信息网络安全 ›› 2020, Vol. 20 ›› Issue (1): 46-51.doi: 10.3969/j.issn.1671-1122.2020.01.007

• 技术研究 • 上一篇    下一篇

基于知识图谱驱动的网络安全等级保护日志审计分析模型研究

陶源1,3, 黄涛2, 李末岩1,3, 胡巍1,3   

  1. 1. 公安部第三研究所,上海 200031
    2. 公安部网络安全保卫局,北京 100741
    3. 信息安全等级保护关键技术国家工程实验室,北京 100142
  • 收稿日期:2019-07-10 出版日期:2020-01-10 发布日期:2020-05-11
  • 作者简介:

    作者简介:陶源(1981—),男,江苏,副研究员,高级测评师,博士,主要研究方向为等级保护、大数据安全、工控安全;黄涛(1982—),男,山东,博士,主要研究方向为网络安全、大数据安全;李末岩(1978—),男,黑龙江,硕士,主要研究方向为网络安全等级保护;胡巍(1973—),男,北京,高级测评师,本科,主要研究方向为网络安全等级保护。

  • 基金资助:
    国家重点研发计划[2018YFB0803503]

Research on Log Audit Analysis Model of Cyberspace Security Classified Protection Driven by Knowledge Map

TAO Yuan1,3, HUANG Tao2, LI Moyan1,3, HU Wei1,3   

  1. 1. The Third Research Institute of Ministry of Public Security, Shanghai 200031, China
    2. Cyber Security Bureau of Ministry of Public Security, Beijing 100741, China
    3. National Engineering Laboratory for Key Technology of Classified Information Security Protection, Beijing 100142, China
  • Received:2019-07-10 Online:2020-01-10 Published:2020-05-11

摘要:

为了从海量的日志数据中审计分析安全事件,并进行事件溯源,文章提出基于知识图谱驱动的网络安全等级保护日志审计分析模型。该模型将安全、运维、数据分析和等级测评数据融合进行日志数据增益;将服务器、网络设备和安全设备作为本体构建节点;将业务数据流作为连接两个节点的关系,业务数据流的方向作为关系的方向。从安全管理中心、安全计算环境、安全区域边界和安全通信网络4个方面构建相应的网络安全等级保护日志知识图谱,实现网络日志的高效关联和深度挖掘分析,可以不需要对问题进行精确建模而在数据上直接进行分析和处理,适用于进行网络安全日志的大数据分析,为大规模复杂日志审计分析的求解提供了一种有效手段。

关键词: 知识图谱, 网络日志, 等级保护, 审计分析

Abstract:

In order to audit and analyze security events from massive log data and trace the origin of events, this paper proposes the log audit analysis model of cyberspace security classified protection driven by knowledge map, which integrates security, operation and maintenance, data analysis and evaluation data of classified protection and gains log data. The servers, network devices and security devices are nodes of ontology, the business data flow are the relationships between the two nodes, and the direction of business data flow are the relationship direction. The knowledge map of cyberspace security classified protection log is constructed from four aspects: security management center, secure computing environment, secure area boundary and secure communication network. The efficient association and deep mining analysis of cyberspace log are realized, and the efficiency of audit analysis for cyberspace security abnormal events is improved. So that the data can be analyzed and processed directly without precise modeling. It is suitable for big data analysis of network security log and provides an effective method for solving large scale complex log audit analysis.

Key words: knowledge graph, cyberspace log, classified protection, audit analysis

中图分类号: