A log-based mining system for network node correlation

被引:1
|
作者
Zhang, YZ [1 ]
Fang, BX [1 ]
Chi, Y [1 ]
Yun, XC [1 ]
机构
[1] Harbin Inst Technol, Res Ctr Comp Network & Informat Secur Technol, Harbin 150001, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
network risk assessment; network node correlation; Bayesian network; system log;
D O I
10.1007/1-84628-352-3_17
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the field of network security, people become aware of the importance of study on the connectivity between network nodes. Based on analyzing the connectivity, this paper introduces a conception of network node correlation (NNC) and designs a novel log-based NNC mining system which adopts a typical distributed architecture based on agent. By means of bayesian network, this system can accurately and effectively mine high-level NNCs on application layer. The mined results can provide useful information for some security fields such as network risk assessment, vulnerability and intrusion detection, and virus propagation.
引用
收藏
页码:167 / +
页数:2
相关论文
共 50 条
  • [21] WiFi LOG-BASED STUDENT BEHAVIOR ANALYSIS AND VISUALIZATION SYSTEM
    Chen, Fan
    Jing, Changfeng
    Zhang, Hongyang
    Lv, Xinxin
    XXIV ISPRS CONGRESS IMAGING TODAY, FORESEEING TOMORROW, COMMISSION IV, 2022, 43-B4 : 493 - 499
  • [22] A light-weight log-based hybrid storage system
    Zhang, Zheng
    Feng, Dan
    Tan, Zhipeng
    Yang, Laurence T.
    Zheng, Jiayang
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 118 : 307 - 315
  • [23] Log-based Anomaly Detection Without Log Parsing
    Van-Hoang Le
    Zhang, Hongyu
    2021 36TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING ASE 2021, 2021, : 492 - 504
  • [24] Log-Based Fault Localization with Unsupervised Log Segmentation
    Dobrowolski, Wojciech
    Iwach-Kowalski, Kamil
    Nikodem, Maciej
    Unold, Olgierd
    APPLIED SCIENCES-BASEL, 2024, 14 (18):
  • [25] On the effectiveness of log representation for log-based anomaly detection
    Wu, Xingfang
    Li, Heng
    Khomh, Foutse
    EMPIRICAL SOFTWARE ENGINEERING, 2023, 28 (06)
  • [26] On the effectiveness of log representation for log-based anomaly detection
    Xingfang Wu
    Heng Li
    Foutse Khomh
    Empirical Software Engineering, 2023, 28
  • [27] Leveraging Log Instructions in Log-based Anomaly Detection
    Bogatinovski, Jasmin
    Madjarov, Gjorgji
    Nedelkoski, Sasho
    Cardoso, Jorge
    Kao, Odej
    2022 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (IEEE SCC 2022), 2022, : 321 - 326
  • [28] Log-Based CRDT for Edge Applications
    Saquib, Nazmus
    Krintz, Chandra
    Wolski, Rich
    2022 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2022), 2022, : 126 - 137
  • [29] A Search Log-Based Approach to Evaluation
    Zhang, Junte
    Kamps, Jaap
    RESEARCH AND ADVANCED TECHNOLOGY FOR DIGITAL LIBRARIES, 2010, 6273 : 248 - 260
  • [30] LogTM: Log-based transactional memory
    Moore, Kevin E.
    Bobba, Jayararn
    Moravan, Michelle J.
    Hill, Mark D.
    Wood, David A.
    TWELFTH INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, PROCEEDINGS, 2006, : 258 - +