Computer Science ›› 2016, Vol. 43 ›› Issue (Z6): 332-334.doi: 10.11896/j.issn.1002-137X.2016.6A.079

Previous Articles     Next Articles

Method of Duplicate Removal on Alert Logs Based on Attributes Hashing

HU Qian, LUO Jun-yong, YIN Mei-juan and QU Xiao-mei   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Alarm logs generated by network security equipment have a large number of repeated alarms,which impact real-time network situational threat analysis.In order to solve real-time accurate de-duplication problem of alarm logs,we proposed a method of duplicate removal on alert logs based on attributes hash.The method uses attribute hash for duplicate alarms quick detection and uses the hash table to solve the storage problem of a large number of non-repeating alarm logs at the same time.Conducted experiments results in the alarm log based on Darpa data set show that the method ensures lower time complexity,while deduplication accuracy rate can reach 95%.

Key words: Alert log,Repeat alert,Property hash

[1] 郭帆,叶继华,余敏.一种分步式IDS告警聚合模型的设计和实现[J].计算机应用研究,2009,6(1):325-330
[2] 刘夏龙.入侵检测告警数据的过滤与聚合技术研究[D].北京:中国科学院研究生院,2012
[3] Andersson D,Fong M,Valdes A.Heterogeneous Sensor Correlation:A Case Study of Live Traffic Analysis[C]∥ Proceeding of Third Ann.IEEE Information Assurance Workshop:IEEE Computer Society.StuartFeldman,MikeUretsky,New York,USA,June 2002:198-207
[4] Valdes A,Skinner K.Adaptive,Model-Based Monitoring for Cyber Attack Detection[C]∥Proceeding of RAID2000 Conf:RAID 2000.2000:204-217
[5] Valdes A,Skinner K.An Approach to Sensor Correlation[C]∥Proceeding of Int’l Symp:Recent Advances in Intrusion Detection:IEEE Computer Society.2000:197-201
[6] Valdes A,Skinner K.Probabilistic alert correlation[C]∥Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001).Davis,CA,USA,2001,London,UK:Springer,2001:54-68
[7] 王源.一种基于Simhash的文本快速去重算法[D].吉林:吉林大学,2014
[8] 张曼等.基于SHA-1 的邮件去重算法[J].计算机工程,2008,34(11):270-272
[9] 黄思斯.基于多 IDS 系统的攻击场景重建方法的研究[D].武汉:华中科技大学,2007
[10] 黄汉永,肖杰,张驹.一种基于Hash函数抽样的数据集流聚类算法[J].计算机系统应用,2009,8(3):73-75
[11] Mit L L.DARPA 2000 intrusion detection evaluation datasets.(2000).http://ideval.ll.mit.edu/2000 index.html
[12] Mit L L.DARPA1999 intrusion detection evaluation datasets.(1999).http://www.ll.mit.edu/2st/ideval/data/1999/1999_data_index.html
[13] 尹美娟.基于邮件正文的邮箱用户别名抽取[J].计算机科学,2011,8(12):200-202

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!