[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN107493275A - The extracted in self-adaptive and analysis method and system of heterogeneous network security log information - Google Patents

The extracted in self-adaptive and analysis method and system of heterogeneous network security log information Download PDF

Info

Publication number
CN107493275A
CN107493275A CN201710671932.2A CN201710671932A CN107493275A CN 107493275 A CN107493275 A CN 107493275A CN 201710671932 A CN201710671932 A CN 201710671932A CN 107493275 A CN107493275 A CN 107493275A
Authority
CN
China
Prior art keywords
daily record
logging mode
extracted
adaptive
network security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710671932.2A
Other languages
Chinese (zh)
Inventor
贾四虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sheng Huaan Information Technology Co Ltd
Original Assignee
Beijing Sheng Huaan Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sheng Huaan Information Technology Co Ltd filed Critical Beijing Sheng Huaan Information Technology Co Ltd
Priority to CN201710671932.2A priority Critical patent/CN107493275A/en
Publication of CN107493275A publication Critical patent/CN107493275A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of extracted in self-adaptive of heterogeneous network security log information and analysis method and system, including:Sample daily record is classified according to daily record similarity, constructs the logging mode object per class daily record;Based on logging mode object, original log is classified, obtains daily record classification results;Based on daily record classification results, key business modeling and analysis are carried out.The extracted in self-adaptive and analysis method of heterogeneous network security log information proposed by the present invention, dynamic field is extracted by the regular expression for building optimization automatically, the performance trap that implementation personnel's manual compiling regular expression is likely encountered is avoided, improves the extraction to isomery log information and matching efficiency;Implementation personnel are freed from numerous and diverse ins and outs simultaneously, directed attention on the semantic understanding to daily record.

Description

The extracted in self-adaptive and analysis method and system of heterogeneous network security log information
Technical field
The invention belongs to information security field, more particularly, to a kind of the adaptive of heterogeneous network security log information Extraction and analysis method and system.
Background technology
Enterprise network, server, safety means, operation system can all produce substantial amounts of security log, but these days daily Often data volume is larger, information is scrappy for will data, and great difficulty is brought to safety analysis.Enterprise and safe team more thirst for can The data of operation.
Security information and incident management (SIEM) and Log Administration System have been present for a long time.This system is commonly used Data analysis is carried out in the medium-sized and IT departments of large enterprise.However, in the past ten years, the main application of this technology is Through being changed.Security information and incident management (SIEM) and log management are used primarily for security purpose, i.e., in order to detect into Enter system wooden horse, system detection, it is unauthorized change etc..IT professionals think that SIEM and log management can be used for improving Operation;They, come orientation problem, and help to run team's more effectively management environment using journal file and data.Then, The emphasis that SIEM is used has been turned to conjunction rule from operation, helps to ensure that enterprise is protected with laws and regulations using SIEM and log management Hold unification.
The change of security threat causes the change of safety product.Nowadays, before being analysed in depth, tediously long collection is passed through In, the means such as to collect, standardize, indexing outdated to handle event.Enterprise needs real-time or near real-time point Analysis and reply attack.In order to often be taken a significant amount of time in the effective usage log analysis system of enterprises, operation maintenance personnel It is used for combing Log Types and form with energy, it is therefore necessary to provide a kind of the adaptive of heterogeneous network security log information Extraction and analysis method, improve the efficiency that daily record combs.
The information for being disclosed in background of invention part is merely intended to deepen the reason of the general background technology to the present invention Solution, and be not construed as recognizing or imply known to those skilled in the art existing of the information structure in any form Technology.
The content of the invention
Present invention aim to address heterogeneous network security log critical field in the extraction of current traditional logs and analysis to carry Take complex steps, implementation amount big;Log field extracts relied on regular expression performance heavy dependence and implements personnel's warp Test and without reliable Performance Evaluation means;The accumulation of daily record knowledge base lacks convenient means, the problem of complex management.
According to an aspect of the invention, it is proposed that a kind of extracted in self-adaptive of heterogeneous network security log information and analysis side Method, methods described can include:Sample daily record is classified according to daily record similarity, constructs the logging mode object per class daily record; Based on the logging mode object, original log is classified, obtains daily record classification results;Classified based on the daily record and tied Fruit, carry out key business modeling and analysis.
Preferably, the regular expressions of the logging mode object are matched by the structure structure of the logging mode object Formula, and in the regular expression add daily record dynamic content capture group.
Preferably, the structure of the logging mode object includes:Set of keywords, key sequence number, dynamic content position Put set and dynamic content data type.
Preferably, the regular expression passes through programming automatic generation and optimization.
Preferably, in addition to by manual type the dynamic content is associated with certain semantic, forms generalized daily record.
Preferably, by continuous learning, emerging Log Types is identified and improve logging mode storehouse.
Preferably, logging mode identification and classification are carried out by the way of multithreading.
Preferably, the sample daily record randomly selects.
According to another aspect of the invention, it is proposed that extracted in self-adaptive and the analysis of a kind of heterogeneous network security log information System, the system include:
Memory, it is stored thereon with computer executable instructions;
Processor, following steps are performed during computer executable instructions on memory described in the computing device:
Sample daily record is classified according to daily record similarity, constructs the logging mode object per class daily record;Based on the daily record Schema object, original log is classified, obtain daily record classification results;Based on the daily record classification results, crucial industry is carried out Business modeling and analysis.
Preferably, the regular expressions of the logging mode object are matched by the structure structure of the logging mode object Formula, and in the regular expression add daily record dynamic content capture group.
The beneficial effects of the present invention are:Sample daily record is classified according to similarity, constructs the logging mode per class daily record Object, and by programming automatic generation and optimization regular expression, original log is classified, carry out key business modeling and Analysis, it is cumbersome, real effectively to solve heterogeneous network security log critical field extraction step in traditional logs extraction and analysis It is big to apply workload;Log field extracts relied on regular expression performance heavy dependence and implements personnel's experience and without reliable property Can evaluation measures;The accumulation of daily record knowledge base lacks convenient means, the problem of complex management.
Other features and advantages of the present invention will be described in detail in subsequent specific embodiment part.
Brief description of the drawings
Exemplary embodiment of the invention is described in more detail in conjunction with the accompanying drawings, it is of the invention above-mentioned and its Its purpose, feature and advantage will be apparent, wherein, in exemplary embodiment of the invention, identical reference number Typically represent same parts.
Fig. 1 shows the step of extracted in self-adaptive and analysis method according to the heterogeneous network security log information of the present invention Flow chart.
Fig. 2 shows the flow of the step of method of construction logging mode object according to an embodiment of the invention Figure.
Embodiment
The preferred embodiment of the present invention is described in more detail below.Although the following describe being preferable to carry out for the present invention Mode, however, it is to be appreciated that may be realized in various forms the present invention without should be limited by embodiments set forth herein.Phase Instead, there is provided these embodiments be in order that the present invention is more thorough and complete, and can be by the scope of the present invention intactly It is communicated to those skilled in the art.
Embodiment 1
In this embodiment, can according to the extracted in self-adaptive of the heterogeneous network security log information of the present invention and analysis method With including:Sample daily record is classified according to daily record similarity, constructs the logging mode object per class daily record;Based on logging mode pair As classifying to original log, obtaining daily record classification results;Based on daily record classification results, carry out key business modeling and divide Analysis.
The embodiment solves heterogeneous network security log critical field extraction step in current traditional logs extraction and analysis It is rapid it is cumbersome, implementation amount is big;Log field extract relied on regular expression performance heavy dependence implement personnel's experience and Without reliable Performance Evaluation means;The accumulation of daily record knowledge base lacks convenient means, the problem of complex management.
Fig. 1 shows the step of extracted in self-adaptive and analysis method according to the heterogeneous network security log information of the present invention Flow chart.According to the extracted in self-adaptive of the heterogeneous network security log information of the present invention and divide below with reference to Fig. 1 detailed descriptions The specific steps of analysis method.
Step 101, sample daily record is classified according to daily record similarity, constructs the logging mode object per class daily record.
Specifically, logging mode identification and classification engine are created, the engine includes logging mode identification module and daily record point Generic module, logging mode identification module classify sample daily record according to daily record similarity, construct the logging mode pair per class daily record As.
Fig. 2 shows the flow of the step of method of construction logging mode object according to an embodiment of the invention Figure.Describe the specific steps of the method for the construction logging mode object according to the present invention in detail below with reference to Fig. 2.
Step 201, logging mode storehouse is loaded.
Before learning to arrive new logging mode, pattern classification is carried out merely with the knowledge in logging mode storehouse, with logging mode Study renewal, daily record classification results will follow change.
Step 202, daily record sample is chosen.
In one example, sample daily record randomly selects.
Specifically, according to certain sampling than randomly selecting a number of daily record as sample, and daily record sampling ratio is only Pace of learning is influenceed, sampling ratio can be adjusted by way of changing parameter, with balanced learning speed and resource consumption.
Step 203, dynamic content is identified.
Dynamic content can be based on configuration constantly extension, identify specific dynamic content in sample daily record, include but is not limited to: Content in ipV4 addresses, ipV6 addresses, Time of Day, Email, domain name, mono-/bis-quotation marks etc..
Step 204, daily record similarity is calculated.
The sample daily record for having rejected dynamic content is compared two-by-two and calculates its similarity, meets the two of threshold value for similarity Bar daily record, it can determine whether as same type daily record.
Step 205, identidication key.
Same type daily record is filtered and iterative learning, identify daily record keyword.
Step 206, iterative learning and logging mode object is generated.
Daily record sample size has considerable influence for dynamic content identification and keyword extraction accuracy, is changed using multiple The mode in generation ensures that calculating performance and accuracy of identification is in optimum balance;Pass through the result of iterative learning (daily record keyword and dynamic State content and type) generation logging mode.
In one example, the data structure of logging mode object is as follows:
In one example, the logging mode object factory property and order of each part of daily record, passes through daily record mould The regular expression of the structure structure matching logging mode object of formula object, and daily record dynamic content is added in regular expression Capture group.
Specifically, it is as follows can be based on configuration constantly extension, the data type of dynamic content for dynamic content:
In one example, regular expression passes through programming automatic generation and optimization.
In one example, in addition to by manual type dynamic content is associated with certain semantic, forms generalized daily record.
Specifically, generalized daily record is a kind of general journal format, can include semanteme and core with compatible various daily records Heart attribute, assayer abandons the part nonsensical to safety analysis from daily record dynamic content, and automatically removes canonical table Up to the corresponding capture group in formula;For analyzing significant dynamic content, by assayer consider its practical business implication and with Generalized log field associates;Other generalized fields are improved according to Log Source device type, Log Types supplement, pass through above-mentioned behaviour Make, the original log of various different-formats is more easily converted to generalized daily record by us.
Compared with the artificial generalized of traditional daily record, assayer can concentrate on energy in the business implication of daily record, no Need to carry out the nigglings such as regular expression is write, capture group is set.
In one example, by continuous learning, emerging Log Types is identified and improve logging mode storehouse.
Specifically, when business changes, new Log Types and form mutation can be produced constantly, be ensured by continuous learning The instantaneity and validity of information search;Closed in addition, the accuracy of identification of logging mode and the spatio-temporal distribution of daily record are present Connection, daily record quantity is more, the abundanter accuracy of identification of content is higher.
Step 102, based on logging mode object, original log is classified, obtains daily record classification results.
Specifically, logging mode identification and the daily record sort module of classification engine using programming automatic generation and optimize just Then expression formula is classified to original log, obtains daily record classification results.
In one example, logging mode identification and classification are carried out by the way of multithreading to improve systematic entirety Energy.
Specifically, logging mode identification and the logging mode identification module in classification engine and both daily record sort modules be simultaneously Row operation, is separately operable in different threads, therefore the operation of logging mode identification module will not make to daily record sort module Into significant impact.
Step 103, based on daily record classification results, key business modeling and analysis are carried out.
1) daily record is classified according to the logging mode of self study, and is weighed and whether included according to the diary service degree of association Business diagnosis.
Daily record is classified to be realized with traditional log field extractive technique bottom using regular expression, therefore performance differs It is very few;Because daily record classification employs the regular expression of programming automatic generation, and optimization means are taken, its operational efficiency is bright The aobvious regular expression higher than operation maintenance personnel hand-coding.
2) modeling field, modeling pattern, alarm threshold and data are specified to deposit manually for including the logging mode of analysis Store up the cycle;Modeling pattern includes but is not limited to the frequency, scope, rolling average baseline, periodicity baseline etc.;Alarm threshold can be set It is set to fixed threshold or rolling average (dynamic) threshold value.
The embodiment classifies sample daily record according to similarity, constructs the logging mode object per class daily record, and pass through journey Sequence is automatically generated and optimizes regular expression, and original log is classified, and carries out key business modeling and analysis, effective solution Traditional logs of having determined extract and analysis in heterogeneous network security log critical field extraction step is cumbersome, implementation amount is big;Day Will field extracts relied on regular expression performance heavy dependence and implements personnel's experience and without reliable Performance Evaluation means;Day The accumulation of will knowledge base lacks convenient means, the problem of complex management.
Using example
For ease of understanding the scheme of the embodiment of the present invention and its effect, a concrete application example given below.This area It should be understood to the one skilled in the art that the example, only for the purposes of understanding the present invention, its any detail is not intended to be limited in any way The system present invention.
First, logging mode identification and classification engine are created, the engine includes logging mode identification module and daily record is classified Module, loading logging mode storehouse, logging mode identification module randomly select a number of daily record as sample, Rejection of samples day Dynamic content in will, and pattern-recognition is carried out to sample daily record according to the knowledge in logging mode storehouse, continuous learning identifies newly Schema object, and new logging mode object is added in logging mode storehouse.Then, logging mode identification and classification engine Daily record sort module original log is classified using programming automatic generation and the regular expression that optimizes, obtain daily record point Class result;Daily record classification results are finally based on, carry out key business modeling and analysis.
This classifies sample daily record according to similarity using example, constructs the logging mode object per class daily record, and pass through Programming automatic generation and optimization regular expression, classify to original log, carry out key business modeling and analysis, effectively Solve in traditional logs extraction and analysis that heterogeneous network security log critical field extraction step is cumbersome, implementation amount is big; Log field extracts relied on regular expression performance heavy dependence and implements personnel's experience and without reliable Performance Evaluation means; The accumulation of daily record knowledge base lacks convenient means, the problem of complex management.
It will be understood by those skilled in the art that the purpose of the description to embodiments of the invention is only for exemplarily saying above The beneficial effect of bright embodiments of the invention, it is not intended to limit embodiments of the invention to given any example.
Embodiment 2
According to an embodiment of the invention, there is provided a kind of extracted in self-adaptive of heterogeneous network security log information and analysis are System, the system include:
Memory, it is stored thereon with computer executable instructions;
Processor, following steps are performed during computer executable instructions on memory described in the computing device:
Sample daily record is classified according to daily record similarity, constructs the logging mode object per class daily record;Based on logging mode Object, original log is classified, obtain daily record classification results;Based on daily record classification results, carry out key business modeling and Analysis.
In one example, the regular expression of logging mode object is matched by the structure structure of logging mode object, And the capture group of daily record dynamic content is added in regular expression.
The embodiment classifies sample daily record according to similarity, constructs the logging mode object per class daily record, and pass through journey Sequence is automatically generated and optimizes regular expression, and original log is classified, and carries out key business modeling and analysis, effective solution Traditional logs of having determined extract and analysis in heterogeneous network security log critical field extraction step is cumbersome, implementation amount is big;Day Will field extracts relied on regular expression performance heavy dependence and implements personnel's experience and without reliable Performance Evaluation means;Day The accumulation of will knowledge base lacks convenient means, the problem of complex management.
It will be understood by those skilled in the art that the purpose of the description to embodiments of the invention is only for exemplarily saying above The beneficial effect of bright embodiments of the invention, it is not intended to limit embodiments of the invention to given any example.
It is described above various embodiments of the present invention, described above is exemplary, and non-exclusive, and It is not limited to disclosed each embodiment.In the case of without departing from the scope and spirit of illustrated each embodiment, for this skill Many modifications and changes will be apparent from for the those of ordinary skill in art field.

Claims (10)

1. a kind of extracted in self-adaptive and analysis method of heterogeneous network security log information, it is characterised in that this method includes:
Sample daily record is classified according to daily record similarity, constructs the logging mode object per class daily record;
Based on the logging mode object, original log is classified, obtains daily record classification results;
Based on the daily record classification results, key business modeling and analysis are carried out.
2. the extracted in self-adaptive and analysis method of heterogeneous network security log information according to claim 1, wherein, pass through The structure structure of the logging mode object matches the regular expression of the logging mode object, and in the regular expression The capture group of middle addition daily record dynamic content.
3. the extracted in self-adaptive and analysis method of heterogeneous network security log information according to claim 2, wherein, it is described The structure of logging mode object includes:Set of keywords, key sequence number, dynamic content location sets and dynamic content data Type.
4. the extracted in self-adaptive and analysis method of heterogeneous network security log information according to claim 2, wherein, it is described Regular expression passes through programming automatic generation and optimization.
5. the extracted in self-adaptive and analysis method of heterogeneous network security log information according to claim 2, wherein, also wrap Include and associated the dynamic content with certain semantic by manual type, form generalized daily record.
6. the extracted in self-adaptive and analysis method of heterogeneous network security log information according to claim 1, wherein, pass through Continuous learning, identify emerging Log Types and improve logging mode storehouse.
7. the extracted in self-adaptive and analysis method of heterogeneous network security log information according to claim 1, wherein, use The mode of multithreading carries out logging mode identification and classification.
8. the extracted in self-adaptive and analysis method of heterogeneous network security log information according to claim 1, wherein, it is described Sample daily record randomly selects.
9. a kind of extracted in self-adaptive and analysis system of heterogeneous network security log information, it is characterised in that the system includes:
Memory, it is stored thereon with computer executable instructions;
Processor, following steps are performed during computer executable instructions on memory described in the computing device:
Sample daily record is classified according to daily record similarity, constructs the logging mode object per class daily record;
Based on the logging mode object, original log is classified, obtains daily record classification results;
Based on the daily record classification results, key business modeling and analysis are carried out.
10. the extracted in self-adaptive and analysis system of heterogeneous network security log information according to claim 9, wherein, lead to The structure structure for crossing the logging mode object matches the regular expression of the logging mode object, and in the regular expressions The capture group of daily record dynamic content is added in formula.
CN201710671932.2A 2017-08-08 2017-08-08 The extracted in self-adaptive and analysis method and system of heterogeneous network security log information Pending CN107493275A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710671932.2A CN107493275A (en) 2017-08-08 2017-08-08 The extracted in self-adaptive and analysis method and system of heterogeneous network security log information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710671932.2A CN107493275A (en) 2017-08-08 2017-08-08 The extracted in self-adaptive and analysis method and system of heterogeneous network security log information

Publications (1)

Publication Number Publication Date
CN107493275A true CN107493275A (en) 2017-12-19

Family

ID=60643959

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710671932.2A Pending CN107493275A (en) 2017-08-08 2017-08-08 The extracted in self-adaptive and analysis method and system of heterogeneous network security log information

Country Status (1)

Country Link
CN (1) CN107493275A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108459921A (en) * 2018-02-23 2018-08-28 北京奇艺世纪科技有限公司 Collapse file memory method, device and electronic equipment
CN111221702A (en) * 2019-11-18 2020-06-02 上海维谛信息科技有限公司 Exception handling method, system, terminal and medium based on log analysis
CN116226213A (en) * 2023-02-22 2023-06-06 广州集联信息技术有限公司 Information recommendation system and method based on big data
CN116455678A (en) * 2023-06-16 2023-07-18 中国电子科技集团公司第十五研究所 Network security log tandem method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101399658A (en) * 2007-09-24 2009-04-01 北京启明星辰信息技术有限公司 Safe log analyzing method and system
CN105049247A (en) * 2015-07-06 2015-11-11 中国科学院信息工程研究所 Network safety log template extraction method and device
CN105550378A (en) * 2016-02-04 2016-05-04 贵州电网有限责任公司信息中心 Extraction and analysis method for heterogeneous security log information under complex network system
CN105653444A (en) * 2015-12-23 2016-06-08 北京大学 Internet log data-based software defect failure recognition method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101399658A (en) * 2007-09-24 2009-04-01 北京启明星辰信息技术有限公司 Safe log analyzing method and system
CN105049247A (en) * 2015-07-06 2015-11-11 中国科学院信息工程研究所 Network safety log template extraction method and device
CN105653444A (en) * 2015-12-23 2016-06-08 北京大学 Internet log data-based software defect failure recognition method and system
CN105550378A (en) * 2016-02-04 2016-05-04 贵州电网有限责任公司信息中心 Extraction and analysis method for heterogeneous security log information under complex network system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108459921A (en) * 2018-02-23 2018-08-28 北京奇艺世纪科技有限公司 Collapse file memory method, device and electronic equipment
CN111221702A (en) * 2019-11-18 2020-06-02 上海维谛信息科技有限公司 Exception handling method, system, terminal and medium based on log analysis
CN111221702B (en) * 2019-11-18 2024-02-27 上海维谛信息科技有限公司 Log analysis-based exception handling method, system, terminal and medium
CN116226213A (en) * 2023-02-22 2023-06-06 广州集联信息技术有限公司 Information recommendation system and method based on big data
CN116226213B (en) * 2023-02-22 2023-11-10 广州集联信息技术有限公司 Information recommendation system and method based on big data
CN116455678A (en) * 2023-06-16 2023-07-18 中国电子科技集团公司第十五研究所 Network security log tandem method and system
CN116455678B (en) * 2023-06-16 2023-09-05 中国电子科技集团公司第十五研究所 Network security log tandem method and system

Similar Documents

Publication Publication Date Title
CN110223168B (en) Label propagation anti-fraud detection method and system based on enterprise relationship map
CN105653444B (en) Software defect fault recognition method and system based on internet daily record data
Ektefa et al. Intrusion detection using data mining techniques
CN107577688B (en) Original article influence analysis system based on media information acquisition
CN107872454B (en) Threat information monitoring and analyzing system and method for ultra-large Internet platform
CN107111625A (en) Realize the method and system of the efficient classification and exploration of data
CN102542061B (en) Intelligent product classification method
CN114389834B (en) Method, device, equipment and product for identifying abnormal call of API gateway
WO2008106668A1 (en) User query mining for advertising matching
CN107493275A (en) The extracted in self-adaptive and analysis method and system of heterogeneous network security log information
CN103064971A (en) Scoring and Chinese sentiment analysis based review spam detection method
CN109150873A (en) Malice domain name detection system and method based on PSO_SVM optimization algorithm
CN107392022A (en) Reptile identification, processing method and relevant apparatus
CN105260849A (en) Scientific researcher evaluation method across social networks
CN106027528A (en) WEB horizontal authority automatic identification method and device
CN109657119A (en) A kind of web crawlers detection method based on access log IP analysis
CN109635089B (en) Literature work novelty evaluation system and method based on semantic network
CN117081858A (en) Intrusion behavior detection method, system, equipment and medium based on multi-decision tree
CN112395513A (en) Public opinion transmission power analysis method
CN115794803A (en) Engineering audit problem monitoring method and system based on big data AI technology
CN105138552A (en) Fashion tendency analysis system mining online sale data
CN110166302A (en) A kind of log analysis method based on decision tree, device and storage equipment
Teoh et al. Analyst intuition inspired high velocity big data analysis using PCA ranked fuzzy k-means clustering with multi-layer perceptron (MLP) to obviate cyber security risk
CN116562785B (en) Auditing and welcome system
CN116723005A (en) Method and system for tracking malicious code implicit information under polymorphic hiding

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171219

RJ01 Rejection of invention patent application after publication