A log-based mining system for network node correlation

被引:1
|
作者
Zhang, YZ [1 ]
Fang, BX [1 ]
Chi, Y [1 ]
Yun, XC [1 ]
机构
[1] Harbin Inst Technol, Res Ctr Comp Network & Informat Secur Technol, Harbin 150001, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
network risk assessment; network node correlation; Bayesian network; system log;
D O I
10.1007/1-84628-352-3_17
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the field of network security, people become aware of the importance of study on the connectivity between network nodes. Based on analyzing the connectivity, this paper introduces a conception of network node correlation (NNC) and designs a novel log-based NNC mining system which adopts a typical distributed architecture based on agent. By means of bayesian network, this system can accurately and effectively mine high-level NNCs on application layer. The mined results can provide useful information for some security fields such as network risk assessment, vulnerability and intrusion detection, and virus propagation.
引用
收藏
页码:167 / +
页数:2
相关论文
共 50 条
  • [31] LogTM: Log-based transactional memory
    Moore, Kevin E.
    Bobba, Jayararn
    Moravan, Michelle J.
    Hill, Mark D.
    Wood, David A.
    TWELFTH INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, PROCEEDINGS, 2006, : 258 - +
  • [32] Hybrid Log-based Fault Tolerant scheme for Mobile Computing System
    Zhai, Yongning
    Xu, Zhenpeng
    Zeng, Weini
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 766 - 771
  • [33] ELT: Efficient Log-based Troubleshooting System for Cloud Computing Infrastructures
    Kc, Kamal
    Gu, Xiaohui
    2011 30TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2011, : 11 - 20
  • [34] Toward a Log-based Anomaly Detection System for Cyber Range Platforms
    Blefari, Francesco
    Pironti, Francesco
    Furfaro, Angelo
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [35] Software and Infrastructure Log-Based Framework for Identifying the Causes of System Faults
    Hanakawa, Noriko
    Obana, Masaki
    2018 25TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2018), 2018, : 608 - 617
  • [36] Log-based Intrusion Detection for MANET
    Alattar, Mouhannad
    Sailhan, Francoise
    Bourgeois, Julien
    2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2012, : 697 - 702
  • [37] UiLog: Improving Log-Based Fault Diagnosis by Log Analysis
    Zou, De-Qing
    Qin, Hao
    Jin, Hai
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2016, 31 (05) : 1038 - 1052
  • [38] Robust Log-Based Anomaly Detection on Unstable Log Data
    Zhang, Xu
    Xu, Yong
    Lin, Qingwei
    Qiao, Bo
    Zhang, Hongyu
    Dang, Yingnong
    Xie, Chunyu
    Yang, Xinsheng
    Cheng, Qian
    Li, Ze
    Chen, Junjie
    He, Xiaoting
    Yao, Randolph
    Lou, Jian-Guang
    Chintalapati, Murali
    Shen, Furao
    Zhang, Dongmei
    ESEC/FSE'2019: PROCEEDINGS OF THE 2019 27TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2019, : 807 - 817
  • [39] UiLog: Improving Log-Based Fault Diagnosis by Log Analysis
    De-Qing Zou
    Hao Qin
    Hai Jin
    Journal of Computer Science and Technology, 2016, 31 : 1038 - 1052
  • [40] Temporal Logical Attention Network for Log-Based Anomaly Detection in Distributed Systems
    Liu, Yang
    Ren, Shaochen
    Wang, Xuran
    Zhou, Mengjie
    Sensors, 2024, 24 (24)