TW200837585A - Tracking changing state data to assist in computer network security - Google Patents
Tracking changing state data to assist in computer network security Download PDFInfo
- Publication number
- TW200837585A TW200837585A TW96140097A TW96140097A TW200837585A TW 200837585 A TW200837585 A TW 200837585A TW 96140097 A TW96140097 A TW 96140097A TW 96140097 A TW96140097 A TW 96140097A TW 200837585 A TW200837585 A TW 200837585A
- Authority
- TW
- Taiwan
- Prior art keywords
- session
- query
- time
- information
- index key
- Prior art date
Links
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
200837585 九、發明說明: 【發明所屬之技術領域】 本發明一般係關於 定言之係關於追蹤狀事件管理(SIM或嶋)而特 或另-真實世界:1):^ 狀態資料。 了 Μ結合安全資訊/事件來使用 【先前技術】 之資料.以映網路活動及/或該等裝置的操作 、,2)分析該資料以增強安全性。例如,可以八 析该資料以識別對網路戈_ 刀 次網路裝置之攻擊並決定由哪一 使用者或機器負責。若該攻擊正在進行,則可以執行一抵 抗措施來阻礙攻擊或減輕 - 資料-般發起於由一網路裝置產擊 件、警示或警^ (例如一事 路裝置包括防二丨案中之—項目中。範例性網 口 ‘入偵測糸統及伺服器。該訊息或項 目-般包括反映網路活動何時發生之一時間戳記。、 儘官可以精由使用僅所收集的資料來識別並調查 擊’但擁有額外的資料(例如網路狀態)常常有用。網路狀 態包括(例如)該網路中的各種裝置以及該等裝置係如 接(例如’網路拓樸)。每一裝置亦具有一狀態。此狀 括各種屬性,例如,硬體屬性(例如,該裝置之—媒 取控制(MAC)位址)、邏輯屬性(例如,指派給該裝置之I 網際網路協定(IP)位址)、所有權屬性(例如,擁有該褒置 126190.doc 200837585 之人或實體)、地理屬性(例如 體屬性(例如,安裝於該裳置上之—二:體,敕 (例如,當前登入該裝置:且入屬性 今袖 > 便用者)、程序屬性(例如,火 月仃於㈣置上之_程序)及網路屬 ^ 一作用中網路連接)。 忒雇置之 對已識別為一攻擊的 的眘却π处上 訊心加以考ϊ。該訊息中 ( 的“可“示該攻擊之來源裝置(例如,藉由該裝置: 、)。接著可以使用此1p位址來識別作為同-攻擊的部 分之其他訊息。但是知道該Ip位址係指派給哪—裝° 如’如該裝置之MAC位址或主機名稱所指示)亦切用列 若已知該對裝置/IP位址,則可以將該Ip位址之任何表述回 測到该裝置。而且’若已知登入該裝置之使用者,則可以 將該裝置回溯到該等使用者。若已知該等使用者之職務, 則可以將該等使用者回溯到其職務,而可以結合已接收的 吼息及該等訊息所描述的動作來考量該等職務。 遺憾的係,不容易在任何給定時間決定該網路之狀態。 此係由於該狀態並不恆定,其隨時間變化。特定言之,每 一裝置之狀態隨時間變化。例如,指派給一裝置的ιρ位址 可由於不同動態主機組態協定(DHCP)租用、所使用的不 同虛擬私有網路(VPN)或網路位址轉譯(NAT)而隨時間變 化。作為另一範例,由於各種各樣的人登入及登出,因此 登入一裝置之使用者可以隨時間變化。因此,有用的係不 僅知道該網路之當前狀態而且還知道該網路之過去狀態。 由於一特定裝置之屬性可以改變,因此知道在任何給定時 126190.doc 200837585 間點的正確屬性對於將涉及相同機器或使用者的事件相互 關聯會有用。 對嘗試登人-第二機器之—在—第_機器上的使用者加 以考量。若該使用者在五分鐘内嘗試登入十次而每次皆失 敗,則將標記此發生情形以供檢視,因為其可能表示一攻 擊。假定每-失敗的登人皆產生包括該第_機器的ιρ位址 之一訊息。若該第一機器針對所有十個失敗的登入皆具有 相同的IP位址,則會識別一攻擊。另一方面,若該第一機 器在該攻擊期間改變IP位址,則某些訊息會指示一第一IP 位址而其他訊息會指示一第:IP位址。由於兩個IP位址皆 非用於所有十個失敗的登人’因此不會作任何標記以供檢 視。此係稱為一錯誤否定。 在此情況下,知道在該可能攻擊之時該網路的狀態將會 有用。例如,在每一失敗的登入訊息之時,知道該1?位址 係指派給哪一裝置(例如,依據MAC位址或主機名稱)將會 有用。若此係已知,則即使該等失敗的登入係來自不同卟 位址,亦可以將該等1P位址回溯到同一裝置而將識別一攻 擊。由於MAC位址及主機名稱之改變不如Ip位址頻繁而使 此舉成為可能。換言之’ IP位址比MAC位址及主機名稱更 具瞬變性。 應注意改變IP位址亦可能引起錯誤警報。就上述範例順 勢而u對來自一來源裝置的四個失敗登入與來自另一來 置的/、個失敗登入加以考量,每一登入皆發生於一五 刀鐘的時間跨度内而指向同一機器。冑管該等來源裝置不 126190.doc 200837585 同,而且其永遠不會同時具有相同的IP位址,但每一裝置 在該裝置造成一失敗登入之時皆具有相同的Ip位址。由於 此同一ip位址係存在於所有十個失敗的登入訊息中,因此 會標記此發生情形以供檢視。此係稱為一錯誤肯定。 需要一種以一高效率的方式保持並查詢改變片大態資料以 便可以結合安全資訊/事件來即時使用該資料之方法。 【發明内容】 網路狀態隨時間變化。特定言之,每一裝置之狀態隨時 間變化。若-狀態屬性(例如網際網路協定(ιρ)位址)隨時 間變化,則該屬性之-特定值對於—特定時間週期(吾等 將其稱為"會期")有效。—般地,可以將-會期視為兩個實 體(例如 “-200837585 IX. INSTRUCTIONS OF THE INVENTION: TECHNICAL FIELD OF THE INVENTION The present invention generally relates to a tracking system for tracking event management (SIM or 嶋) or special-real world: 1): ^ status data. Μ Combine security information/events to use [prior art] data to reflect network activity and/or operation of such devices, and 2) analyze the data to enhance security. For example, the data can be analyzed to identify attacks on the network device and determine which user or machine is responsible. If the attack is in progress, a resistance measure can be enforced to block the attack or mitigate - the data is generally initiated by a network device that produces a strike, warning, or alert (eg, a device that includes a second case) The example network port 'into the detection system and the server. The message or project - generally includes a time stamp reflecting when the network activity occurs., the official can use the collected data to identify and investigate It is often useful to have additional information (such as network status). Network status includes, for example, various devices in the network and such devices are connected (eg, 'network topology'). Has a state, which includes various attributes, such as hardware attributes (eg, the device's media access control (MAC) address), logical attributes (eg, I Internet Protocol (IP) assigned to the device) Address), ownership attribute (for example, the person or entity that owns the device 126190.doc 200837585), geographic attributes (such as body attributes (for example, installed on the skirt - two: body, 敕 (for example, current login) Device: Into the attribute sleeve [> user], program attributes (for example, the fire moon is placed on the (four) set of _ program) and the network is a function of the network connection) 忒 the employment pair has been identified For the attacker's discretion, π is on the heart of the message. The message "may "show the source device of the attack (for example, by the device: , ). Then you can use this 1p address to identify Other information as part of the same-attack. However, knowing which Ip address is assigned to it--such as 'as indicated by the device's MAC address or host name' is also used if the device/IP is known. The address can be returned to the device by any representation of the IP address, and 'if the user is logged into the device, the device can be traced back to the user. If such users are known The position can be traced back to the position of the user, and can be considered in conjunction with the received message and the actions described in the message. Unfortunately, it is not easy to decide at any given time. The state of the network. This is because the state is not constant. It varies over time. In particular, the state of each device changes over time. For example, the address assigned to a device can be leased by different Dynamic Host Configuration Protocol (DHCP), using different virtual private networks ( VPN) or Network Address Translation (NAT) changes over time. As another example, users of a device can change over time due to various people logging in and logging out. Therefore, useful systems are not only useful. Know the current state of the network and also know the past state of the network. Since the attributes of a particular device can change, it is known that the correct attribute at any given time 126190.doc 200837585 will be for the same machine or user. It is useful to correlate events. Consider the user who is trying to board the person - the second machine - on the - machine. If the user attempts to log in ten times within five minutes and fails each time, the occurrence will be flagged for review as it may indicate an attack. It is assumed that each-failed person has a message including one of the ιρ addresses of the first machine. An attack is identified if the first machine has the same IP address for all ten failed logins. On the other hand, if the first machine changes the IP address during the attack, some messages will indicate a first IP address and other messages will indicate a first: IP address. Since neither IP address is used for all ten failed logins, there is no markup for inspection. This is called a false negative. In this case, knowing the state of the network at the time of the possible attack will be useful. For example, at the time of each failed login message, it will be useful to know which device the 1st address is assigned to (e.g., depending on the MAC address or host name). If this is known, then even if the failed logins are from different addresses, the 1P addresses can be traced back to the same device and an attack will be identified. This is made possible because the MAC address and host name changes are not as frequent as the Ip address. In other words, the IP address is more transient than the MAC address and host name. It should be noted that changing the IP address may also cause an error alert. With regard to the above example, u consider the four failed logins from one source device and the failed logins from another source. Each login occurs within a five-hour time span and points to the same machine. Although the source devices are not the same, and they never have the same IP address at the same time, each device has the same IP address when the device causes a failed login. Since this same ip address exists in all ten failed login messages, this occurrence is flagged for review. This is called a false positive. There is a need for a method of maintaining and querying changes to large-scale data in an efficient manner so that the information can be used immediately in conjunction with security information/events. SUMMARY OF THE INVENTION The network state changes over time. In particular, the state of each device changes over time. If the state attribute (such as the Internet Protocol (ιρ) address) changes over time, the specific value of the attribute is valid for a specific time period (which we call "session"). In general, you can think of the session as two entities (eg "-
裝置與-ΠΜ立址或—人與一資產)之間的一關 聯,該關聯對於一特定時間週期有效。 會期資訊可自己或與其他資却^ 貝訊(例如,從該等網路及/或 網路裝置收集的其他資料儲在 、I貝才十储存或安全資訊事件)結合使 用。會期資訊可用於相互關聯、稽核、將動作與使用者關 聯、將使用者與業務職務關聯、識別裝置、依據使用者及/ 或職務來實施公司政策、過據事件、報告等。例如,可以 依據規則將會期資訊與其他資 、 —、 貝汛關聯以識別及/或調查攻 擊或反常行為。安全資訊/事件 匕括反映網路活動何時發 生之牯間戳記。在將此等事件盥合 一 ’、㈢功身訊關聯時,該會期 貧訊反映在該等時間戳記的時 了间有政之會期。 針對每一類會期,保持一會期 ^, ^ φ ^ /表。一會期表包括一或多 筆δ己錄’其中母一記錄代表一 曰4。會期記錄資訊係儲存 126190.doc -9 - 200837585 於各個欄位中。總體上,此等欄位包含用於該會期資訊之 一結構描述(schema^每一結構描述包括三類攔位:索引 鍵攔位、值攔位及時間戳記攔位1支援查詢/查閱操作 而將會期資訊描述為索引鍵與值。 可以將-會期表與一過濾器關聯。該過濾器描述一定義 由該會期表管理的資料之條件集合(例如,可用於哼表中 的記錄之一索引鍵集合)。藉由使用-過濾器而二對照An association between a device and a site or a person and an asset that is valid for a particular time period. Information for the session can be used in conjunction with other resources, such as other information collected from such networks and/or network devices, or in the event of a security information event. In-session information can be used to correlate, audit, link actions to users, associate users with business positions, identify devices, implement company policies, report events, reports, etc. based on users and/or positions. For example, it is possible to identify and/or investigate attacks or anomalous behaviors based on rules to associate information with other funds, —, and Bessie. Safety Information/Events Includes a day stamp that reflects when a network activity occurs. When these events are combined into one's and (3) sects, the session's poor news is reflected in the time of the political time between the time stamps. For each type of session, keep a period of ^, ^ φ ^ / table. A schedule includes one or more δ recorded </ br> wherein the parent record represents a 曰 4. The session information is stored in 126190.doc -9 - 200837585 in each field. In general, these fields contain a structure description for one of the session information (schema^ each structure description includes three types of blocks: index key block, value block and timestamp block 1 support query/view operation The information is described as an index key and a value. The -session table can be associated with a filter that describes a set of conditions that define the data managed by the session table (eg, can be used in a table) Record one of the index key sets). By using the - filter and the second control
可用會期資訊評估一事件所需要的時間減少,因為消除對 會期資訊之不必要的查閱。 填充一會期表之一方式係使用包含於安全資訊/事件中 的資料。建立規則來識別與會期資訊相關之事件、擷取會 期資訊並使用該會期資訊來修改—會期表(例如,藉由建 立、修改或終止-會期記錄)。依賴事件來開始與結束會 期可能產生-不精確的會期表。此等問題可以係、藉由使二 規則來依據已接收的事件隱式地衫會期邊界而得到解The time required to assess an event can be reduced with the duration information, as unnecessary review of the information for the session is eliminated. One way to fill a session is to use the information contained in the security news/event. Establish rules to identify events related to the duration information, capture session information, and use the duration information to modify—the schedule (for example, by establishing, modifying, or terminating-session records). Depending on the event to start and end the session may result in an inaccurate schedule. These problems can be solved by making the second rule based on the received event implicitly the boundary of the meeting.
在-會期開始或結束與將此資訊輸入進一會期表的時間 之間可能有-延遲。有時該延遲較小。在此情況下,在嘗 4將一安全事件與該會期資料關之前的 有時該延遲較大。在此情況下,會期資訊可二 因為已在胃B夺間間隔的會期資訊與各種安纟事件之間嘗試 關聯。在-具體實施例_,在此情況下,再次執行關聯以 利用晚接收的會期資訊。 字^ W表为割成使得每一會期表分割區内的記錄數目 126190.doc -10- 200837585 減少。由此減少執行每一杳 %# % . 查1 2 3旬所需要的資源數量。對一合 /表進仃週期性處理以使得該等作用 ^ 分割區。此特徵係稱為”會期上捲,,i冑至该當雨 用中的情況下立纪锊验乂 一保證在一會期係作 合期〜將位於當前分割區内。換言之,現場 當前分捲至#前分割區以使得在該 月J刀口j Q中輕易便可獲得 作用中會期所需要的資㈣量=會期上捲使得存取一 分割區。 要◊貝源數里減少,因為僅需要查詢當前 【實施方式】 ::參考各個圖示範例來說明本系統,但不應將此等 文:Γ限制本發明之更廣泛的精神及範嘴。例如,本 2之範例說明安全資訊/事件、會期表及記錄,其 更廣泛Γ月之一具體實施例。本發明之一般概念及外延是 、’而且可延伸至任何以電腦為主或以網路為主之 126190.doc 1 而且’可以傳遞至該系統之組件及從該系統之 =傳遞的訊息’以及可供該系統之組件使用之資料結構 描:㈣例係為嘗試進一步說明本發明而提出,並無作為 t無退之範例的用意,因此不應將其如此看待。 2 、、返後之存細說明的某些部分係以對一電腦記憶體内之資 料進:運异的演算法及符號表示來提出。此等演算法說明 :表π係热習電腦科學技術者用來向其他熟習此項技術者 t效地傳達其卫作之實質内容的卫具。本文中以及在一 月下廣异法係構想為產生一所需結果之一自恰的步 3 】亥等步驟係需要對實體數量實體操控的那些步 200837585 驟。通常,但並非必定,此等數量採用能夠儲存、傳輪、 組合、比較以及其他方式操控之電氣或磁信號之形式。已 證明有時方便的係(主要基於常用原因)將此等信號稱為位 兀、值、元件、符號、字元、術語、數字或類似物。不 過,應§己住所有此等及類似術語皆應與適當實體數量相 關’並僅係應用於此等數量之方便標記。除另有明確表述 卜應月白在全篇說明中,使用諸如"處理"或”計曾" 或運异"或"決定"或"顯示”或類似術語表示一電腦系統或 類=之電子§十异裝置的動作及程序,其對該電腦系統之暫 存器及記憶體内表示為實體(電子)數量之資料進行操控, 並將其轉換為該等電腦系統記憶體或暫存器或其他此類資 訊儲存、傳輸或顯示裝置内同樣表示為實體數量 資 料。 貝 斤示本發明之一具體實施例係例示於電腦軟體 中,该電腦軟體即電腦可讀取的指令,其在藉由一或多個 :腦處理器/系統來執行時指示該等處理器/系統執行所指 疋的動作。此類電腦軟體可以係駐留於一或多個電腦可讀 士茱體中例如硬碟驅動器、CD_R〇M、DVD-ROM、唯 貝°己隐體、碩取與寫入記憶體等等。此類軟體可以係分佈 =此j媒體之一或多個媒體上,或者可以令此類軟體可供 •如:或多個電腦網路(例如網際網路)來下載。無論格式 何本文所述之電腦程式化、重現及處理技術皆僅係可 = = = ¼本發明各方面的程式化、重現及處理技術類型之 多考附本說明内容的申請專利範圍將十分清 126190.doc -12- 200837585 楚地瞭解,此等範财應對本發明構成任何 會期介紹 —如上面之說明’網路狀態並非恒定,其隨時間變化。特 Γ …’每-裝置的狀態隨時間變化。若—狀態屬性(例 如網際網路協定(π>)位址)隨時間變化,則該屬性之一特定 值對於―料時間週期(吾等將其稱為”會期")有效。與一 會期關聯的資訊("會期資訊”)包括(例如):一第一時間戳 記,其指示該會期之開始;—第二時間戮記,其指示該會 期之結束(若該會期已結束);一第三時間戮記,旦指示一 會期記錄之建立(如下所述);以及在該會期期間有效的一 或多筆資料。 考量已經由一動態主機組態協定(DHCP)租用來接收一 IP 位址之一裝置。該一或多筆資料可能包括、)一卟位址(以 及,若㈣位址在全球並非唯一,則係一包含餅位址之 網路區域以及b)接受該所指派Ip位址的裝置之一指示 (例如汶裝置之主機名稱及/或媒體存取控制(MAC)位 址)(網路區域係一網路區段)。一標記識別一網路區域 且係用於將私有位址空間彼此區分開)。同樣,考量已經 由一虛擬私有網路(VPN)登入來接收一巧位址之一裝置。 除上述(a)與(b)外,該一或多筆資料亦可能包括起始該 VPN登入時所使用之一使用者名稱。作為另一範例,考量 已經由網路位址轉譯(NAT)而以一 ιρ位址來特徵化之一裝 置。在此,該一或多筆資料可能包括··句一 Ip位址(以及, 若忒IP位址在全球並非唯一,則係一包含該位址之網路 126190.doc -13- 200837585 區域);以及b)接受該經由轉譯所指派卩位址的裝置之一指 不(例如,該裝置之主機名稱及/或實際IP位址及來源埠)。 還可以使用會期來模型化其他裝置狀態屬性。考量允許 其他使用者從一第二裝置(”來源裝置,,)登入其上之一第一 裝置目的地裝置”)。該一或多筆資料可能包括:該目 的地裝置之一IP位址(以及可以係網路區域);…該來源裝 置之一指示(例如,該來源裝置的主機名稱及/或IP位址及 ΓThere may be a -delay between the start or end of the session and the time it takes to enter this information into a schedule. Sometimes the delay is small. In this case, sometimes the delay is greater before the security event is closed to the session data. In this case, the information of the session can be two because there is an attempt to correlate between the information of the session between the stomach and the various ampoule events. In the specific embodiment, in this case, the association is performed again to utilize the meeting information of the late reception. The word ^ W table is cut so that the number of records in each session table partition area is reduced by 126190.doc -10- 200837585. This reduces the amount of resources required to perform each 杳%#%. Periodic processing of the com/tables to make the roles ^ partitions. This feature is called "the period of the roll, and the case is to be used in the case of the rain. The first time to ensure that the system will be closed in one session~ will be located in the current segment. In other words, the current site Split the volume to #前分区 so that the amount of money required for the session can be easily obtained in the J-knife j Q of the month (four) = the roll-up of the session makes access to a divided area. Because the only need to query the current [embodiment] :: refer to the various graphical examples to illustrate the system, but should not be used to limit the broader spirit and scope of the present invention. For example, the example description of this 2 Safety information/events, schedules and records, which are more extensive in one month. The general concept and extension of the present invention are, and can be extended to any computer-based or network-based 126190. Doc 1 and 'the information that can be passed to the components of the system and the messages passed from the system' and the structure of the data that can be used by the components of the system: (4) The examples are presented in an attempt to further illustrate the invention, not as a t The purpose of the non-returning example, therefore It should be treated as such. 2, and some parts of the description of the back-to-back are presented in terms of the data in a computer memory: the algorithm and symbolic representation of the algorithm. These algorithms show: Table π It is used by computer science and technology technicians to convey the essence of their health to other people who are familiar with the technology. In this article and in January, the broad legal system is conceived to produce one of the desired results. Just step 3] steps such as Hai are those steps that need to be manipulated on the entity quantity entity. Usually, but not necessarily, these quantities use electrical or magnetic signals that can be stored, transferred, combined, compared, and otherwise manipulated. Forms. It has proven convenient at times (mainly for common reasons) to refer to such signals as bits, values, elements, symbols, characters, terms, numbers or the like. However, § should have all of this and Similar terms should be related to the number of appropriate entities' and are only used for convenience markings of these quantities. Unless otherwise expressly stated, Bu Yingyue uses the entire article in the description, such as "processing" or "计曾" Or "transfer" or "decision" or "display" or similar terms to refer to the operation and program of a computer system or class of electronic § singular devices, the register and memory of the computer system The information contained in the physical (electronic) quantity is manipulated and converted into the computer system memory or register or other such information storage, transmission or display device as the entity quantity data. An embodiment of the present invention is exemplified in a computer software, that is, a computer readable command that instructs the processor/system to execute when executed by one or more: brain processors/systems The action of the computer. This type of computer software can reside in one or more computer-readable scorpions such as hard disk drives, CD_R〇M, DVD-ROM, vista, hidden and written. Memory and more. Such software can be distributed = one or more media of this j media, or such software can be made available for downloading such as: or multiple computer networks (such as the Internet). Regardless of the format, the computerized stylization, reproduction, and processing techniques described herein are only for === 1⁄4. The scope of the patent application for the stylization, reproduction, and processing techniques of the various aspects of the invention will be It is clear that 126190.doc -12- 200837585 Chu understands that these speculations should constitute any introductory presentation of the invention - as explained above - the network state is not constant, it changes over time. The state of each device ... varies with time. If a state attribute (such as an Internet Protocol (π>) address) changes over time, then a particular value of the attribute is valid for the material time period (which we call "session"). The information associated with the session ("session information) includes, for example: a first timestamp indicating the beginning of the session; a second time note indicating the end of the session (if the meeting The period has ended; a third time note, indicating the establishment of a session (as described below); and one or more materials valid during the session. Consider a device that has been leased by a Dynamic Host Configuration Protocol (DHCP) to receive an IP address. The one or more pieces of data may include, for example, an address (and, if the (four) address is not unique worldwide, a network area including the cake address and b) a device that accepts the assigned IP address An indication (such as the host name and/or media access control (MAC) address of the device) (the network area is a network segment). A tag identifies a network area and is used to distinguish private address spaces from each other. Similarly, consideration has been made by a virtual private network (VPN) login to receive one of the devices. In addition to (a) and (b) above, the one or more pieces of information may also include a username used to initiate the VPN login. As another example, consideration has been made by network address translation (NAT) to characterize one device with a single address. Here, the one or more pieces of data may include a sentence-Ip address (and, if the IP address is not unique worldwide, a network including the address 126190.doc -13-200837585 area) And b) accepting one of the devices assigned to the address via the translation (eg, the host name and/or actual IP address and source of the device). You can also use the duration to model other device state properties. Consideration allows other users to access one of the first device destination devices "" from a second device ("source device,"). The one or more pieces of data may include: an IP address of the destination device (and may be a network area); ... one of the source devices indicates (eg, the host name and/or IP address of the source device and Γ
Cj 、罔路區域),以及c)其他登入資訊(例如,在該來源機器使 用的使用者名稱及/或在該目的地機器使用的使用者名 稱)。 儘官上述會期資訊係關於網路,但許多不同類型的資訊 對於-特定時間週期有效而因此可以藉由使用會期來加以 代化例如,可以藉由使用會期來模型化關於實體世界 之貝Λ 貝產(例如一電腦)可以係歸一人或實體所有或 係指派給一人或實體。人可以係存在於一實體位置。可以 將-電話號碼指派給一人。此等狀態之每一狀態皆係暫時 的而因此可以藉由使用一會期來模型化。 般地,可以將一會期視為兩個實體(例如一裝置與一 ΙΡ位址或—人與—資產)之間的—Μ,其對於-特定時 間:期有效。會期資訊可以係自行使用或與其他資訊 如攸網路及/或網路裝置收集的其他資料儲存或安全資 事件)結合使用。會期資訊可用於關聯、審計、將動作與 使用者Μ、將使用者與業務職務關聯、識別裝置 使用者及/或職務來實施公司政策、過濾事件、報告等。 126190.doc -14- 200837585 例如,若在員工進入及離開辦公室時需要用其身份證刷 卡,則可能產生以下報告:雇員上班所用平均時數及雇員 進入及離開辦公室之時間模式。 作為另一範例,可以依據規則將會期資訊與其他資訊關 . 聯以識別及/或調查攻擊或反常行為。回顧安全資訊/事件 • 包括反映網路活動何時發生之時間戳記。在將此等事件與 會期資訊關聯時’該會期資訊反映在該等時間戮記的時間 (、 有效之會期。範例性關聯包括: a) 識別與-特定的人關聯之事件,即一裝置/人會期表決 定哪—裝置歸該人所有或係指派給該人。一 ^ 定該:的裝置已登入哪-裝置以及已從該些裝置 裝置等。識別從該些裝置發起之事件。 b) 識別從該使用者位置以外之一位置啟動之一登入,一 =入會期表決定哪些使用者名稱及來源裝置已登入一目標 哀置。-資料儲存決定哪些真實的人對應於該等使用者名 C :美以及該等來源裝置位於何處。-位置/人會期表決定該 等真實的人位於何處(例如,依據近來為進入一室或建築 • 物而對一證章或身份證之刷卡)。將該等真實的人之位置 與該等來源裝置之位置相比較。 決定從經由VPN存取該網路的機器(將包含於該訊息中 之與攻擊相關⑽位址與在一 νρΝ會期表中的靠址相比 較)產生之攻擊之一移動平均線。 d)決定從經由卿存取該網路的使用者(將包含於該訊息 之與攻擊相關的„>位址與在一侧會期表中的π位址相 126190.doc -15- 200837585 動平均線。決定該等記錄中匹配 比較)產生之攻擊之一 的使用者名稱。 e)識別在該機器發起—攻 括啟動該攻擊的梦置t U—攻擊相關之一訊息包 間戳W八入 指示與指示該攻擊的啟動之-時 間减,己)登入一機器之使用者。一八 初〈時 間哪些使用者名稱係登入該裝置。豆入會期表決定在該時 在一具體實施例中,一招 集、分組及觸發)組合之、匕3視需要與其他構造(聚 可以係用於許多方面,例如早二:雜條件集合。-規則 估進入事件,用於藉由使用規則關聯子 用中列表、會期列# b a a /、他構k (如作 M 月列表及威脅位準運算)將來自不同事件的 貝机關聯,·用於推斷關於事件重要性之意義,·以的 應於事件啟動即時動作。 ;回 直=專Γ案第10/308,415號中進—步說明關聯與規則, 八王邛内令係以引用的方式併入於此。 儲存會期資料之架構 J情每一類會期,保持-會期表。例如,一會期表保持 衣置及IP位址相關的會期資訊而另一會期表包含與人及 資產關聯的會期資訊。一會期表包括一或多筆記錄,其中 每一記錄代表-會期。例如,一裝置/Ip位址會期會描述將 一特定IP位址指派給一特定裝置之一時間週期。此記錄將 係儲存於-裝置/IP位址會期表中。在一具體實施例中,一 會期表類似於一會期列表,此係ArcSightTM企業安全管理 幸人體(ESM)4.〇(可從加州Cupertin(^ ArcSight公司購得)之 126190.doc • 16 - 200837585 一特徵。 f: 回顧會期資訊包括(例如):-第-時間戳記,其指μ 會期之開始;一第二時間戳記,其指示該會期之結束(若 該會期已結束);-第三時間戳記,其指示一會期記錄之 建立(如下所述以及在該會期期間有效的一或多筆資 料。此資訊係儲存於—會期記錄中。該第三時間戮記指干 何時建立該會期記錄。應注意,網路延時可能在一會期的 開始與對應於該會期的記錄之建立之間引起一時間間隙。 會期記錄資訊係儲存於各個攔位中。總體上,此等欄位 包含用於該會期資訊之一結構描述。不同類型的會期資訊 可能具有不同的結構描述。圖1顯示用於不同類型會期資 訊之範例性結構描述。圖示結構描述係臟ρ、卿、、 τ且入及貝產所有權。圖”,每一矩形代表一攔 位0 母、、、口構描述包括二類攔位··索引鍵攔位、值搁位及時 間戳記攔位。在一具體實施例中,為支援查詢/查閱操作 而將會期資訊描述為索引鍵與值。(查詢操作係用於存取 该會期表甲的資訊而下面進一步加以說明。)在此具體實 知例中# f期表會指定將一記錄之一或多個欄位用作 索引鍵(”素引鐽攔位”)。一記錄之一或多個其他搁位將會 用作值(值攔位”)。例如,在一裝置Μ位址會期表中,該 IP位址(以及可ri总b h 一 糸、、、罔路區域)可以係用作一索引鍵,而其 他9 J貝Λ (例如,主機名稱及MAC位址)可以係用作該等 值0 126190.doc 200837585 時間截記攔位(包括開始時間欄位 立時間欄位)皆包含如上所述之一時嶋(除=二及: 未結束,在此情況下該結束時間搁 ^^ 始時間搁位值與結束時間搁位值係用於識别在= 間實例針對一給定索引鍵之—有效會期。例如,二Γ 索引鍵及一特定的時間戮記,則若該索引鍵映射至;= ’則適當的值攔位集合係其開始時間與 包圍該時間戳記之一攔位。 ’ 圖1顯示針對每一結構描述索 鍵欄位、時間戳記襴 位及值攔位。一或多個索引鍵搁 結構描述之部分。 之“亦係•會期資訊 以此方式,該㈣表时將Μ鍵映射或結合至值之一 索引鍵至值之映射。例如’―會期查詢會包含一或多個索 引鍵("查詢索引鍵而該查詢結果會包含結合至一或多 個索引鍵之-或多個值。由於可以將一會期視為兩個實體 之間的-關聯’因此以該索引鍵代表一實體而以該值代表 另一實體。 在不同會期之間(而因此在不同記錄之間),包含於某些 ㈣中的資訊可能相同。例如’若一日指派一第一 ΙΡ位址 而另-曰指派-第二ΙΡ位址給一裝置,則每一會期記錄將 包含關於該裝置的相同警1 / 和u貝讯(例如,該裝置之MAC位址或 主機名稱)。同樣地’若一曰將一Ip位址指派給一第一裝 置而另—日將其指派給一第二裝置,則每一會期記錄將包 3關於„亥IP位址之相同貪訊。若兩筆記錄包含相同的搁位 126190.doc 200837585 資訊而此欄位資訊決定該索引鍵,則一索引鍵需要映射至 兩個不同的資訊集合(一集合係針對一會期)。例如,可藉 由將該會期資訊集合放置於一列表中並讓該索引鍵之值^ 為該列表來實施此功能性。如上所述,該開始時間搁位值 與結束時間攔位值係用於識別任何給定時間實例中哪一會 期資訊係有效。在一具體實施例中,依據每—會期之開:Cj, Kushiro area), and c) other login information (for example, the username used in the source machine and/or the username used at the destination machine). The above information is about the Internet, but many different types of information are valid for a specific time period and can therefore be used by using the duration. For example, you can model the physical world by using the duration. A shellfish product (such as a computer) can be owned by one person or entity or assigned to a person or entity. A person can exist in a physical location. You can assign a -phone number to one person. Each state of these states is temporary and can therefore be modeled by using a session. In general, a session can be viewed as a relationship between two entities (e.g., a device and an address or a person--asset) that is valid for a particular time: period. Session information can be used in conjunction with other information such as other data storage or security events collected by the Internet and/or network devices. In-session information can be used to correlate, audit, associate actions with users, associate users with business positions, identify device users and/or positions to implement company policies, filter events, reports, and more. 126190.doc -14- 200837585 For example, if an employee needs to swipe his or her ID card when entering and leaving the office, the following reports may be generated: the average number of hours employees spend working and the time mode in which employees enter and leave the office. As another example, it is possible to identify and/or investigate attacks or anomalous behaviors based on rules and other information. Review security information/events • Includes timestamps that reflect when network activity occurred. When these events are associated with the duration information, the information of the session is reflected in the time of the time (the effective session. The exemplary association includes: a) Identifying the event associated with the specific person, ie The device/person schedule determines which device is owned or assigned to the person. The device to which the device has been logged in and the device from which it has been accessed. Identify events initiated from such devices. b) Identify one of the logins from a location other than the user's location. entry period table determines which user names and source devices have been logged into a target mourning. - Data storage determines which real people correspond to the user names C: Beauty and where the source devices are located. - The location/personal schedule determines where these real people are located (for example, based on a card or ID card that has recently entered a room or building). The positions of the real persons are compared to the locations of the source devices. A moving average is determined from the attack generated by the machine accessing the network via the VPN (comparing the attack-related (10) address contained in the message with the address in a νρΝ session table). d) Decide to access the user from the network via Qing (the „> address associated with the attack and the π address in the side schedule 126190.doc -15- 200837585 The moving average. The name of the user who determines one of the attacks generated in the matching match. e) The identification is initiated on the machine—attacking the dream of launching the attack. The eight-input indication and the user who indicated that the attack was initiated - the time has been reduced, and has been logged into the user of the machine. In the beginning, the user name is logged into the device. The bean entry schedule is determined at the time of implementation. In the example, a combination of a recruiting, grouping, and triggering is required to be associated with other constructs (the aggregation can be used in many aspects, such as the second two: the heterogeneous condition set. - the rule estimates the incoming event, used to associate by using rules) The sub-use list, the session list # baa /, the other structure k (such as the M month list and the threat level operation) associate the shell machines from different events, and are used to infer the meaning of the importance of the event, Instant actions should be initiated at the event. Back to the right = special case No. 10/308, 415. Step-by-step description of the association and rules, the eight kings' order is incorporated by reference. The structure of the session data is stored in each class, and - A timetable. For example, a session schedule maintains information about the duration of the clothing and IP address and another session includes information about the duration of the event associated with the person and the asset. A schedule includes one or more records. Each record represents a session. For example, a device/Ip address session will describe a time period in which a particular IP address is assigned to a particular device. This record will be stored in the -device/IP address. In a specific example, a session table is similar to a one-period list, which is ArcSightTM Enterprise Security Management (ESM) 4. 〇 (available from Cupertin, California (^ ArcSight) 126190) .doc • 16 - 200837585 A feature. f: The review period information includes, for example: - a timestamp, which refers to the beginning of the μ session; a second timestamp indicating the end of the session (if The session has ended); - a third time stamp indicating the establishment of a session (One or more materials as described below and valid during the session. This information is stored in the session record. The third time is the time to record when the session is established. It should be noted that the network delay There may be a time gap between the beginning of a session and the establishment of a record corresponding to the session. The session information is stored in each of the blocks. In general, these fields contain information for the session. One structural description. Different types of meeting information may have different structural descriptions. Figure 1 shows an exemplary structural description for different types of meeting information. The graphic structure description is dirty ρ, 卿, τ, and Production ownership. Figure, each rectangle represents a block 0 mother, and the port structure description includes two types of blocker · index key block, value place and time stamp block. In a specific embodiment, for support query / The query operation describes the information as an index key and a value. (The query operation is used to access the information of the session table A and is further described below.) In this specific example, the #f period table will specify One or more fields of a record are used as index keys ("primary barriers"). One or more of the other records will be used as values (value intercepts). For example, in a device Μ address schedule, the IP address (and ri total bh, 罔, 罔 区域) can be used as an index key, while other 9 J Λ (for example, host name) And MAC address) can be used as the value 0 126190.doc 200837585 The time interception block (including the start time field standing time field) contains one of the above mentioned (except = two and: not finished, In this case, the end time and the end time are used to identify the valid period for the given instance of the index. For example, the index key and a specific The time of the note, if the index key is mapped to; = ' then the appropriate value block set is its start time and one of the timestamps surrounding the timestamp. ' Figure 1 shows the description of the key field for each structure, Timestamps and value interceptors. One or more index keys are part of the structure description. "It is also the information of the session. In this way, the (4) table maps or binds the key to one of the values. Mapping of values. For example, '-a session query will contain one or more index keys ( "Query index key and the query result will contain - or multiple values combined with one or more index keys. Since a session can be considered as an association between two entities, so the index key represents one Entity and this value represents another entity. Between different sessions (and therefore between different records), the information contained in some (4) may be the same. For example, 'If a day is assigned a first address Another-曰 assignment-second address to a device, each session record will contain the same alarm 1 / and u bei (for example, the device's MAC address or host name) for the device. 'If an IP address is assigned to a first device and another day is assigned to a second device, then each session record will contain the same greed for the IP address. The pen record contains the same position 126190.doc 200837585 information and this field information determines the index key, then an index key needs to be mapped to two different information sets (a collection is for a session). For example, Put the meeting information collection in a list and let the cable The value of the key ^ is the list to implement this functionality. As mentioned above, the start time and end time block values are used to identify which session information is valid in any given time instance. In a specific embodiment, according to the opening of each session:
l 時間’_在該列表内對該等會期資訊集合進行分類。由此減 少執行一查閱所需要的時間。 在一具體實施例中 嘗期表係實施為 /务畎射7叩 '一一閱之索引鍵係依據所有該等索引鍵攔位之雜湊碼 ==碼。在此具體實施例中,可將該雜凑映射索 引鍵視為索引鍵攔位值之一元組。 ::雜凑映射值係一表示一或多個會期資訊集合之 ;技:料:構(會期間隔資料結構此類似於鏈式雜溱 =構:的—一 樹係用於==項1係二期資訊集合)。一間隔 能狗高效率地°<彳序树狀貧料結構。—内部樹使得 在此’、’、定與'給定間隔或點重疊之所有間隔。l Time’_ Classify the meeting information collections in this list. This reduces the time required to perform a review. In a specific embodiment, the trick list is implemented as / 畎 畎 叩 一 一 一 一 一 一 一 一 一 一 一 一 一 一 一 一 一 一 一 一 一 一 一 一 一 一 一 一 一 一 一 一 一In this particular embodiment, the hash map index key can be considered a tuple of index key block values. ::Hatch mapping value is one for one or more meeting information sets; technique: material: structure (memory interval data structure, this is similar to chain chowder = structure: one tree is used == item 1 Department II information collection). One interval can efficiently dog ° & 彳 树 tree-like lean structure. - The internal tree is such that all intervals of ', ', and 'a given interval or point overlap.
牡此,一 Jg B ^ BB 作為端點。為將 用該會期的開始時間與結束時間 先必須物 全事件與一會期表中的資訊關聯,首 4別相關會期。 時間係用於匹配例中,該事件之結束 項目(會期!隔明擇—適料該安全事件的適當 則使用—最大::目係開放端(即,該會期尚未終止), 時間作為一間隔結束時間。用於代表該間隔 126190.doc -19- 200837585 树之資料結構可以變。 ^ p] M - 。在一具體實施例中,若每一表與 索引鍵70、、且的預期項 實施方案。 、數目有限,則使用—以陣列為主的 儲存一會期表所靈 柄。古 厅而要的圮憶體與該表中的記錄數目成比 ㈣中記憶體需求係以〇(n)方式增長,其中n係記 \ :、4會期表所載入的記錄數目。關於查閱時間, 右m係該會期表中_ 索引鍵的數目(依據該索引鍵攔位元 組)而P係每一唯—舍 引鍵的項目平均數目,則執行一查閱 所需要的時間係0(logp)e在此,m*p=0㈨ 針對一會期表及其時間順序複雜度而執行的-般操作如 下:查詢一會期值欄位(例如,用於與一給定事件關聯)係 〇(1〇g P)。更新—記錄的結束時間係〇(i〇g p)。插入一新記 錄係〇(log p)。此等低時間順序複雜度使得能夠查詢會期 表亚即時保持,從而可以即時獲得該會期資訊於 關聯,等等。 、 ?擷取適用於一特定安全事件的會期資訊,定義一相關 =數函數。在-具體實施财m包括:用於該相關 k數之一名稱;用於擷取該會期資訊之一會期表;以及該 事件欄位至該會期表中的索引鍵攔位之一映射。依據此定 義,在邊會期表中識別對應項目並使之可供用於關聯。 相關k數可以按順序形成鏈以便存取來自不同來源的合 期資訊。使用者不僅可以指定從中查閱資訊的多筆資料來 源而且還可以識別使用此等資料來源時將採用的順序。例 如,使用者可以指定DHCP資訊與VPN資訊是否皆可庐 126190.doc -20- 200837585 得,可以從任一資訊擷取該MAC位址並接著將其與來自不 同來源的資訊組合以用於關聯。 △在-具體實施例’,可以將一會期表與一過濾器關聯。 該過濾器描述定義由該會期表管理的資料之一條件集合 (例如’可用於該表中的記錄之一索引鍵集合)。例如,若 該表儲存DHCP資訊而該等索引鍵係ιρ位址,則該過遽器 可以描述-範圍的IP位址(例如,可由該聰㈣服器指派 f t ;:位:)。藉由使用-過遽器,使得對照可用會期資訊 〇 #所需要的時間減少,因為消除對會期資訊之不 必=的查閱。過據器避免針對不可獲得會期資訊之一事件 而一閱一會期表。以此方 # 器用作一守門員。 f於‘向-表的查詢,過濾 在一具體實施例中,過濟 期表查閱之一事件护姑係“如下:識別需要-會 查詢索引鍵卢、據料於該事件㈣資料,決定該 繼詢索引鍵=Γ前、,對照該表之過舞測 要的資料儲存於該表中而3=測試,則可能將所需 該測試(例如,例如 "-閱。若該索引鍵未通過 範圍内),則不# " 索_不在該過遽器之IP位址 閱。]不將所需資料儲存於該表中而不執行該查 可以採取各種方式以資 檔案(例如—歸檔 、J期表。-方式係從- 路裝置上,其可以勺入、雨入貝料。該檔案可位於任何網 式)的任何類型次广3任何格式(以逗號分離的值(CSV)格 、貝心例如,可以藉由包含需要與安全資 126190.doc •21· 200837585 訊/事件關聯的資訊之一資料儲存來輪出該檔案。對包含 人力貧源(HR)貧訊(例如員工及其在一組織内的業務職務) 之一資料庫加以考量。將此HR資料從該資料庫輸出到一 檔案並接著將該檔案輸入一會期表,從而使得可以即時獲 得該資料用於關聯,等等。此資料可用於(例如)依據一使 用者的業務職務*非依據-裝置或_Ip位址來執行網路存 取政策。This is a Jg B ^ BB as an endpoint. In order to use the start time and end time of the session, the first event must be associated with the information in the session table. The time is used in the matching case, the end of the event (the meeting period! The choice is made - the appropriate use of the security event is used - the maximum:: the open end of the project (ie, the session has not been terminated), time as An interval end time. The data structure used to represent the interval 126190.doc -19- 200837585 tree can be changed. ^ p] M - In a specific embodiment, if each table is indexed with the index key 70, and The number of implementations. If the number is limited, use the array-based storage of the stalk of the session. The memory of the ancient hall is compared with the number of records in the table. (4) Memory requirements are (n) The mode grows, where n is the number of records loaded in the \:, 4 session table. Regarding the lookup time, the right m is the number of _ index keys in the session table (based on the index key to block the tuple And the average number of items in each P-only key, the time required to perform a lookup is 0 (logp)e here, m*p=0 (9) for a session table and its chronological complexity The general operation performed is as follows: Query a session value field (for example, for a given event) Correlation) System 〇 (1〇g P). Update—The end time of the record is 〇(i〇gp). Insert a new record system (log p). These low time sequence complexity enable querying the session table. Instantly maintain, so that the information of the session can be obtained in real time, etc., and the session information applicable to a specific security event is defined, and a correlation=number function is defined. a name of one of the k-numbers; a session table for extracting the session information; and mapping the event field to one of the index key blocks in the session table. According to this definition, the side session table Identify the corresponding items and make them available for association. The relevant k-numbers can be chained in order to access the information from different sources. Users can not only specify multiple sources of information from which to access the information but also identify the use of this The order in which the source of the data will be used. For example, the user can specify whether the DHCP information and the VPN information can be 庐 126190.doc -20- 200837585. The MAC address can be retrieved from any information and then come from Different The information is combined for association. △ In the specific embodiment, a session table can be associated with a filter. The filter description defines a set of conditions for the data managed by the session table (eg 'is available One of the records in the table is a set of index keys. For example, if the table stores DHCP information and the index key is an address, the router can describe the range of IP addresses (for example, by the Cong (4) The server assigns ft ;: bits :). By using the -pass buffer, the time required to compare the available session information 〇# is reduced, because the elimination of the information of the session information is not necessary = the reference is avoided. Get one of the events of the session and read the timetable. This is used as a goalkeeper. f in the 'direction-table query, filtering in a specific embodiment, the period of the period of time to look up one of the event nurses "as follows: identification needs - will query the index key Lu, according to the event (four) data, decide that After the index key = before, the data of the dance test against the table is stored in the table and 3 = test, then the test may be required (for example, "-read. If the index key is not Passing the range), then # " _ is not in the IP address of the device.] Do not store the required data in the table without performing the check. You can take various methods to file (for example - archive , J period table. - Mode is from the - road device, which can be spooned in, rain into the shell material. The file can be located in any type of any type of sub-wide 3 any format (comma separated value (CSV) grid For example, you can rotate the file by including one of the information that needs to be associated with the security 126190.doc •21·200837585 news/event. It is considered as a database of one of the business positions within an organization. The HR data is output from the database to a file and then entered into a session table so that the data can be obtained for association, etc. This information can be used, for example, based on a user's business duties* The network access policy is enforced on a non-by-device or _Ip address.
填充t期表之另-方式係使用目錄服務來從資料儲存 彌取資料。可經由各種協定(例如,輕量級目錄存取協定 (LDAP)或X.500)來存取此等目錄服務。 另一方式係使用—或多個軟體代理(例如來自八⑽响公 司的SmartC〇nnectors)以事件形式傳送所需資料。在此情 況下’可以使用一或多個規則來處理該等事件。明確言 之,該等規則可以從該等事件擷取會期資料並使用此資二 來填充會期表。 ^-方式係將該會期資料真接輸人進該會期列表所依據 之資料結構。例如,若該會期列表係儲存於―資料庫(參 見下文)中,則可以將該會期資料直接輸入進該資料庫。丫 填充一會期表之另—方式係使用包含於安全資訊/事件 中的資料。建立規則來識別與會期資訊相關之事件 該會期資tfl並使㈣會„訊來修改—會期表(例如: =建立"、修改或終止—會期記錄)。心在事件發生時⑶ 讀式)或對已儲存的過去事件("分批模 此等規則。 T争件執仃 126190.doc -22- 200837585 依據事件填充—會期表之—範例係DHcp_,並中使 用職P資訊(例如,租用指派事件)來建立—聰p會期 表。例如,一 DHCP應答訊自道 汛心導致建立一規則並開始一合 期(即,向該DHCP會期表添加—記錄)。—Mcp解除^ 導致-規則終止-會期(即,向該DHCp會期表中之一現有 記錄添加一終止時間)。 依賴事件來開始與結束會期可能產生一不精確的會期 表。例如,網路延時可料致事件晚料及/或打亂順 序。而且,某些事件可能永遠不會到達,例如可選的 DHCP解除訊息。此等問題可以係藉由使用規則來依據已 接收的事件隱式地決定會期邊界而得到解決。在一具體實 施例中’針對不重疊的會期f訊來隱式地歧會期邊界。Another way to fill the t-term is to use a directory service to extract data from the data store. These directory services can be accessed via various protocols, such as Lightweight Directory Access Protocol (LDAP) or X.500. Another way is to use the software agent (or SmartC〇nnectors from the eight (10) company) to transmit the required data in the form of an event. In this case, one or more rules can be used to handle the events. Specifically, the rules can extract session data from such events and use this asset to populate the schedule. The ^-method is the data structure on which the session data is actually entered into the list of sessions. For example, if the in-session list is stored in the “Repository (see below), the in-session data can be entered directly into the database.另 The other way to fill a session is to use the information contained in the safety information/event. Establish rules to identify events related to the duration information. The duration of the meeting will be tfl and (4) will be modified to - the schedule (for example: = establish ", modify or terminate - the duration of the record). When the event occurs (3) Read) or the stored past events ("Batch the rules of these rules. T contends 126190.doc -22- 200837585 according to the event fill - the schedule table - the sample system DHcp_, and the use of job P Information (eg, lease assignment events) is used to establish a C-Phase schedule. For example, a DHCP response message causes a rule to be established and a merging period begins (ie, adding a record to the DHCP session table). -Mcp release ^ Cause - rule termination - session (ie, add an end time to one of the existing records in the DHCp session table). Dependency events to start and end the session may result in an inaccurate schedule. For example Network latency can cause events to be delayed and/or disrupted. Also, certain events may never arrive, such as an optional DHCP release message. These issues can be based on received events by using rules. Implicitly decided Boundary be solved. In one implementation embodiment 'do not overlap for the duration of f inquiry will be implicitly manifold of the boundary.
C 依據所涉及的會期資訊類型,會期資訊可以係重疊或非 重疊。若會期資訊係非重疊,則此意謂著在任何時間實 J對於、巧疋索引鍵,僅存在一有效會期(而因此僅存 在一有效會期記錄)。DHCp資訊係非重疊會期資訊之一範 例。此係由於對於一給定網路區域,可以在任何給定時間 貝例藉由DHCP伺服器將一 IP位址(索引鍵)指派給僅一裝 置(值)。此指派後來可以改變到另一裝置,但截至此時間 較早裝置便已解除同一 Ip位址。卿資訊係非重疊會期資 汛之另一範例。在一給定網路區域上,VPN軟體依據其組 怨在任何給定時間實例將一 IP位址指派給僅一使用者/機 器。 若會期資訊係重疊,則此意謂著在任何給定時間實例, 126190.doc •23- 200837585 對於-給定索引鍵,可存在多個有效會期(而因此可存在 多個有效會期記錄)。登入資訊係重疊會期資訊之―範 例。此係由於對於一給定網路區域,可以在任何給定時間 實例由多個使用者(值)登入_IP位址(索引鍵)。 會期資訊之重疊/非重疊性質影響在查詢—會期表時所 傳回的值類型。例如’若一會期表包含非重疊資訊,則依 據-索引鍵/時間戮記對之—成功的查閱將傳回僅一會期 資訊集合。另一方面,若一會期表包含重疊資訊,則依據 -索引鍵/時間戳記對之一成功的查閱將傳回多個會期資 訊集合(例如’各項目係會期資訊集合之一列表,如上所 述)。 會期邊界之U地決定採料個H U會期終止盘 隱式會期分割。隱式會期終止包含決定一現有會期已在實 際上尚未接收一會期終止事件之條件下結束。當包含—針 對-現有作用十會期的索引鍵之—會期開始事件到達時, 終止針對該索引鍵之先前會期而藉由使用包含於該會期開 始事件中的資訊來建立並開始—新會期。(一作用中合期 亦稱為_,,現場”或,,正在進行的,,會期,其係_記錄不二含 一結束時間時間戳記之會期。)此_達會_始事件一 般IkDHCP會㈣訊發生,因為DHcp伺服器_般不記 用過期事件。 在一具體實施例中’隱式會期終止係進行如下:春一會 期:始事件到達時,決定其索引鍵攔位並使用其索弓 :鍵二 立產生-雜凑碼。針對一對應於該雜凑碼之預存在的作 126190.doc -24- 200837585 用中會期而檢查相關會期表。若找到一預存在的作用中合 期’則必定已終止此會期’因為該會期資訊無法重疊。‘ 由將-時間戮記放置於該會期記錄之結束時間襴位;來、: 止預存在的會期。藉由使用該會期開始事件中的資訊來建 立(對應於同一雜湊碼)並開始一新會期。 f 隱式會期終止之範例··依據在一會期表中之一記錄,將 在一給定網路區域(索引鍵)中之一 Ip位址指派給一特定的 主機名稱及MAC位址(192.168.0.1,國際區域1)==>(主機名 稱 ’ 11:11:11:11:11:11),2〇〇7年 1〇月 12 日下午 ^ 點。在 2〇〇7年10月12日下午lm,一會期開始事件到達,其將同 一區域(索引鍵)中的同一„>位址映射至一不同、裝置 (192·168·0·1,國際區域 1)=>(主機名稱2,22:22:22_22此^ 該會期開始事件將導致該第一會期終止(終止時間為 年10月12日下午!!點)而建立並開始一第二會期(開始時間 為2007年10月12日下午η點)。 隱式會期分割採取兩個形式。在該第一形式中,針對一 已經終止的會期’一會期終止事件到達。若在新到達的事 件中之會期終止時間早於當前儲存於對應會期記錄中的結 束時間二則將該新會期終止時間儲存於該會期記錄中; 如’在精由使用隱式會期終止來導出前一會期終止時間之 情況下可能發生此情況。 隱式會期分割(第一形式)之範例:依據一會期表中之一 記錄,一會期終止於2007年10月12日下午。一會期終 止事件到達’其對應於此會期記錄而指示―⑽了年^月η 126190.doc -25- 200837585 曰下午10:30之終止時間。將該會期記錄中的結束時間從 2〇〇7年1〇月12日下午U點改變為2〇〇7年1〇月12日下二 10:30 〇 在该第二形式的隱式會期分割中,一會期開始事件或會 . 期結束事件到達,其時間戳記對應於一現有會期。該現有 會期可以係一正在進行的會期或一已終止的會期。若儲存 於該現有會期中的值不同於儲存於該事件中的值,則分割 ( 現有會期,而在中間產生並開始一新會期。 隱式會期分割(第二形式)之範例:依據一會期表,一會 期S1開始於2008年!月i日下午J點而結束於2〇〇8年1月又日 下午1〇點,而一會期S2開始於2008年1月1日下午U點並且 係作用中狀態。一事件到達,其指示存在一開始於2〇〇8年 1月1日下午6點的會期S3。會期S1係分割成使其開始於 2008年1月1日下午丨點而結束於⑼⑽年丨月1日下午6點。會 期S3係建立成使其開始於2〇〇8年1月i曰下午6點而結束於 2〇08年1月1日下午11點。會期S2保持為一開始於2〇〇8年i 月1日下午11點之作用中會期。 在一會期開始或結束與將此資訊輸入進一會期表的時間 之間可能有一延遲。有時該延遲較小。例如,若一會期開 事件係藉由在日本的裝置產生,則在美國收集並處理 β事件可能要花一秒鐘或更多時間。在此情況下,可能有 用的係在嘗試將一安全事件與該會期資料相互關聯之前等 待。若過快嘗試該相互關聯,則該會期資料可能過時甚或 可此不存在。等待相互關聯一安全事件係稱為,,停泊” 126190.doc -26 - 200837585 (parking)該安全事件。在一具體實施例中,若存在會期資 料則女全事件停泊經過一最小的等待時間。希望將在 該等待時間期間更新該會期資料(若需要)而接著可供用於 相互關聯。在一具體實施例中,若不存在會期資料,則讓 -安全事件停泊_最大的等待時間。希望將在該等待時間 期間載入該會期資料(若需要)而接著可供用於相互關聯。 ;=該延遲較大。例如,來自_員工證章㈣之會㈣ 口孔可此係仪間匯入(例如,在一 ^ / 牡批夂處理程序中)而非即時 載入(例如當發生證章刷卡時 可能下才)在此專情況下,會期資訊 了此日免至,】達,因為已在該時間 全事件之間嘗試相互關聯。在一且體心;二訊與各種女 下,再+劲一 4 ,、體只施例中,在此情況 下再夂執仃相互關聯以利用晚接 可以對過去安全事件(例如,在過二貝況。例如, 事件)之一窗口重靳-—^ “小4中接收的安全 重新執仃一相互關聯賴 互關聯規則之α % # 、、 應重新執行相 態的。 ⑽及其重新執行所針對之事件)係可組 實施方案細節 ★上所述,會期資㈣儲存於 類會期資料係儲存於—分離 2中。明確言之’各 期資料之-會期表與用於登入二:(:如’用於職P會 為便於以後參考會期資料,將奋貝4之-會期表)中。 發性儲存器(例如硬碟驅動器)中/。表儲存於持久非揮 等會期表係儲存於—資° 。在—具體實施例中,該 在一會期表中的纪样乾n 關係賁料庫)中。 而顯著增加,從而產 I己錄數目可隨時間 126190.doc 27- 200837585 生很大的會期表。對-較大表執行一查詢與對一較小表執 行-查詢相比耗費甚巨(就諸如處理器時間之類電腦資源 而言)。在一具體實施财,將—會期表分割成使得每一 會期表分割區内的記錄數目減少。由此減少執行每一杳詢 所需要的資源數量。 在一具體實施例中,依撼合^ 曰J開始時間來分割該會期 表。回顧一會期表中的每-記錄皆包括-開始時間時間戮 記。此時間戳記之值決定儲在兮七μ 疋保存該纪錄之分割區。在一具體 實施例中,每-分割區表示一24小時週期。例如,一第一 分割區代表2007年⑴日上午12:〇〇至2〇〇7年…日下午 11:59,而一第二分割區代矣9 J代表2007年1月2日上午12:00至 月2日下午11:59。在此具體實施例中’價值相當 於-年的會期資料將係儲存於祕個分割區中而並非一龐 大的會期表中。 可以採取批次模式或即日卑从杳 仏八3即時地實仃相互關聯。在分批模式 :^接收安全資訊/事件時,將其儲存。以後會將所儲 子的女全貧訊/事件與該會期資訊(明確言之,係在該等事 件的時間戳記有效之會期資訊)相互關聯。 在即時模式中,當接收安全資訊/事件時,即時或接近 即時地將其與該會期資訊相互關聯。為讓此相互關聯即時 發生,該會期資料必須係即時保持且必須支援即時查詢。 此很難實現,因為每分鐘產生數千個事件,而每一事件可 =包括對會期資訊之一或多個參考(例如,欲用於決定已 接文該些所指派IP位址的MAC位址之_或多個抑址或者 126190.doc -28- 200837585 欲用於決定已登入該主機的使用者之一或多個主機名 稱)。例如,一 5,000個事件/秒與2個會期參考/事件之一事 件速率產生10,000個會期參考/秒。C Depending on the type of session information involved, the session information may be overlapping or non-overlapping. If the duration information is non-overlapping, this means that there is only one valid session (and therefore only one valid session record) at any time. DHCp information is an example of non-overlapping session information. This is because, for a given network area, an IP address (index key) can be assigned to only one device (value) by the DHCP server at any given time. This assignment can later be changed to another device, but as of this time the device has been removed from the same IP address. Qing Information is another example of non-overlapping period funding. On a given network area, the VPN software assigns an IP address to only one user/machine at any given time instance based on its identity. If the duration information overlaps, this means that at any given time instance, 126190.doc •23- 200837585 For a given index key, there can be multiple valid sessions (and therefore there can be multiple valid sessions) recording). Login information is an example of overlapping meeting information. This is because for a given network area, the instance can be logged into the _IP address (index key) by multiple users (values) at any given time. The overlapping/non-overlapping nature of the session information affects the type of value returned in the query-session table. For example, if a session table contains non-overlapping information, then based on the -index key/time note, a successful lookup will return a collection of only one session. On the other hand, if a session table contains overlapping information, a successful review by one of the -index key/timestamp pairs will return multiple collections of session information (eg, a list of each of the project session information collections, As mentioned above). The U location of the session boundary determines the H U session termination disk implicit session segmentation. The termination of an implicit session includes the decision that an existing session has ended in the event that it has not actually received a terminating event. When the inbound event of the index key for the existing ten-session is reached, the previous session of the index key is terminated and the information is included in the start event of the session to establish and start - New session. (A function in the period is also called _,, on-site) or,, in progress, the duration of the session, its system _ record does not include an end time time stamp period.) This _ meeting _ start event generally IkDHCP will occur (4) because the DHcp server does not remember the expiration event. In a specific embodiment, the 'implicit session termination system is as follows: Spring 1 session: When the initial event arrives, the index key block is determined. And use its cable: key to create a hash code. For a pre-existing one corresponding to the hash code 126190.doc -24- 200837585 check the relevant schedule in the middle of the session. If you find a pre- The existence of the effect of the 'scheduled period' must have terminated this period 'because the period information can not be overlapped.' The will-time record is placed at the end of the session record time; Come,: Pre-existing meeting By using the information in the beginning of the session to establish (corresponding to the same hash code) and start a new session. f Example of implicit session termination · According to one of the records in a session, Assign an Ip address in a given network area (index key) A specific host name and MAC address (192.168.0.1, international area 1) ==> (host name '11:11:11:11:11:11), 2〇〇7年1〇12日日下午^ Point. On the afternoon of October 12, 2007, lm, a session start event arrives, which maps the same „> address in the same area (index key) to a different device (192·168· 0·1, international area 1)=>(host name 2,22:22:22_22 this ^ The beginning of the session will result in the termination of the first session (end time is October 12th afternoon!! point) And establish and start a second session (starting at η o'clock on the afternoon of October 12, 2007). Implicit session split takes two forms. In this first form, for a term that has been terminated 'one The termination of the session is reached. If the termination time of the new arrival event is earlier than the end time 2 currently stored in the corresponding session record, the new session termination time is stored in the session record; This can happen if the previous session end time is derived by using an implicit session termination. Implicit session split (first) Example of form): According to one of the records in one session, one session is terminated on the afternoon of October 12, 2007. The terminating event of one session arrives at 'the corresponding record of this session period' - (10) year and month η 126190.doc -25- 200837585 终止10:30 pm termination time. The end time in the period record is changed from U point to 2 〇〇 7 years 1 〇 in the afternoon of the 2nd, 7th, 1st, 12th On the 12th, the next 10:30 〇 In the second form of implicit session segmentation, a session start event or meeting. The end event arrives, and its time stamp corresponds to an existing session. The existing session can be an ongoing session or a terminated session. If the value stored in the existing session is different from the value stored in the event, then split (the existing session, and generate and start a new session in the middle. Example of implicit session segmentation (second form): According to a schedule, one session S1 begins in 2008! It is at J:00 on the afternoon of the month and ends at 12:00 on the afternoon of January, 2008, and the session S2 begins on January 1, 2008. At the U-day afternoon, the U-point is in the state of action. When an event arrives, it indicates that there is a session S3 that begins at 6 pm on January 1, 2008. The session S1 is divided into two to start in 2008. On the afternoon of the 1st of the month, it ends at (6) (10), and at 6 pm on the 1st of the month. The S3 is established so that it will start at 2 pm in January, 2008, and end at 2 pm in January 2008. At 11 o'clock on the 1st, the session S2 will remain at the beginning of the session at 11:00 pm on the 1st of January. The start or end of the session will be entered into the schedule of the session. There may be a delay between them. Sometimes the delay is small. For example, if a scheduled event is generated by a device in Japan, the beta is collected and processed in the United States. It may take a second or more. In this case, it may be useful to wait before attempting to correlate a security event with the session data. If the association is attempted too quickly, then the session data May be outdated or even non-existent. Waiting for a correlation with a security incident is called, berthing" 126190.doc -26 - 200837585 (parking) the security incident. In a specific embodiment, if there is a session data, then the full female The event is parked for a minimum waiting time. It is hoped that the session data will be updated during the waiting time (if needed) and then available for correlation. In a specific embodiment, if there is no meeting data, then - Security event berth _ maximum waiting time. It is hoped that the session data will be loaded during the waiting time (if needed) and then available for correlation. ; = The delay is large. For example, the meeting from _ employee badge (4) (4) The mouth can be imported between the instruments (for example, in a ^ / 夂 夂 processing) rather than on-the-fly (for example, when a badge is swiped), in this case The information of the session will be waived on this day, because it has been tried to correlate between the whole events at that time. In one heart and mind; two news and various women, then + Jin Yi 4, body only in the case In this case, the relationship between the stubborn and the obsolete to use the late connection can be repeated in the window of one of the past security events (for example, in the event of a second situation. For example, the event) - ^ "Safety re-received in the small 4 α 相互 相互 相互 互 互 互 互 互 互 互 互 互 互 互 互 互 互 互 互 互 互 互 互 ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( The period data is stored in -Separation 2. Explicitly stated the terminology of each period of the data and the use of the registration period 2: (: If the 'for the job P will be used for future reference to the meeting materials, will be Feibei 4 - the schedule table. In a hair storage device (such as a hard disk drive) /. The table is stored in a persistent non-swing period. In the specific embodiment, the sample is in the data table of a schedule. And a significant increase, so that the number of records produced by the time can be a large schedule of time 126190.doc 27- 200837585. Executing a query for a larger table is much more expensive than for a smaller table execution-query (in terms of computer resources such as processor time). In a specific implementation, the schedule is divided such that the number of records in each partition table is reduced. This reduces the amount of resources required to perform each query. In a specific embodiment, the schedule is divided by the start time of the combination. Review each record in a session table to include - start time and time. The value of this timestamp determines the partition that holds the record in 兮7μ疋. In a specific embodiment, each partition defines a 24-hour period. For example, a first partition represents 12:59 am on the day of 2007 (1), and at 11:59 pm on the day of the second day, while a second partition on behalf of 9 J represents 12:00 on January 2, 2007. 00 to 2:00 pm on the 2nd of the month. In this particular embodiment, the data for a period of value equivalent to -year will be stored in a secret partition rather than a large schedule. You can take the batch mode or the day-to-day 杳 仏 3 3 3 3 to instantly correlate. In batch mode: ^ When you receive security information/events, store them. In the future, the stocks of the women's poverty/events will be correlated with the information of the session (exactly, the information on the time period in which the time stamps of such events are valid). In the immediate mode, when a security message/event is received, it is immediately or immediately and immediately associated with the session information. In order for this correlation to occur immediately, the session data must be kept on-the-fly and must support instant queries. This is difficult to achieve because thousands of events are generated per minute, and each event can include one or more references to the duration information (eg, the MAC to be used to determine the assigned IP addresses) Address _ or multiple acknowledgments or 126190.doc -28- 200837585 to be used to determine one or more host names of users who have logged into the host). For example, one event rate of one 5,000 events/second and two session reference/events yields 10,000 session reference/second.
t 在一具體實施例中,還將—會期表之—部分保持於一揮 發性記憶體(例如,一快取記憶體或隨機存取記憶體 (RAM))中,以便支援更快存取用於更新及/或查詢。例 如,若該會期表係分割於長期儲存中,則當前分割區(或 其一部分)亦係儲存於揮發性記憶體中。一般地,在揮發 性記憶體中該會期表之部分將包括作用中會期且還可以包 :已於最近(例如,在過去十分鐘内)終止之會期。由於大 多數即時更新及查詢將係關於作用中會期與最近終止的會 』因此將此等會期儲存於揮發性記憶體中將使得執行每 更新及查詢所需要的資·源數量減少。在一具體實施例 古’保持於揮發性記憶體中的會期表之部分最初係從長期 儲存載人。欲儲存於揮發性記憶體中的記錄數量係可組綠In a specific embodiment, the portion of the schedule is also held in a volatile memory (for example, a cache or random access memory (RAM)) to support faster access. Used for updates and/or queries. For example, if the session is segmented in long-term storage, the current segment (or a portion thereof) is also stored in volatile memory. Typically, the portion of the schedule in the volatile memory will include the duration of the session and may also include a period of time that has been terminated recently (e.g., within the last ten minutes). Since most of the instant updates and queries will be related to active and recently terminated sessions, storing these sessions in volatile memory will reduce the number of resources and sources required to perform each update and query. In a particular embodiment, the portion of the schedule that is kept in volatile memory is initially stored from a long-term storage. The number of records to be stored in volatile memory is green
/、在長_存令保持該會期表之-致性,作為H /收集更新並將其週期性施加於該會期表。例如,作為一 於-分鐘之_週期收集更新並接著將其施 儲存中的會期表。 我功 使已刀割一會期表,定位-特定會期亦可能較耗費甚 巨。例如,芒去A 入 々再赶 、 σ 一 S期之開始時間,則必須搜尋每一分 行週期=到4會期。在—具體實施例中,對—會期表進 々理以使得作用中會期移動至該當前分割區。此 126190.doc -29- 200837585 特徵係稱為”會期上捲",1 下其記錄將位於當前分割區作用中的情況 從前-分割區上捲"至當前分割二使得期資訊係 (其係儲存於揮發性記憶體 -s則分告彳區 該資訊。㈣上捲使得存取°述)中㈣便可獲得 量減少,因為僅需要杳 、t期所需要的資源數 而!查詢當前分割區。 在會期上捲後,渦土 yV卜丨^ 心其記將僅包含終止的會期 不包含即時會期資料,因此更容易刪除或歸播此等 在:具:實施例中,經由一排程的任務來實施會期上 =❹«排程為週期性執行(例如,若該分割係依據 執订於每一分割區邊界)。該特定週期係可組態 的:若-會期從—分割區延伸至另一分割區(例如,由於 遠等=割區係依據日期’以及由於該會期係在兩個不同日 "p守進行)則依據分割區邊界將該會期分成多個會 期,而將每一會期儲存於一不同分割區中。 例如,對代表2007年1月1日上午12:00至2007年1月1日 下午11:59之一第一分割區以及代表2007年1月2曰上午 ·〇〇至2007年1月2日下午11:59之一第二分割區加以考 里。一會期開始於2〇〇7年1月i日下午11:00而結束於2〇〇7 年1月2日上午1:00。會期上捲會將該區段分成兩個會期: (a) 2007年1月1日下午11:〇〇至2〇〇7年u i日下午11:59 ;以 及(b) 2007年1月2日上午12:〇〇至2007年1月2日上午1:〇〇。 126190.doc -30· 200837585 會期a將係儲存於該第一分割區中作為—已終止會期,而 會期b將係儲存於該第二分割區令(同樣作為一已終止會 期)。若該會期係關於蓮卩資訊,則針對具有介於聰^ 1月1日下午11:00與2007年!月2日上午1:〇〇之間的時間戮記 之所有事件,一給定的1]?位址及網路區域將與同—主機名 %及MAC位址匹配,而與該會期分割無關。 作為另一範例,對開始於2〇〇7年1〇月1曰下午2:〇〇並於 2〇〇7年!〇月5日正在進行之—會期加以考量。在胸年⑺ ^日執行會期上捲會將該會期分成五個會期(_會期係針 月1日,一會期係針對10月2日,一會期係針對1〇月3 々日一會期係針對10月4日而一會期係針對1〇月5日)。該 專頭四個會期係作為已終止會期儲存於其個別分割區中f ==會期⑽5日)將料為正錢行的會期儲存 作用中分割區中。 二:具體實施例中’會期上捲包括:在自最 :開始之會期中(或在開始於前一分割區期間的會期中, -車父早者為標準),決定哪些會期係作用中。針對 個二期中的每—會期’依據該分割區邊 多個會期。對於一 曰^刀风 去 、㈢/月之一已終止部分,將該部分與一過 ^㈣相加以使其終止於該分割區邊界時間。對於一 n 4止部分’將該部分與#前分割區相加以使1 開始於該分割區邊界時間。 便,、 言:決Γ整個會期之長度,可以組合分割的會期。明確 右會期結束於—分割區邊界時間,❿下―分割區 126190.doc •31- f/, in the long_save order to maintain the duration of the session, as H / collect updates and periodically apply to the session table. For example, the update is collected as a period of - minutes and then stored in the session table. I have already cut the schedule for a period of time, and the positioning-specific period may also be costly. For example, if you go to A and then start, and the start time of σ-S, you must search for each branch cycle = to 4 sessions. In a particular embodiment, the session is processed to cause the active session to move to the current partition. This 126190.doc -29- 200837585 feature is called "memory roll-up", 1 its record will be in the current partition role in the case of the former-segmented volume " to the current split two make the information system ( The system is stored in the volatile memory-s, and the information is reported in the area. (4) The volume is reduced, so that the amount of resources can be reduced in the access (4), because only the number of resources required for the t and t periods is needed! The current partition. After the roll-up of the session, the vortex yV 丨 丨 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心 心, through a scheduled task to implement the session = ❹ « scheduling for periodic execution (for example, if the segmentation is based on each partition boundary). The specific cycle is configurable: if - The period extends from the division to another division (for example, because the distance = the division is based on the date and because the session is on two different days), the association is based on the boundary of the division. The period is divided into multiple sessions, and each session is stored in a different segment. For example, the first division on behalf of one of the first divisions from 12:00 on January 1, 2007 to 11:59 on January 1, 2007 and on January 2, 2007 to January 2007 One of the second divisions at 11:59 pm on the 2nd of the month was taken in Cowley. The first session began at 11:00 pm on January 1, 2007 and ended at 1:00 on January 2, 2:7. 00. The roll-up will divide the section into two sessions: (a) 11:00 pm on January 1, 2007 to 11:59 pm on the 2nd and 7th year ui; and (b) 2007 From 2:00 am on January 2 to 1:00 am on January 2, 2007. 126190.doc -30· 200837585 Session a will be stored in the first partition as a - terminated period, and The session b will be stored in the second divisional order (also as a term of termination). If the session is about the lotus root information, then it is targeted at Congyong on January 1st at 11:00 and 2007. Year! On the 2nd of the 2nd, the time between 1: 〇〇 戮 all events, a given 1] address and network area will match the same - host name % and MAC address, and with the Period splitting has nothing to do. As another example, the pair begins in 2〇〇7年一〇月1 曰 2: 〇〇 and 2 〇〇 7 years! On the 5th of the next month, the period will be considered. During the year of the chest (7) ^ day, the session will be divided into five sessions ( _ session is on the 1st of the month, one session is for October 2, one session is for 1 month, 3 days, one session is for October 4th and one session is for 1 month 5th The special four-session period is stored in the divisional zone of the session storage period in which the termination period is stored in its individual divisions, f ==session (10) and 5 days). Second: In the specific example, the 'session period' includes: in the beginning of the session: (or in the period beginning in the previous segment, - the car is the early standard), determine which period function in. For each of the two phases, the duration of the session is based on multiple sessions of the segment. For a 刀^ knife wind to, (3) / month one of the terminated parts, the part is added to a ^ (four) to terminate at the boundary time of the partition. For a n 4 stop portion, the portion is added to the # front partition to cause 1 to start at the partition boundary time. Then, words: Depending on the length of the entire session, you can combine the duration of the split. It is clear that the right session ends at the time of the boundary of the partition, and the division-partition 126190.doc •31-f
200837585 包括-開始於該分割區邊 會期,則此等會期互相對庫 ”有同-索引鍵與值的 間以決定整個(未分割)會期之持續㈣。^之“時 以;一;㈣施例中’當-會期係分成多個會期部分時, 某-方式註解每-會期部分以指示其係—更大 分。此有助於在決定一整個r去八 曰/ ⑷ =會期部分。例如,針對每—會期部分向該記錄添加一二 作為另H將整個(未分割)會期的開始時間添加 =針對每一會期部分的記錄。在此範例中,對應的會期部 分除具有相同的索引鍵與值外還將針對整個會期具有相同 的開始時間。 本文所作之以上說明係用於解說該等具體實施例之操作 而無意於限制本發明之範疇。因此,本發明只受隨附申請 專利範圍之限制。從以上說明,熟習此項技術者會明白本 發明之精神及範疇所涵蓋的許多變化。 【圖式簡單說明】 圖1顯示用於不同類型會期資訊之範例性結構描述。 該等圖式僅基於解說目的繪示一具體實施例。熟習此項 技術者從以下說明將容易明白,可使用本文所說明的結構 及方法之替代具體實施例而不背離本文所說明的原理。 126190.doc -32-200837585 Including - starting at the edge of the segment, then these sessions have a mutual-index key and value to determine the duration of the entire (unsegmented) session (four). (4) In the case of the case, when the part-session period is divided into multiple session parts, a certain method is used to annotate each part of the session to indicate its system-larger part. This helps in deciding an entire r to go to 八 / (4) = session part. For example, add one or two to the record for each session period as another H to add the start time of the entire (unsegmented) session to the record for each session portion. In this example, the corresponding session part will have the same start time for the entire session, except for the same index key and value. The above description is provided to illustrate the operation of the specific embodiments and is not intended to limit the scope of the invention. Accordingly, the invention is limited only by the scope of the accompanying claims. From the above description, many variations of the spirit and scope of the invention will be apparent to those skilled in the art. [Simple description of the diagram] Figure 1 shows an exemplary structural description for different types of session information. The drawings depict a specific embodiment for purposes of illustration only. It will be readily apparent to those skilled in the art that the description of the structure and methods described herein may be substituted without departing from the principles described herein. 126190.doc -32-
Claims (1)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US86293206P | 2006-10-25 | 2006-10-25 |
Publications (1)
Publication Number | Publication Date |
---|---|
TW200837585A true TW200837585A (en) | 2008-09-16 |
Family
ID=44820258
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW96140097A TW200837585A (en) | 2006-10-25 | 2007-10-25 | Tracking changing state data to assist in computer network security |
Country Status (1)
Country | Link |
---|---|
TW (1) | TW200837585A (en) |
-
2007
- 2007-10-25 TW TW96140097A patent/TW200837585A/en unknown
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5191492B2 (en) | Technology for tracking changing state data to help computer network security | |
US10867034B2 (en) | Method for detecting a cyber attack | |
CN110650128B (en) | System and method for detecting digital currency stealing attack of Etheng | |
JP2006244499A5 (en) | ||
CN106534164B (en) | Effective virtual identity depicting method based on cyberspace user identifier | |
US20080104021A1 (en) | Systems and methods for controlling access to online personal information | |
CN110096551A (en) | Credit data storage method, device, equipment and medium based on block chain | |
CN103679048B (en) | For the data confidentiality in multi-system landscape and the system and method destroyed | |
US11681719B2 (en) | Efficient access of chainable records | |
CN108268485A (en) | A kind of daily record real-time analysis method and system | |
CN106251114B (en) | Method and device for realizing approval in application | |
CN110147684A (en) | For realizing the method and apparatus of block chain data-privacy protection | |
CN110929229A (en) | Block chain-based office document credibility verification method and system | |
CN115348171A (en) | Method, apparatus, device and medium for managing access control list of network device | |
US8839449B1 (en) | Assessing risk of information leakage | |
CN104881749A (en) | Data management method and data storage system for multiple tenants | |
CN109344173A (en) | Data managing method and device, data structure | |
EP2896006A2 (en) | Bidirectional synchronization of communications and crm applications | |
CN105827619B (en) | Crawler in the case of height access closes method | |
TW200837585A (en) | Tracking changing state data to assist in computer network security | |
JP6454200B2 (en) | Communication management method and communication management system | |
CN101119235B (en) | Method and system for positioning client terminal in application service system | |
CN107342888A (en) | The storage method and device of daily record message | |
CN106682177A (en) | Dynamic display method of service record information | |
CN108540471B (en) | Mobile application network traffic clustering method, computer readable storage medium and terminal |