互联网的发展。针对大数据的查询分析复杂和大数据量的特点,通过分析面向大数据的异构网络安全监控的相关技术,对真实数据进行化简,清洗以及不断规划等一系列处理操作并得到核心分析数据库,构建了一个可以提供测试环境以及模拟实际攻击行为的集群实验环境。最终测试和验证大数据环境下异构化网络安全监控平台的不同分析算法,通过安全事件的关联和分布式序列图的模式等方式进行网络安全监控的整体态势分析,为大数据环境下的异构网络安全监控提供了一些思路,也为信息安全企业提供了一个分析大数据下隐含规律的参考模型。 Big data,which is rapidly expanding at an exponential rate,brings convenience to people and some security risks.However,it has become an important topic in today’s society to ensure the network security under the big data environment.Starting from the development status of the big data era,we analyze the network security in the big data era and discuss the corresponding methods and measures,so as to promote the development of the Internet.In view of the characteristics of complex query analysis and large data volume for big data,by analyzing the related technologies of heterogeneous network security monitoring oriented to big data,the core analysis database is obtained through a series of operations such as simplification,cleaning and continuous planning of real data,and a cluster experiment environment that can provide test environment and simulate actual attack behavior is constructed.Finally we test and verify different analysis algorithms of heterogeneous network security monitoring platform in big data environment.The overall situation analysis of network security monitoring is conducted through the association of security events and the pattern of distributed sequence diagram,to provide some ideas for heterogeneous network security monitoring under the environment of big data,and also provide a reference model for information security enterprises to analyze the hidden laws of big data.
作者 焦冬艳 吴永 贺桂英 JIAO Dong-yan;WU Yong;HE Gui-ying(School of Information&Engineering,The Open University of Guangdong,Guangzhou 510091,China)
出处 《计算机技术与发展》 2019年第12期111-115,共5页 Computer Technology and Development
基金 2015年度广东省重大科技专项项目(2015B010126001)
关键词 大数据 异构网络 安全监控 关联算法 big data heterogeneous network security monitoring correlation algorithm
  • 相关文献

参考文献6

二级参考文献101

  • 1吴广君,王树鹏,陈明,李超.海量结构化数据存储检索系统[J].计算机研究与发展,2012,49(S1):1-5. 被引量:30
  • 2余慧佳,刘奕群,张敏,茹立云,马少平.基于大规模日志分析的搜索引擎用户行为分析[J].中文信息学报,2007,21(1):109-114. 被引量:117
  • 3马克思恩格斯全集第3卷[M].北京:人民出版社,2002.
  • 4[OL].<http://hadoop.apache.org.>.
  • 5WinterCorp: 2005 TopTen Program Summary. http:// www. wintercorp, com/WhitePapers/WC TopTenWP. pdf.
  • 6TDWI Checklist Report: Big Data Analytics. http://tdwi. org/research/2010/08/Big-Data-Analytics, aspx.
  • 7Chaudhuri S, Dayal U. An overview of data warehousing and OLAP technology. SIGMOD Rec, 1997,26(1): 65-74.
  • 8Madden S, DeWitt D J, Stonebraker M. Database parallelism choices greatly impact scalability. DatabaseColumn Blog. http://www, databasecolumn, com/2007/10/database-parallelism-choices, html.
  • 9Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters//Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI ' 04). San Francisco, California, USA, 2004: 137-150.
  • 10DeWitt D J, Gerber R H, Graefe G, Heytens M L, Kumar K B, Muralikrishna M. GAMMA--A high performance dataflow database machine//Proceedings of the 12th International Conference on Very Large Data Bases (VLDB' 86). Kyoto, Japan, 1986:228-237.

共引文献2256

同被引文献51

引证文献5

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部