A log-based mining system for network node correlation

被引:1
|
作者
Zhang, YZ [1 ]
Fang, BX [1 ]
Chi, Y [1 ]
Yun, XC [1 ]
机构
[1] Harbin Inst Technol, Res Ctr Comp Network & Informat Secur Technol, Harbin 150001, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
network risk assessment; network node correlation; Bayesian network; system log;
D O I
10.1007/1-84628-352-3_17
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the field of network security, people become aware of the importance of study on the connectivity between network nodes. Based on analyzing the connectivity, this paper introduces a conception of network node correlation (NNC) and designs a novel log-based NNC mining system which adopts a typical distributed architecture based on agent. By means of bayesian network, this system can accurately and effectively mine high-level NNCs on application layer. The mined results can provide useful information for some security fields such as network risk assessment, vulnerability and intrusion detection, and virus propagation.
引用
收藏
页码:167 / +
页数:2
相关论文
共 50 条
  • [41] Network Log-Based SSH Brute-Force Attack Detection Model
    Park, Jeonghoon
    Kim, Jinsu
    Gupta, B. B.
    Park, Namje
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01): : 887 - 901
  • [42] Improving Log-Based Field Failure Data Analysis of Multi-Node Computing Systems
    Pecchia, Antonio
    Cotroneo, Domenico
    Kalbarczyk, Zbigniew
    Iyer, Ravishankar K.
    2011 IEEE/IFIP 41ST INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2011, : 97 - 108
  • [43] Enhancing Automata Learning by Log-Based Metrics
    van den Bos, Petra
    Smetsers, Rick
    Vaandrager, Frits
    INTEGRATED FORMAL METHODS (IFM 2016), 2016, 9681 : 295 - 310
  • [44] Process replication with log-based amnesia support
    de Juan-Marin, Ruben
    Irun-Briz, Luis
    Munoz-Escoi, Francesc D.
    ISPDC 2007: SIXTH INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED COMPUTING, PROCEEDINGS, 2007, : 367 - +
  • [45] Study on Network Security Audit System Based on Agent Technology and Log Mining
    Wang, Zhiming
    Liu, Minxia
    Hu, Hui
    Jiang, Wuxue
    ADVANCES IN APPLIED SCIENCE AND INDUSTRIAL TECHNOLOGY, PTS 1 AND 2, 2013, 798-799 : 534 - +
  • [46] Review on Log-Based Anomaly Detection Techniques
    Raut, Pooja
    Mishra, Akanksha
    Rao, Shreya
    Kawoor, Saloni
    Shelke, Sushila
    Deore, Mahendra
    Kumar, Vivek
    PROCEEDINGS OF SECOND INTERNATIONAL CONFERENCE ON SUSTAINABLE EXPERT SYSTEMS (ICSES 2021), 2022, 351 : 893 - 906
  • [47] Log-Based Evaluation Resources for Question Answering
    Mandl, Thomas
    Schulz, Julia Maria
    LREC 2010 - SEVENTH INTERNATIONAL CONFERENCE ON LANGUAGE RESOURCES AND EVALUATION, 2010, : D50 - D52
  • [48] Log-based Service Diagnosis Method in Cloud
    Jia, Zhichun
    Xing, Xing
    2014 INTERNATIONAL CONFERENCE ON MECHATRONICS AND CONTROL (ICMC), 2014, : 1299 - 1303
  • [49] Learning Log-Based Group Work Support: GLOBE Framework and System Implementations
    Liang, Changhao
    Horihoshi, Izumi
    Majumdar, Rwitajit
    Ogata, Hiroaki
    30TH INTERNATIONAL CONFERENCE ON COMPUTERS IN EDUCATION, ICCE 2022, VOL 2, 2022, : 733 - 737
  • [50] Experience Report: Log-based Behavioral Differencing
    Goldstein, Maayan
    Raz, Danny
    Segall, Itai
    2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2017, : 282 - 293