首页 | 本学科首页   官方微博 | 高级检索  
     

基于知识图谱驱动的网络安全等级保护日志审计分析模型研究
引用本文:陶源,黄涛,李末岩,胡巍.基于知识图谱驱动的网络安全等级保护日志审计分析模型研究[J].信息网络安全,2020(1):46-51.
作者姓名:陶源  黄涛  李末岩  胡巍
作者单位:公安部第三研究所;公安部网络安全保卫局;信息安全等级保护关键技术国家工程实验室
基金项目:国家重点研发计划[2018YFB0803503]。
摘    要:为了从海量的日志数据中审计分析安全事件,并进行事件溯源,文章提出基于知识图谱驱动的网络安全等级保护日志审计分析模型。该模型将安全、运维、数据分析和等级测评数据融合进行日志数据增益;将服务器、网络设备和安全设备作为本体构建节点;将业务数据流作为连接两个节点的关系,业务数据流的方向作为关系的方向。从安全管理中心、安全计算环境、安全区域边界和安全通信网络4个方面构建相应的网络安全等级保护日志知识图谱,实现网络日志的高效关联和深度挖掘分析,可以不需要对问题进行精确建模而在数据上直接进行分析和处理,适用于进行网络安全日志的大数据分析,为大规模复杂日志审计分析的求解提供了一种有效手段。

关 键 词:知识图谱  网络日志  等级保护  审计分析

Research on Log Audit Analysis Model of Cyberspace Security Classified Protection Driven by Knowledge Map
TAO Yuan,HUANG Tao,LI Moyan,HU Wei.Research on Log Audit Analysis Model of Cyberspace Security Classified Protection Driven by Knowledge Map[J].Netinfo Security,2020(1):46-51.
Authors:TAO Yuan  HUANG Tao  LI Moyan  HU Wei
Affiliation:(The Third Research Institute of Ministry of Public Security,Shanghai 200031,China;Cyber Security Bureau of Ministry of Public Security,Beijing 100741,China;National Engineering Laboratory for Key Technology of Classified Information Security Protection,Beijing 100142,China)
Abstract:In order to audit and analyze security events from massive log data and trace the origin of events, this paper proposes the log audit analysis model of cyberspace security classified protection driven by knowledge map, which integrates security, operation and maintenance, data analysis and evaluation data of classified protection and gains log data. The servers, network devices and security devices are nodes of ontology, the business data flow are the relationships between the two nodes, and the direction of business data flow are the relationship direction. The knowledge map of cyberspace security classified protection log is constructed from four aspects: security management center, secure computing environment, secure area boundary and secure communication network. The efficient association and deep mining analysis of cyberspace log are realized, and the efficiency of audit analysis for cyberspace security abnormal events is improved. So that the data can be analyzed and processed directly without precise modeling. It is suitable for big data analysis of network security log and provides an effective method for solving large scale complex log audit analysis.
Keywords:knowledge graph  cyberspace log  classified protection  audit analysis
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号