首页> 外国专利> LOG-BASED TRACEBACK SYSTEM AND METHOD USING CENTROID DECOMPOSITION TECHNIQUE

LOG-BASED TRACEBACK SYSTEM AND METHOD USING CENTROID DECOMPOSITION TECHNIQUE

机译:基于重心分解技术的基于日志的跟踪系统及方法

摘要

There are provided a system and method for tracing back an attacker by using centroid decomposition technique, the system including: a log data input module collecting log data of an intrusion alarm from an intrusion detection system; a centroid node detection module generating a shortest path tree by applying a shortest path algorithm to network router connection information collected by a network administration server, detecting a centroid node by applying centroid decomposition technique removing a leaf-node to the shortest path tree, and generating a centroid tree whose node of each level is the detected centroid node; and a traceback processing module requesting log data of a router matched with the node of each level of the centroid tree, and tracing back a router identical to the log data of the collected intrusion alarm as a router connected to a source of an attacker by comparing the log data of the router with the log data of the collected intrusion alarm. According to the system and method, an attacker causing a security intrusion event may be quickly detected, a load on the system is reduced, and a passage host exposed to a danger or having weaknesses may be easily recognized, thereby easily coping with an attack.
机译:提供了一种利用质心分解技术对攻击者进行回溯的系统和方法,该系统包括:日志数据输入模块,用于从入侵检测系统中收集入侵警报的日志数据。重心节点检测模块通过对网络管理服务器收集的网络路由器连接信息应用最短路径算法来生成最短路径树,通过应用重心分解技术将叶节点移到最短路径树上来检测重心节点,并生成一个质心树,其每个级别的节点是检测到的质心节点;跟踪处理模块,请求与质心树各个层次的节点匹配的路由器的日志数据,并通过与比较器相连接的方式,将与收集到的入侵报警的日志数据相同的路由器作为与攻击者源连接的路由器进行追溯路由器的日志数据和收集到的入侵警报的日志数据。根据该系统和方法,可以快速地检测出引起安全入侵事件的攻击者,减轻系统上的负担,并且可以容易地识别出处于危险中或具有弱点的通道主机,从而容易地应对攻击。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号