期刊文献+

基于深度学习的分布式安全日志分析方法 被引量:5

Distributed Security Log Analysis Method Based on Deep Learning
下载PDF
导出
摘要 为了提高日志分析是当前进行入侵检测和安全防御的重要手段。针对传统基于规则的分析方法中误报、漏报较高,应对海量日志分析效率过低的问题,该文章提出了一种基于深度学习的分布式安全日志分析方法,通过将深度学习算法与现有黑白名单、规则匹配以及统计策略等技术结合,进行日志分析,检测网络中的安全威胁。系统采用分布式的存储和计算平台,能够进行离线和实时两种日志分析模式,可以满足大多数场景下海量的日志数据分析需求。 Log analysis is an important means of intrusion detection and security defense. Aiming at the problem of low false positives and false negatives in traditional rule-based analysis methods, and dealing with the low efficiency of massive log analysis, this paper proposes a distributed security log analysis method based on deep learning. The method uses a deep learning algorithm combined with existing black and white lists, rule matching, and statistical strategies to perform log analysis and detect security threats in the network. The system adopts a distributed storage and computing platform, which can perform both offline and real-time log analysis modes, which can meet the needs of massive log data analysis in most scenarios.
作者 尹慧 花嵘 郭宁 尹韬 YIN Hui;HUA Rong;GUO Ning;YIN Tao(College of Computer Science and Engineerin,Shandong University of Science and Technolog,Qingdao 266510,China;Key Laboratory of Trustworthy Distributed Computing and Service(BUPT),Ministry of Education;College of Computer,Xi’an University of Posts&Telecommunications,Xi’an 710100,China)
出处 《软件》 2020年第3期272-277,共6页 Software
关键词 深度学习 分布式 日志分析 入侵检测 Deep learning Distributed Log analysis Intrusion detection
  • 相关文献

参考文献9

二级参考文献54

  • 1胡晓敏.无线传感器网络Agent数据分流策略[J].新型工业化,2013,2(4):103-112. 被引量:18
  • 2王东升.抚顺露天煤矿西排土场植被变化遥感分析[J].新型工业化,2013,2(5). 被引量:2
  • 3姜传菊.网络日志分析在网络安全中的作用[J].现代图书情报技术,2004(12):58-60. 被引量:19
  • 4唐谦,张大方.入侵检测中模式匹配算法的性能分析[J].计算机工程与应用,2005,41(17):136-138. 被引量:22
  • 5李鸿培.入侵检测中几个关键问题的研究:博士论文[M].西安电子科技大学,2001,..
  • 6刘兴懂,罗守山.web站点安全日志分析系统的分析与设计.北京邮电大学工程硕士学位论文,2009年1月.
  • 7Maristella Agosti,Franco Crivellari,Giorgio Di Nunzio.Web log analysis: a review of a decade of studies about information acquisition, inspection and interpretation of user interaction[J]. Data Mining and Knowledge Discovery . 2012 (3)
  • 8DEAN J,GHEMAWAT S.Map Reduce:simplified data processing on large clusters[J].Communications of the ACM,2008,51(1):107-113.
  • 9GHEMAWAT S,GOBIOFF H,LEUNG S T.The Google file system[J].ACM SIGOPS Operating Systems Review,2003,37(5):29-43.
  • 10SHVACHKO K,KUANG H,RADIA S,et al.The Hadoop dis-tributed file system[C]//2010 IEEE 26th Symposium on MassStorage Systems and Technologies(MSST).[S.l.]:IEEE,2010:1-10.

共引文献108

同被引文献30

引证文献5

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部