首页> 外文期刊>Expert Systems with Application >Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach
【24h】

Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach

机译:挖掘和利用知识进行安全事件日志分析:关联规则挖掘和自动计划方法

获取原文
获取原文并翻译 | 示例
       

摘要

Vulnerability assessment and security configuration activities are heavily reliant on expert knowledge. This requirement often results in many systems being left insecure due to a lack of analysis expertise and access to specialist resources. It has long been known that a system's event logs provide historical information depicting potential security breaches, as well as recording configuration activities. However, identifying and utilising knowledge within the event logs is challenging for the non-expert. In this paper, a novel technique is developed to process security event logs of a computer that has been assessed and configured by a security professional, extract key domain knowledge indicative of their expert decision making, and automatically apply learnt knowledge to previously unseen systems by non-experts. The technique converts event log entries into an object-based model and dynamically extracts associative rules. The rules are further improved in terms of quality using a temporal metric to autonomously establish temporal-association rules and acquire a domain model of expert configuration tasks. The acquired domain model and problem instance generated from a previously unseen system can then be used to produce a plan-of-action, which can be exploited by non-professionals to improve their system's security. Empirical analysis is subsequently performed on 20 event logs, where identified plan traces are discussed in terms of accuracy and performance. (C) 2018 Elsevier Ltd. All rights reserved.
机译:漏洞评估和安全配置活动严重依赖专家知识。由于缺乏分析专业知识和对专家资源的访问,此要求通常导致许多系统不安全。众所周知,系统的事件日志会提供描述潜在安全漏洞的历史信息,并记录配置活动。但是,对于非专家而言,在事件日志中识别和利用知识是一项挑战。在本文中,开发了一种新颖的技术来处理由安全专业人员评估和配置的计算机的安全事件日志,提取指示其专家决策的关键域知识,并自动将学习到的知识应用到以前未见过的系统中。 -专家。该技术将事件日志条目转换为基于对象的模型,并动态提取关联规则。使用时间度量来自主建立时间关联规则并获取专家配置任务的域模型,从而在质量方面进一步改善了规则。从以前看不见的系统生成的获取的领域模型和问题实例可以用于生成行动计划,非专业人员可以利用该计划来提高其系统的安全性。随后对20个事件日志执行了经验分析,其中根据准确性和性能讨论了确定的计划跟踪。 (C)2018 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号