基于自动化脚本的高校威胁IP统计分析

Zesheng Chen, Min Zhou, Lichun Feng, Binnan Li
{"title":"基于自动化脚本的高校威胁IP统计分析","authors":"Zesheng Chen, Min Zhou, Lichun Feng, Binnan Li","doi":"10.1145/3548608.3559315","DOIUrl":null,"url":null,"abstract":"The operation of cyber security has gradually become a significant part of informatization in the process of smart campus construction. However, universities rely too much on physical security devices in the current network security operation process, and lack of self-defined statistical analysis automation program. The current network logs have the following problems: difficult to gather data-sets of different application systems, difficult to unify attribute names of different data-sets, difficult to count the number of records with attacker and victim as the only items, and besieged to do repetitive work daily. In order to solve the above problems, this paper proposes an automatic statistical threatening IP algorithm, which can uniquely locate the attacker and victim and process other data through a programmatic way. Finally, it is used to report statistical data to departments related to cyber security. The results of experiment show that the proposed algorithm can effectively complete the statistical work of network attack threatening IP details.","PeriodicalId":201434,"journal":{"name":"Proceedings of the 2022 2nd International Conference on Control and Intelligent Robotics","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Statistical Analysis of threatening IP in Universities Based Automated Script\",\"authors\":\"Zesheng Chen, Min Zhou, Lichun Feng, Binnan Li\",\"doi\":\"10.1145/3548608.3559315\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The operation of cyber security has gradually become a significant part of informatization in the process of smart campus construction. However, universities rely too much on physical security devices in the current network security operation process, and lack of self-defined statistical analysis automation program. The current network logs have the following problems: difficult to gather data-sets of different application systems, difficult to unify attribute names of different data-sets, difficult to count the number of records with attacker and victim as the only items, and besieged to do repetitive work daily. In order to solve the above problems, this paper proposes an automatic statistical threatening IP algorithm, which can uniquely locate the attacker and victim and process other data through a programmatic way. Finally, it is used to report statistical data to departments related to cyber security. The results of experiment show that the proposed algorithm can effectively complete the statistical work of network attack threatening IP details.\",\"PeriodicalId\":201434,\"journal\":{\"name\":\"Proceedings of the 2022 2nd International Conference on Control and Intelligent Robotics\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2022 2nd International Conference on Control and Intelligent Robotics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3548608.3559315\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2022 2nd International Conference on Control and Intelligent Robotics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3548608.3559315","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

在智慧校园建设过程中,网络安全运营逐渐成为信息化的重要组成部分。然而,目前高校在网络安全运行过程中过多依赖物理安全设备,缺乏自定义的统计分析自动化程序。目前的网络日志存在以下问题:难以收集不同应用系统的数据集,难以统一不同数据集的属性名称,难以统计以攻击者和受害者为唯一条目的记录数量,每天被包围着做重复的工作。为了解决上述问题,本文提出了一种自动统计威胁IP算法,该算法可以唯一地定位攻击者和受害者,并通过编程方式处理其他数据。最后,用于向网络安全相关部门报告统计数据。实验结果表明,该算法能够有效地完成网络攻击威胁IP细节的统计工作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Statistical Analysis of threatening IP in Universities Based Automated Script
The operation of cyber security has gradually become a significant part of informatization in the process of smart campus construction. However, universities rely too much on physical security devices in the current network security operation process, and lack of self-defined statistical analysis automation program. The current network logs have the following problems: difficult to gather data-sets of different application systems, difficult to unify attribute names of different data-sets, difficult to count the number of records with attacker and victim as the only items, and besieged to do repetitive work daily. In order to solve the above problems, this paper proposes an automatic statistical threatening IP algorithm, which can uniquely locate the attacker and victim and process other data through a programmatic way. Finally, it is used to report statistical data to departments related to cyber security. The results of experiment show that the proposed algorithm can effectively complete the statistical work of network attack threatening IP details.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信