Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security event analysis method and system in cloud computing network

A cloud computing network and security event technology, applied in the field of cloud computing network-based security event analysis systems, can solve problems such as delayed attack discovery time, reduced system inspection efficiency, and reduced system inspection efficiency, so as to improve efficiency and speed up the overall The effect of matching efficiency, improving real-time and accuracy

Active Publication Date: 2017-03-15
DAWNING CLOUD COMPUTING TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] When using the state machine model to analyze security events, there are the following problems: 1. When too many security attack scenarios are defined, it is necessary to match each attack scenario to the security event, resulting in a significant decrease in the inspection efficiency of the system; 2. When the attacker cooperates When attacking, it is necessary to maintain too many security states, resulting in a decrease in the inspection efficiency of the system
When using the statistical model, there are the following problems: 1. Not real-time, because the statistical model is based on the database, security events are stored in the database and then counted according to statistical rules, which delays the time of attack discovery; 2. Efficiency issues, statistics is done in the file system, which is less efficient than memory-based analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security event analysis method and system in cloud computing network
  • Security event analysis method and system in cloud computing network
  • Security event analysis method and system in cloud computing network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with the accompanying drawings.

[0026] Such as figure 1 As shown, the security event analysis method in the cloud computing network of an optional embodiment of the present invention includes:

[0027] S101, judging the type of attack scenario;

[0028] S102. When it is determined that the type of the attack scenario is a simple attack process, analyze the security event flow using a character string matching-based model.

[0029] Such as figure 2 As shown, the security event analysis method in the cloud computing network of an optional embodiment of the present invention includes:

[0030] S202. When it is determined that the type of the attack scenario is a complex attack process, analyze the security event flow using a state machine model or a statistical model.

[0031] Specifically, the above attack scenario refers to a series of attack steps taken by the intruder to achieve the intrusion p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security event analysis method in a cloud computing network. The method comprises the following steps that the types of attack scenes are judged; when the type of the attack scenes is judged to be a simple attack process, a model based on character string matching is adopted for analyzing a security event stream. In addition, the invention also provides a security event analysis system based on the cloud computing network. The method and the system provided by the invention have the advantages that the effect of releasing the attack in the attack scene type of the simple attack process from a state machine model can be realized, so the security event analysis efficiency is improved.

Description

technical field [0001] The present invention relates to the field of cloud computing, and more specifically, to a security event analysis method in a cloud computing network and a security event analysis system based on a cloud computing network. Background technique [0002] At present, in SOC (Security Management Platform), commonly used security event correlation analysis models include state machine model and statistical model. The state machine model uses multiple associated state descriptions for multi-step attacks, and some conditions need to be met to switch from one state to the next, that is, the attack characteristics. Match the state transition conditions in the security event flow. If the conditions are matched, it means that the attack characteristics of this stage are satisfied, and the next state is changed. If not, it is discarded until the timeout or all state transitions are completed, indicating that the current state has occurred. The attack indicated b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 郑勇王军林唐明徐博
Owner DAWNING CLOUD COMPUTING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products