Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Abnormal access log mining method based on website picture and apparatus thereof

A log and website technology, applied in the field of abnormal access log mining based on website portraits, can solve problems such as low efficiency and unrecognizable problems, and achieve high processing efficiency and high accuracy

Inactive Publication Date: 2017-01-18
成都知道创宇信息技术有限公司
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is mainly to mine the abnormal access of known vulnerabilities, and it is often impossible to identify the abnormal access logs caused by unknown vulnerabilities.
In addition, in order to improve the filtering accuracy, each access log needs to be filtered with all vulnerability signature databases, which is relatively inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal access log mining method based on website picture and apparatus thereof
  • Abnormal access log mining method based on website picture and apparatus thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. The present invention describes website visits by constructing a website portrait of the target website (a multi-dimensional tagged portrait model that describes website features abstracted based on information such as the directory structure of the website, dynamic and static page distribution, and page parameter types). If it exceeds the normal range of the website profile, it can be considered as an abnormal log. Then verify the exception log, feedback and study the verification results, and update the website portrait.

[0022] like figure 1 As shown, the specific description is as follows:

[0023] Step 1: Collect the access logs of the target website within a certain period from the website server or CDN node, clean the access logs, and obtain normal access logs.

[0024] Step 2: Build a website portrait of the target website b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an abnormal access log mining method based on a website picture and an apparatus thereof. The method comprises the following steps of collecting an access log of a target website from a website server or a CDN node, cleaning the access log and acquiring a normal access log; analyzing the normal access log and constructing a website picture of the target website; and using the constructed website picture to analyze a website access log which is analyzed, and filtering an access log which is not in a website picture scope, wherein the access log is an abnormal access log. By using the method and the apparatus of the invention, processing efficiency is high; and accuracy of filtering the abnormal log is high and a unknown loophole can be covered.

Description

technical field [0001] The invention relates to the field of website abnormal access log processing, in particular to a method and device for mining abnormal access logs based on website portraits. Background technique [0002] The existing abnormal access log mining method is to establish a corresponding vulnerability feature database based on the collected public vulnerability descriptions, use the vulnerability feature database to match unanalyzed website access logs, and obtain abnormal access logs. This method is mainly to mine the abnormal access of known vulnerabilities, and it is often impossible to identify the abnormal access logs caused by unknown vulnerabilities. In addition, in order to improve filtering accuracy, each access log needs to be filtered with all vulnerability signature databases, which is relatively inefficient. Contents of the invention [0003] The technical problem to be solved by the present invention is to provide a method and device for mi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/10H04L63/1441
Inventor 邓金城
Owner 成都知道创宇信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products