Netinfo Security ›› 2026, Vol. 26 ›› Issue (4): 626-641.doi: 10.3969/j.issn.1671-1122.2026.04.010

Previous Articles     Next Articles

A High-Confidence Assessment Method for Network Alarm Logs Based on OOD Technology

SHU Zhan1,2,3, MA Yilan4, NIE Kaifeng2, LI Zongpeng1,2,3()   

  1. 1 Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing 100084, China
    2 NSFOCUS Technologies Group Co., Ltd., Beijing 100089, China
    3 Quan Cheng Laboratory, Jinan 250100, China
    4 State Grid Beijing Electric Power Company, Beijing 102100, China
  • Received:2025-09-28 Online:2026-04-10 Published:2026-04-29

Abstract:

To address the issue of a large number of false positives generated by network probes, this paper proposed a high-confidence assessment method for network alarm logs based on OOD technology. This method optimized the alarm feature extraction strategy by constructing a multi-dimensional confidence interval encompassing distance, label consistency, and model score, and combining with BPE tokenization and lightweight models. It also designd a long-short-term iterative optimization mechanism for high-confidence samples to achieve low-overhead automated security operation support while ensuring the accuracy and interpretability of model judgment. Experimental results show that on real SQL injection alarm datasets, the number of parameters of this method is less than 1% of that of traditional deep learning models, the accuracy within the high-confidence interval reaches 0.973, and the sample coverage rate is 66%. Furthermore, the inherent iterative optimization mechanism of the proposed method enables the model to achieve an overall judgment accuracy of 0.965 on the full dataset with only one single iteration. This significantly remedies the deficiency in the judgment of samples falling outside the high-confidence interval in the initial state, and renders the method highly applicable to complex and dynamic cybersecurity operation scenarios.

Key words: alarm logs, OOD detection, confidence interval, attack judgment, automated security operations

CLC Number: