Skip to main content

A Dynamic Processing Algorithm for Variable Data in Intranet Security Monitoring

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2021)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12737))

Included in the following conference series:

  • 1386 Accesses

Abstract

Nowadays corporate Intranet Security Monitoring generally relies on SIEM products or SOC platforms. The data comes from a large number of system logs, application running logs and business data, which are generated by network device, security protection device and application systems, etc., is finally stored as normalized data after word segmentation, field parsing and data type mapping. The Intranet Security Monitoring are extremely sensitive to data quality because of the efficiency and accuracy requirements, but the continuous business changes and system upgrades in the intranet environment make both of the data structure and content variable. The existing automated log parsing algorithms are mainly aimed at system logs with a fixed structure, cannot handle variable data with multiple types and structures, besides, the parsing work only completes word segmentation and field parsing. As for data type identification and mapping, there should be several security experts to wait to write static templates, in case the data is changed. In response to the above problems, an ontology model of data knowledge for Intranet Security Monitoring is constructed, and using the computing power of cloud computing, a dynamic processing algorithm for variable data (DPAVD) based on structural information entropy is proposed, in which the correlation between data fields is used as the core factor, can reduce the interference caused by the difference in character expression and meet the requirements of high-quality data for Intranet Security Monitoring.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yao, D., Chen, Y.: Design and implementation of log data analysis management system based on hadoop. J. Inf. Hiding Privacy Protect. 2(2), 1–7 (2020)

    Google Scholar 

  2. Zhu, J., et al.: Tools and benchmarks for automated log parsing. In: Proceedings ICSE-SEIP, pp. 121–130 (2019)

    Google Scholar 

  3. Shima, K.: Length matters: clustering system log messages using length of words (2016). arXiv:1611.03213

  4. Hamooni, H., Debnath, B.K., Xu, J.W., Zhang, H.G., Jiang, F., Mueen, A.: LogMine: fast pattern recognition for log analytics. In: Proceedings of CIKM, pp. 1573–1582 (2016)

    Google Scholar 

  5. Du, M., Li, F.F.: Spell: streaming parsing of system event logs. In: Proceedings of ICDM, pp. 859–864 (2016)

    Google Scholar 

  6. He, P., Zhu, J., Zheng, Z., Lyu, M.R.: Drain: an online log parsing approach with fixed depth tree. In: Proceedings of ICWS, pp. 33–40 (2017)

    Google Scholar 

  7. Messaoudi, S., Panichella, A., Bianculli, D., Briand, L., Sasnauskas, R.: A search-based approach for accurate identification of log message formats. In: Proceedings of ICPC (2018)

    Google Scholar 

  8. Wu, Q., Huang, X.H., Ma, Y., Cong, Q.: A template extraction method for composite log. J. Zhejiang Univ. (Eng. Sci.), 54(8), 1557–1561 (2020)

    Google Scholar 

  9. Harrington, P.: Machine Learning in Action. Post & Telecom Press, Beijing (2017)

    Google Scholar 

  10. Kotenko, I., Saenko, I., Polubelova, O., et al.: The ontology of metrics for security evaluation and decision support in SIEM system. In: Proceedings of ICARS, Regensburg, pp. 638–645 (2013)

    Google Scholar 

  11. Si, C., Zhang, H.Q., Wang, Y.W., Yang, Y.J.: Research on network security situational elements knowledge base model based on ontology. Comput. Sci. 42(5), 173–177 (2015)

    Google Scholar 

  12. Yadav, T., Rao, A.M.: Technical Aspects of cyber Kill Chain. Secur. Comput. Commun. 536, 438–452 (2015)

    Article  Google Scholar 

  13. Li, A.S.: Structural information theory. Commun. CCF 9, 24–30 (2018)

    Google Scholar 

  14. Uma, K.V., Alias, A.: C5.0 decision tree model using tsallis entropy and association function for general and medical dataset. Intell. Autom. Soft Comput. 26(1), 61–70 (2020)

    Google Scholar 

Download references

Acknowledgement

This work is supported by Defense Industrial Technology Development Program (JCKY2018603B006).

Funding

This work is supported by CAEP Foundation (PY2019132 C. R. Zhou, CX2019040 C. R. Zhang).

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhou, C., Wu, G., Li, J., Zhang, C. (2021). A Dynamic Processing Algorithm for Variable Data in Intranet Security Monitoring. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2021. Lecture Notes in Computer Science(), vol 12737. Springer, Cham. https://doi.org/10.1007/978-3-030-78612-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78612-0_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78611-3

  • Online ISBN: 978-3-030-78612-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics