Movatterモバイル変換


[0]ホーム

URL:


CN107733859A - A kind of Network Safety Analysis system and its analysis method based on big data - Google Patents

A kind of Network Safety Analysis system and its analysis method based on big data
Download PDF

Info

Publication number
CN107733859A
CN107733859ACN201710782915.6ACN201710782915ACN107733859ACN 107733859 ACN107733859 ACN 107733859ACN 201710782915 ACN201710782915 ACN 201710782915ACN 107733859 ACN107733859 ACN 107733859A
Authority
CN
China
Prior art keywords
data
unit
analysis
orcfile
real
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710782915.6A
Other languages
Chinese (zh)
Inventor
谢尧
洪丹轲
杨俊权
徐键
张思拓
吴柳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Southern Power Grid Co Ltd
Original Assignee
China Southern Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Southern Power Grid Co LtdfiledCriticalChina Southern Power Grid Co Ltd
Priority to CN201710782915.6ApriorityCriticalpatent/CN107733859A/en
Publication of CN107733859ApublicationCriticalpatent/CN107733859A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The invention discloses a kind of Network Safety Analysis system based on big data, including MapReduceization unit, pretreatment unit, modeling unit, excavation unit, wooden horse analytic unit, anomaly analysis unit and algorithm recasting unit.Advantage is that the network security based on big data point can save historical data, and after the data such as the IP for finding Trojan characteristics, attacking end and being attacked end, can quickly associate:It was found that attacked which, which user period, and there is which data to leak.Secondly, under big data environment, data largely preserve.If it find that model can not meet user's request, it is only necessary to remake the local new data that obtains using algorithm for individual data and re-establish model.This method eliminates Data Preparation Process, greatly shortens model settling time, improves Exception Model detection efficiency, also greatly reduces the dependence to standalone hardware.

Description

A kind of Network Safety Analysis system and its analysis method based on big data
Technical field
The present invention relates to a kind of Network Safety Analysis system and its analysis method, more particularly to a kind of net based on big dataThe complete analysis system of network and its analysis method.
Background technology
With the development of network, Trojan attack is more and more severe, attacks species and means also become increasingly complex.Unit processingThe ability of wooden horse has not caught up with the development speed of wooden horse, is primarily limited to that memory space is small, data volume is few, to feature detectionEstablished with Exception Model and all run into hardware bottleneck.After user recognizes Trojan characteristics, data before are all lost,It can not detect whether that other users are attacked based on this Trojan characteristics, or the size lost after being attacked.Secondly, for differentNorm type establish, due to small data quantity problem, it is necessary to first prepare data, after establish model.After model is established, if to changeModel, then need to continue gathered data, re-establish model, data volume and memory space be far from for one-of-a-kind systemFoot.
The big data epoch, with the System Development of various big datas, it is already possible to by its huge data group solve withPreceding unit small data defect.But the contact application of unit and big data is still undeveloped, network big data is applied to netNetwork safety analysis still has very big technical bottleneck, hinders the detection efficiency of network security and still needs to larger dependence standalone hardwareEnergy.
The content of the invention
In order to solve the above-mentioned technical problem, present invention aims at provide a kind of Network Safety Analysis system based on big dataSystem and its analysis method.
A kind of Network Safety Analysis system based on big data of the present invention, it is characterised in that including:
MapReduceization unit, for original data source to be carried out into MapReduceization, export orcfile to be pre-treated;
Pretreatment unit, for the data command according to third party's data-interface, orcfile to be pre-treated is carried out on demand pre-Handle and the orcfile of pending data is exported to modeling unit;
Modeling unit, according to the orcfile and mining mode of pending data, real-time calculation type model corresponding to foundation;
Excavate unit, for big data platform carry out data mining and Result is exported to wooden horse analytic unit and/orAnomaly analysis unit;
Wooden horse analytic unit, for being analyzed using Result wooden horse, and the local data needed according to real-time analysisFeed back to algorithm recasting unit;
Anomaly analysis unit, for being analyzed using Result Network Abnormal, and the part needed according to real-time analysisData feedback to algorithm remakes unit;
Algorithm remakes unit, for remaking mining algorithm to the required data of feedback.
Described pretreatment unit includes:
Further Feature Extraction module, for carrying out Further Feature Extraction to orcfile to be pre-treated;
Information completion replacement module, for being carried out according to the instruction that third party's data-interface inputs to orcfile to be pre-treatedInformation completion or information are replaced;
Data normalization module, for unifying range to the like attribute from different data sources;
Data Discretization module, for being layered to the data for specifying data row.
The data of real-time calculation type model/configuration persistence is stored in RDBMS by described modeling unit(Relational databaseManagement system Relational Database Management System)In.
A kind of Network Security Analysis Method based on big data of the present invention, it is characterised in that comprise the following steps:
A, input path is loaded in mapper with Hive driver/Hbase driver/Sequencefile io api;
B, data are judged one by one using effectiveness condition, output KEY is timestamp, and VALUE is the set of target data row;
C, satisfactory data are exported according to orcfile outputformat in reducer;
D, the pretreatment options of the predefined statement configuration file of data mining scene are passed through;
E, real-time calculation type model is established;
F, excavation step is completed by successive ignition;
G, wooden horse analysis and/or anomaly analysis are carried out on unit according to the mining structure of output;
H, according to wooden horse analysis and/or real-time local data's needs of anomaly analysis, repeat step a is until complete to analyze.
The pretreatment options of the step d include Further Feature Extraction, information completion is replaced, data normalization and data fromDispersion.
The data of real-time calculation type model/configuration persistence is stored in RDBMS by described step e.
A kind of Network Safety Analysis system and its analysis method based on big data of the present invention, the advantage is that,Network security based on big data point can save historical data, as IP for finding Trojan characteristics, attacking end and being attacked end etc.After data, can quickly it associate:It was found that attacked which, which user period, and there is which data to leak.ItsSecondary, under big data environment, data largely preserve.If it find that model can not meet user's request, it is only necessary to for individualOther data remake the local new data that obtains using algorithm and re-establish model.This method eliminates Data Preparation Process, contracts significantlyShort model settling time, Exception Model detection efficiency is improved, also greatly reduces the dependence to standalone hardware.
Brief description of the drawings
Fig. 1 is the structural representation of the Network Safety Analysis system of the invention based on big data.
Fig. 2 is the schematic flow sheet of the Network Security Analysis Method of the invention based on big data.
Embodiment
According to Fig. 1, Fig. 2, a kind of Network Safety Analysis system based on big data of the present invention is specifically describedAnd its analysis method, by a variety of data mining algorithm Mapreduceization, unit data digging flow is distributed to more machinesOn, it is parallel to perform, greatly improve data mining efficiency.
Pass through the predefined statement of built-in data mining model(This statement file is the configuration file of json forms), retouchThe original data source required for current data excavation scene is stated, original data source is present in big data platform, initial dataSource is the data original form in external storage to big data platform, and Mapreduceization unit is taken out for the first layer of initial dataTake, according to initial data corresponding to the effectiveness condition extraction that different excavations requires, filter out background noise data.Use HiveDriver/Hbase driver/Sequencefile io api load input path in mapper, and utilize validity barPart judges that data output KEY is timestamp one by one, and VALUE is the set of target data row, then will symbol in reducerClose desired data to be exported according to orcfile outputformat, obtain orcfile to be pre-treated.
Pass through the predefined statement of built-in data mining scene(This statement file is the configuration file of json forms), match somebody with somebodyPut document and determine pretreatment options to being carried out required for orcfile to be pre-treated:1st, Further Feature Extraction:To original numberAccording to being operated, new data row are obtained.2nd, third party's information completion/replacement:Extraneous information is obtained from third party's data-interfaceInitial data is supplemented, for example specific geography information can be supplemented according to srcip/dstip and arranged.3rd, data normalization:Unify its range to the like attribute from different data sources, for example the time is all about set to UNIX timestamp YYYY_MM_DD hh:mm:ss.uuuuuu.4th, Data Discretization:Some data column datas are layered, for example, divide the time into the work hours/underClass's time.Discriminate whether that initial data needs to be pre-processed and need which is carried out according to the definition of data mining sceneThe pretreatment of step, program class name, method and parameter and execution step for performing pretreatment will be clearly indicated in definition.
The newly-built and existing excavation scene of maintenance and management, establishes real-time calculation type model, is newly modeled for the ease of the later stageThe management and maintenance of type, modeling unit is by persistence preservation model data/configuration into RDBMS.
The main of data mining realizes step, verifies input data by step according to built-in excavation plan and carries out dataProcessing, according to different excavation plans, the step of data processing may successive ignition, when each step is disposed(Or certainStep process fails)Afterwards, call result is cleared up into integration step, realizes the Formatting Output to result(Also middle knot can be cleared upFruit)Or result cleans.To realize and the uniformity of result data is externally exported, main result is recorded in ElasticSearch,On MYSQL DB, Hadoop Hbase, including but not limited to Formatting Output, correlation log is recorded, safeguards external linkage etc..
The wooden horse and Network Abnormal of intercepting and capturing are analyzed according to the Result of big data, but during analysisOften occur that partial data deficiency or partial data do not conform to the fault-tolerant events such as rule, then wooden horse analytic unit and anomaly analysis unitThese local data's demand feedbacks to algorithm can be remake unit.Algorithm recasting unit regenerates new calculation for local dataMethod simultaneously re-starts the whole mining process of Mapreduceization circulation until completing all analytical behaviors.
For those skilled in the art, technical scheme that can be as described above and design, make other eachThe corresponding change of kind and deformation, and all these changes and deformation should all belong to the protection model of the claims in the present inventionWithin enclosing.

Claims (6)

CN201710782915.6A2017-09-032017-09-03A kind of Network Safety Analysis system and its analysis method based on big dataPendingCN107733859A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201710782915.6ACN107733859A (en)2017-09-032017-09-03A kind of Network Safety Analysis system and its analysis method based on big data

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201710782915.6ACN107733859A (en)2017-09-032017-09-03A kind of Network Safety Analysis system and its analysis method based on big data

Publications (1)

Publication NumberPublication Date
CN107733859Atrue CN107733859A (en)2018-02-23

Family

ID=61205624

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201710782915.6APendingCN107733859A (en)2017-09-032017-09-03A kind of Network Safety Analysis system and its analysis method based on big data

Country Status (1)

CountryLink
CN (1)CN107733859A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2011120791A1 (en)*2010-03-312011-10-06International Business Machines CorporationTransmission of map-reduce data based on a storage network or a storage network file system
CN104268254A (en)*2014-10-092015-01-07浪潮电子信息产业股份有限公司Security situation analysis and statistics method
CN104753946A (en)*2015-04-012015-07-01浪潮电子信息产业股份有限公司Security analysis framework based on network traffic metadata
CN105354208A (en)*2015-09-212016-02-24江苏讯狐信息科技有限公司Big data information mining method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2011120791A1 (en)*2010-03-312011-10-06International Business Machines CorporationTransmission of map-reduce data based on a storage network or a storage network file system
CN104268254A (en)*2014-10-092015-01-07浪潮电子信息产业股份有限公司Security situation analysis and statistics method
CN104753946A (en)*2015-04-012015-07-01浪潮电子信息产业股份有限公司Security analysis framework based on network traffic metadata
CN105354208A (en)*2015-09-212016-02-24江苏讯狐信息科技有限公司Big data information mining method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
管磊等: "基于大数据技术的网络安全态势感知平台研究", 《保密科学技术》*

Similar Documents

PublicationPublication DateTitle
KR102419451B1 (en)Artificial intelligence based threat analysis automation system and method
US8849623B2 (en)Systems and methods for reservoir development and management optimization
Nguyen et al.Studying the impact of dependency network measures on software quality
CN112181758B (en) A fault root cause location method based on network topology and real-time alarm
CN102750367A (en)Big data checking system and method thereof on cloud platform
CN107302530B (en)Industrial control system attack detection device based on white list and detection method thereof
US20170171097A1 (en)System and user interface for coordinating distributed workflow between multiple computing systems
CN113988690A (en) A kind of risk behavior monitoring method, device and equipment
CN109063483A (en)A kind of leak detection method and system based on path tracing
KR102036707B1 (en)Method for analyzing mission impact factor based on dependency of assets to tasks
CN115408926B (en)Data processing method and device for tunneling rock parameter prediction
EP3721389A1 (en)A method for collaborative machine learning of analytical models
CN117131508A (en) An automated penetration attack testing method and system for intelligent IoT terminal containers
CN114186242B (en)Risk assessment method, device, equipment and medium for software development kit
CN107733859A (en)A kind of Network Safety Analysis system and its analysis method based on big data
Saputra et al.The robustness of machine learning models using MLSecOps: A case study on delivery service forecasting
CN110928761B (en)Demand chain and system and method for application thereof
CN114780967B (en)Mining evaluation method based on big data vulnerability mining and AI vulnerability mining system
Rose et al.Building A Moat: Fortifying Satellite Software from Vulnerabilities
KR20120105752A (en)Psa model modification script of nuclear power plant and psa model mapping algorithm using thereof
Jankovsky et al.Recent Analysis and Capability Enhancements to the ADAPT Dynamic Event Tree Driver.
Tan et al.OSPtrack: A Labelled Dataset Targeting Simulated Open-Source Package Execution
CN119094198B (en)Automatic generation and collection method for attack chain data based on TTPs scripts
Lu et al.Reduction rules and deadlock detecting methods in object oriented petri net models
KR102556463B1 (en)Social advanced persistent threat prediction system and method based on attacker group similarity

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication
RJ01Rejection of invention patent application after publication

Application publication date:20180223


[8]ページ先頭

©2009-2025 Movatter.jp