Intranet security threat multi-model collaborative defense method based on credibility
A multi-model, safe technology, applied in computing models, character and pattern recognition, instruments, etc., can solve the problems that predictions cannot obtain comprehensive and accurate results, logs are easy to be tampered with, and cannot be combined and used
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0081] The present invention takes the detection of abnormal log blocks as an example for specific description. The method can use any log parsing algorithm that obtains the log template set by inputting the original log flow set, and any machine learning algorithm. The method flow is as follows: figure 1 In this embodiment, six log parsing algorithms, AEL, Drain, IPLoM, LogSig, SHISO, and Spell, and three machine learning algorithms, decision tree, support vector machine, and logistic regression, are used as examples for illustration. The specific introduction is as follows:
[0082] AEL (Abstracting Execution Logs) is a log parsing algorithm. This algorithm is divided into four steps when parsing the log: the first step is anonymization, the algorithm uses a heuristic method to identify the tags in the log line corresponding to the dynamic variable part; the second step is tokenization, the algorithm based on each line The number of words and parameters in the log divides an...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com