Netinfo Security ›› 2020, Vol. 20 ›› Issue (1): 46-51.doi: 10.3969/j.issn.1671-1122.2020.01.007

Previous Articles     Next Articles

Research on Log Audit Analysis Model of Cyberspace Security Classified Protection Driven by Knowledge Map

TAO Yuan1,3, HUANG Tao2, LI Moyan1,3, HU Wei1,3   

  1. 1. The Third Research Institute of Ministry of Public Security, Shanghai 200031, China
    2. Cyber Security Bureau of Ministry of Public Security, Beijing 100741, China
    3. National Engineering Laboratory for Key Technology of Classified Information Security Protection, Beijing 100142, China
  • Received:2019-07-10 Online:2020-01-10 Published:2020-05-11

Abstract:

In order to audit and analyze security events from massive log data and trace the origin of events, this paper proposes the log audit analysis model of cyberspace security classified protection driven by knowledge map, which integrates security, operation and maintenance, data analysis and evaluation data of classified protection and gains log data. The servers, network devices and security devices are nodes of ontology, the business data flow are the relationships between the two nodes, and the direction of business data flow are the relationship direction. The knowledge map of cyberspace security classified protection log is constructed from four aspects: security management center, secure computing environment, secure area boundary and secure communication network. The efficient association and deep mining analysis of cyberspace log are realized, and the efficiency of audit analysis for cyberspace security abnormal events is improved. So that the data can be analyzed and processed directly without precise modeling. It is suitable for big data analysis of network security log and provides an effective method for solving large scale complex log audit analysis.

Key words: knowledge graph, cyberspace log, classified protection, audit analysis

CLC Number: