期刊文献+

结合日志与深度学习的网络软件异常检测算法

Network Software Anomaly Detection Algorithm Based on Log and Deep Learning
下载PDF
导出
摘要 为了快速的检测出网络软件异常,提出基于日志与深度学习的网络软件异常检测算法。首先通过CNN卷积核和特征向量对文本向量的权重进行提取,将池化向量代入RNN中,选择Tf-Idf模型矩阵降低文本数据不均衡造成的影响。然后对非结构化的日志使用SPELL方法进行解析,转化成结构化日志,通过分隔符将转化为单序列的日志消息与消息列表中的公共常量进行匹配,解析出剩余变量,完成日志的解析工作。训练过程中,选择Adam优化算法使目标函数取得最小值,同时采用学习率衰减算法对参数的更新速率进行控制,通过反向传播对权重参数进行实时更新。最后,分别从执行路径异常检测、参数异常检测和在线更新模型三方面进行评估。实验结果表明,上述方法不仅能够准确的判断出异常,而且综合性能指标和召回率也较高,具有广泛的适用性。 In order to quickly detect network software anomalies, a network software anomaly detection algorithm based on log and deep learning is proposed. Firstly, the weight of the text vector was extracted through the convolution kernel and eigenvector of CNN,the pooled vector was substituted into the RNN,and the TF-IDF model matrix was selected to reduce the impact caused by the imbalance of text data. Then, the unstructured log was parsed using the SPELL method and transformed into a structured log. The log messages transformed into a single sequence were matched with the public constants in the message list through the separator, and the remaining variables were parsed to complete the log parsing. In the training process, the Adam optimization algorithm was selected to minimize the objective function. At the same time, the learning rate attenuation algorithm was used to control the update rate of parameters, and the weight parameters were updated in real-time through backpropagation. Finally, the execution path anomaly detection, parameter anomaly detection and online update model were evaluated respectively. The experimental results show that this method can not only accurately judge the abnormality, but also has high comprehensive performance index and recall rate, and has wide applicability.
作者 刘杰逾 王晓辉 LIU Jie-yu;WANG Xiao-hui(Chengdu College of Arts and Sciences,Chengdu Sichuan,610401,China;Henan University of Chinese Medicine,Zhengzhou Henan 450046,China)
出处 《计算机仿真》 北大核心 2022年第12期440-444,共5页 Computer Simulation
关键词 卷积核 结构化日志 路径异常 参数异常 在线更新 Convolution kernel Structured log Abnormal path Abnormal parameters Online update
  • 相关文献

参考文献4

二级参考文献24

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2Ruohomaa S,Kutvonen L.Trust management survey//Proceedings of the iTrust 2005.Lecture Notes in Computer Science 3477.Berlin:Springer,2005:77-92
  • 3Theodorakopoulos,George,Baras,John S.On trust models and trust evaluation metrics for ad hoc networks.IEEE Journal on Selected Areas in Communications,2006,24(2):318-328
  • 4Pal P,Webber F,Atighetchi M,Combs N.Trust assessment from observed behavior:Toward and essential service for trusted network computing//Proceedings of the 5th IEEE International Symposium on Network Computing and Applications.Cambridge,MA,USA,2006:285-292
  • 5Ciaran B,Karl K,Jean-Marc S,Vinny C.Towards an evaluation methodology for computational trust systems//Proceedings of the iTrust 2005.Lecture Notes in Computer Science 3477.Berlin:Springer,2005:289-304
  • 6Tian Li-Qin,Lin Chuang,Ji Tie-Guo.Kind of quantitative evaluation of user behaviour trust using AHP.Journal of Computational Information Systems,2007,3(4):1329-1334
  • 7Lin Ai-Zhong,Vullings E,Dalziel J.A trust-based access control model for virtual organizations//Proceedings of the GCC Workshops.Changsha,China,2006:557-564
  • 8Bell M.The use of game theory to measure the vulnerability of stochastic networks.IEEE Transactions on Reliability,2003,52(1):63-68
  • 9Bertino E,Squicciarini A C,Martino L,Paci F.An adaptive access control model for web services.International Journal of Web Services Research,2006,3(3):27-60
  • 10Hassan T,Morteza A,Rasool J.Trust-based user-role assignment in role-based access control//Proceedings of the AICCSA.Amman,Jordan,2007:807-814

共引文献240

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部