Disclosure of Invention
Accordingly, the present invention is directed to a method, apparatus, device and storage medium for noise reduction of security alarm data, which can prevent attacks from being bypassed to improve coverage rate of judging alarms. The specific scheme is as follows:
In a first aspect, the present application provides a method for noise reduction of safety alarm data, including:
Judging whether a target table item matched with the currently acquired target alarm data exists in a local pre-established dynamic table or not;
If a target table item matched with the target alarm data exists in the dynamic table, carrying out engineering research and judgment on the target alarm data by utilizing the target table item so as to determine a current research and judgment result corresponding to the target alarm data based on a pre-recorded alarm data research and judgment result in the target table item;
if the dynamic table does not have the target table item matched with the target alarm data, analyzing and judging the target alarm data by using a preset large model to obtain a current judging result corresponding to the target alarm data, and generating a target table item corresponding to the target alarm data based on the current judging result corresponding to the target alarm data in the dynamic table;
And determining whether the target alarm data reach a preset security threat degree or not based on a current judging result corresponding to the target alarm data, and if not, eliminating the target alarm data.
Optionally, if the dynamic table does not have a target table item matched with the target alarm data, analyzing and judging the target alarm data by using a preset large model to obtain a current judging result corresponding to the target alarm data, including:
if the dynamic table does not have the target table item matched with the target alarm data, extracting the characteristics of the target alarm data meeting the first preset research and judgment condition to obtain first characteristic information;
Analyzing and judging whether the target alarm data is alarm information corresponding to active attack or not by using a first preset large model and the first characteristic information so as to obtain a current judging result corresponding to the target alarm data;
the first preset judging condition is that the alarm type corresponding to the target alarm data is one of network attack, vulnerability exploitation and scanning behavior, and the target alarm data accords with a preset application protocol condition.
Optionally, if the dynamic table does not have a target table item matched with the target alarm data, analyzing and judging the target alarm data by using a preset large model to obtain a current judging result corresponding to the target alarm data, including:
If the dynamic table does not have the target table item matched with the target alarm data, grouping the target alarm data meeting a second preset judging condition based on a first preset grouping condition, and aggregating a response code corresponding to the target alarm data in each group, an IP address returned by a domain name server and alarm occurrence time to obtain second characteristic information;
Analyzing and judging whether the target alarm data is the alarm information corresponding to threat information or not by utilizing a second preset large model and the second characteristic information so as to obtain a current judging result corresponding to the target alarm data;
The first preset grouping condition is a grouping condition based on the alarm type, the application protocol, the compromise index, the source IP address and the destination IP address of the target alarm data, the second preset judging condition is that the alarm type corresponding to the target alarm data is one of malicious programs and suspicious communication, and the data flow direction of the target alarm data is the data flow direction corresponding to any node in the device when accessing other nodes in the device or the data flow direction corresponding to the node in the device when accessing the external node in the device.
Optionally, if the dynamic table does not have a target table item matched with the target alarm data, analyzing and judging the target alarm data by using a preset large model to obtain a current judging result corresponding to the target alarm data, including:
If the dynamic table does not have the target table item matched with the target alarm data, grouping the target alarm data meeting a third preset judging condition based on a second preset grouping condition, and aggregating a response code corresponding to the target alarm data in each group, an IP address returned by a domain name server, a source IP address and alarm occurrence time to obtain third characteristic information;
Analyzing and judging the access flow type of the attacker corresponding to the target alarm data by utilizing a third preset large model and the third characteristic information to obtain a current judging result corresponding to the target alarm data, wherein the access flow type comprises real attack flow, harmless flow and unknown flow;
The third preset judging condition is that the data flow direction of the target alarm data is the corresponding data flow direction when any node in the device accesses other nodes in the device or the corresponding data flow direction when the node outside the device accesses the nodes in the device.
Optionally, after analyzing and judging the target alarm data by using the preset large model to obtain a current judging result corresponding to the target alarm data, the method further includes:
And if the current research and judgment result represents that the access flow type of the attacker corresponding to the target alarm data is unknown, the method jumps to the step of grouping the target alarm data meeting a third preset research and judgment condition based on a second preset grouping condition and aggregating the response code corresponding to the target alarm data in each group, the IP address returned by the domain name server, the source IP address and the alarm occurrence time.
Optionally, if the dynamic table does not have a target table item matched with the target alarm data, analyzing and judging the target alarm data by using a preset large model to obtain a current judging result corresponding to the target alarm data, and then further including:
And if the current research and judgment result represents that the access flow type corresponding to the target alarm data is real attack flow or harmless flow, acquiring the target alarm data corresponding to the current research and judgment result, and jumping to the step of carrying out engineering research and judgment on the target alarm data by utilizing the target table entry so as to determine the current research and judgment result corresponding to the target alarm data based on the alarm data research and judgment result recorded in the target table entry in advance.
Optionally, the generating, in the dynamic table, a target table entry corresponding to the target alarm data based on a current grinding result corresponding to the target alarm data includes:
If the current research and judgment result represents that the access flow type corresponding to the target alarm data is real attack flow, extracting an attack source IP address, a data flow direction and the current research and judgment result of the target alarm data to generate a target table item corresponding to the target alarm data in the dynamic table;
and if the current research and judgment result represents that the access flow type corresponding to the target alarm data is harmless flow, extracting the alarm name, the alarm type, the application protocol, the compromise index, the source IP address and the current research and judgment result of the target alarm data to generate a target table item corresponding to the target alarm data in the dynamic table.
In a second aspect, the present application provides a security alarm data noise reduction device, including:
the alarm data judging module is used for judging whether a target table item matched with the currently acquired target alarm data exists in a local pre-established dynamic table;
The alarm data research and judgment module is used for carrying out engineering research and judgment on the target alarm data by utilizing the target table item if a target table item matched with the target alarm data exists in the dynamic table so as to determine the current research and judgment result corresponding to the target alarm data based on the alarm data research and judgment result recorded in the target table item in advance;
The target table item generation module is used for analyzing and judging the target alarm data by utilizing a preset large model if the target table item matched with the target alarm data does not exist in the dynamic table, so as to obtain a current judging result corresponding to the target alarm data, and generating a target table item corresponding to the target alarm data based on the current judging result corresponding to the target alarm data in the dynamic table;
And the alarm data eliminating module is used for determining whether the target alarm data reach the preset security threat degree or not based on the current research judgment result corresponding to the target alarm data, and if not, eliminating the target alarm data.
In a third aspect, the present application provides an electronic device, comprising:
A memory for storing a computer program;
And the processor is used for executing the computer program to realize the safety alarm data noise reduction method.
In a fourth aspect, the present application provides a computer readable storage medium storing a computer program, wherein the computer program when executed by a processor implements the aforementioned method of noise reduction of safety alarm data.
The method comprises the steps of judging whether a target table item matched with target alarm data which is currently acquired exists in a dynamic table which is locally and pre-created, if the target table item matched with the target alarm data exists in the dynamic table, carrying out engineering research on the target alarm data by utilizing the target table item so as to determine the current research result corresponding to the target alarm data based on the alarm data research result which is pre-recorded in the target table item, if the target table item matched with the target alarm data does not exist in the dynamic table, carrying out analysis research on the target alarm data by utilizing a preset large model so as to obtain the current research result corresponding to the target alarm data, generating the target table item corresponding to the target alarm data based on the current research result corresponding to the target alarm data in the dynamic table, determining whether the target alarm data reaches a preset safety degree based on the current research result corresponding to the target alarm data, and if not, carrying out rejection treatment on the target alarm data.
From the above, the application carries out engineering research and judgment on the target alarm data by the target table item corresponding to the target alarm data in the dynamic table, if the target table item matched with the target alarm data does not exist in the dynamic table, the target alarm data is analyzed and judged by utilizing the preset large model, so that the problem of complex alarm information and low coverage of the large model is solved, the accuracy and coverage of the alarm research and judgment are improved, and noise reduction is carried out on the alarm to identify important, real and effective alarms, thereby reducing the workload of safety operators.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
At present, automatic treatment and noise reduction are realized on alarms of the existing judging scheme in a rule matching mode, and the automatic generation of noise reduction rules is realized by reducing the workload of safety operators, however, many attacks are easily bypassed and cannot find real attacks more flexibly and accurately, so that the value of the alarms is not fully utilized, and therefore, a single alarm matching mechanism cannot accurately judge comprehensive safety behaviors and has certain unilateral performance. Therefore, the application provides a noise reduction method for safety alarm data, which not only solves the problems of multiple alarm information and low coverage of a large model by studying and judging results of the large model and combining engineering studying and judging to study and judge alarms, but also improves the accuracy and coverage of the alarm studying and judging, and carries out noise reduction on the alarms so as to identify important, real and effective alarms, thereby reducing the workload of safety operators.
Referring to fig. 1, the embodiment of the invention discloses a method for noise reduction of safety alarm data, which comprises the following steps:
And S11, judging whether a target table item matched with the currently acquired target alarm data exists in the local pre-created dynamic table.
In this embodiment, target alarm data of a target device is collected by using a preset monitoring device, after the target alarm data is obtained, whether a target table item matched with the target alarm data exists in the dynamic table is determined by using a locally pre-created dynamic table, wherein the dynamic table is generated by using a current determination result obtained by analyzing and determining the target alarm data by using a preset large model, and the dynamic table comprises a plurality of target table items corresponding to the target alarm data.
And step S12, if a target table item matched with the target alarm data exists in the dynamic table, carrying out engineering research and judgment on the target alarm data by utilizing the target table item so as to determine a current research and judgment result corresponding to the target alarm data based on the alarm data research and judgment result recorded in the target table item in advance.
In this embodiment, if a target table entry matching with the target alarm data already exists in the dynamic table, then the target table entry matching with the target alarm data is queried from the dynamic table, and an alarm data research and judgment result corresponding to the preset target alarm data and recorded in advance in the target table entry is read, so as to perform engineering research and judgment on the target alarm data based on the alarm data research and judgment result, so as to obtain a current research and judgment result corresponding to the target alarm data.
And S13, if no target table item matched with the target alarm data exists in the dynamic table, analyzing and judging the target alarm data by using a preset large model to obtain a current judging result corresponding to the target alarm data, and generating a target table item corresponding to the target alarm data based on the current judging result corresponding to the target alarm data in the dynamic table.
In this embodiment, if there is no target table entry matching with the target alarm data in the dynamic table, analyzing and judging the target alarm data meeting the corresponding preset judging conditions by using different preset large models to obtain a current judging result corresponding to the target alarm data, and after obtaining the current judging result, generating a target table entry corresponding to the target alarm data in the dynamic table based on the current judging result.
In a first specific embodiment, if there is no target table entry matching with the target alarm data in the dynamic table, performing feature extraction on the target alarm data, where the alarm type of the target alarm data is Web (World Wide Web, i.e. global area network) attack, exploit, scan behavior, and the like, the application protocol is HTTP (Hypertext Transfer Protocol, i.e. hypertext transfer protocol) or HTTPs (Hypertext Transfer Protocol Secure, i.e. hypertext transfer protocol) or HTTP2 (i.e. hypertext transfer protocol 2 nd edition), and the access flow type corresponding to the target alarm data is represented by the current research result and is true attack flow, so as to obtain first feature information, and then performing analysis and research on whether the target alarm data is alarm information corresponding to active attack by using a first preset large model and the first feature information, so as to obtain the current research result. Specifically, if no target item matched with the target alarm data exists in the dynamic table, analyzing and judging the target alarm data by using a preset large model to obtain a current judging result corresponding to the target alarm data, wherein if no target item matched with the target alarm data exists in the dynamic table, feature extraction is performed on the target alarm data meeting a first preset judging condition to obtain first feature information, and analysis and judgment are performed on whether the target alarm data is alarm information corresponding to an active attack or not by using the first preset large model and the first feature information to obtain the current judging result corresponding to the target alarm data, wherein the first preset judging condition is that the alarm type corresponding to the target alarm data is one of network attack, vulnerability exploitation and scanning behavior, and the target alarm data accords with a preset application protocol condition.
In a second specific embodiment, if there is no target table entry matching the target alarm data in the dynamic table, based on the alarm type, the application protocol, the compromise indicator, the source IP address (Internet Protocol Address, i.e., the internet protocol address) and the destination IP address of the target alarm data, the alarm type of the target alarm data is a malicious program, a suspicious communication class, and the data flow direction of the target alarm data is a data flow direction corresponding to when any node in the device accesses other nodes in the device or a data flow direction corresponding to when the node in the device accesses the external node in the device, the target alarm data corresponding to the target alarm data in each packet is grouped, and based on a first preset periodic condition, the response code, the IP address returned by the domain name server and the alarm occurrence time are aggregated, so as to obtain second feature information, and then, whether the target alarm data is alarm information corresponding to information is threat or not is analyzed and judged by using a second preset large model and the second feature information, so as to obtain a current threat judgment result.
Specifically, if there is no target table item matched with the target alarm data in the dynamic table, analyzing and judging the target alarm data by using a preset large model to obtain a current judging result corresponding to the target alarm data, wherein if there is no target table item matched with the target alarm data in the dynamic table, the target alarm data meeting a second preset judging condition is grouped based on a first preset grouping condition, and a response code corresponding to the target alarm data in each group, an IP address returned by a domain name server and an alarm occurrence time are aggregated to obtain second characteristic information, and whether the target alarm data is alarm information corresponding to threat information or not is analyzed and judged by using a second preset large model and the second characteristic information to obtain the current judging result corresponding to the target alarm data, wherein the first preset grouping condition is based on an alarm type, an application protocol, a compromise index, a source IP address and an IP address of the target alarm data, and the second preset grouping condition is alarm information corresponding to the alarm information of threat information corresponding to the target alarm information, and the second preset grouping condition is alarm information corresponding to the alarm information, and the target alarm information corresponding to any other type of the target alarm information, and the malicious information is access information in the internal node or the internal node.
In a third specific embodiment, if a target table entry matched with the target alarm data does not exist in the dynamic table, based on a source IP address and a data flow direction of the target alarm data, grouping the target alarm data in a data flow direction corresponding to a data flow direction when any node in the device accesses other nodes in the device or a data flow direction corresponding to a data flow direction when an external node in the device accesses other nodes in the device, and based on a second preset periodic condition, aggregating a response code corresponding to the target alarm data in each group, a response IP returned by a DNS (Domain NAME SERVER, namely a Domain name server), a source IP address and an alarm occurrence time to obtain third feature information, and analyzing, judging and intercepting an access flow type of an attacker corresponding to the target alarm data by using a third preset large model and the third feature information to obtain a current judging and intercepting. It should be noted that the first preset periodic condition and the second preset periodic condition may be configured for 30 minutes, or may be adjusted accordingly according to actual situations, which is not limited herein.
Specifically, if there is no target item matched with the target alarm data in the dynamic table, analyzing and judging the target alarm data by using a preset large model to obtain a current judging result corresponding to the target alarm data, including grouping the target alarm data meeting a third preset judging condition based on a second preset grouping condition if there is no target item matched with the target alarm data in the dynamic table, and aggregating a response code corresponding to the target alarm data in each group, an IP address returned by a domain name server, a source IP address and an alarm occurrence time to obtain third characteristic information, analyzing and judging an access flow type of an attacker corresponding to the target alarm data by using the third preset large model and the third characteristic information to obtain the current judging result corresponding to the target alarm data, wherein the access flow type includes real flow, harmless flow and unknown flow, the second preset grouping condition is based on the response code corresponding to the target alarm data in each group, the IP address returned by a domain name server, the source IP address and the alarm occurrence time, and the access flow direction of an internal node corresponding to any other data access node device is the access direction of the data of the internal node.
In this embodiment, when analyzing and judging the access traffic type of the attacker corresponding to the target alarm data by using the third preset large model and the third feature information, if the obtained current judging result corresponding to the target alarm data represents that the access traffic type of the attacker corresponding to the target alarm data is unknown traffic, performing cyclic analysis and judging on the target alarm data corresponding to the unknown traffic again until the current judging result represents that the access traffic type corresponding to the target alarm data is real attack traffic or harmless traffic. Specifically, after analyzing and judging the target alarm data by using a preset large model to obtain a current judging result corresponding to the target alarm data, the method further comprises the steps of jumping to the step of grouping the target alarm data meeting a third preset judging condition based on a second preset grouping condition if the current judging result represents that the access flow type of an attacker corresponding to the target alarm data is unknown flow, and aggregating the response code corresponding to the target alarm data in each group, the IP address returned by the domain name server, the source IP address and the alarm occurrence time.
It can be understood that when the third preset large model and the third characteristic information are utilized to analyze and judge the access flow type of the attacker corresponding to the target alarm data, if the obtained current judging result corresponding to the target alarm data represents that the access flow type of the attacker corresponding to the target alarm data is real attack flow or harmless flow, the corresponding target alarm data is obtained, and the target alarm data is transmitted to engineering judging. Specifically, if the dynamic table does not have the target table item matched with the target alarm data, analyzing and judging the target alarm data by using a preset large model to obtain a current judging result corresponding to the target alarm data, and if the current judging result represents that the access flow type corresponding to the target alarm data is real attack flow or harmless flow, acquiring the target alarm data corresponding to the current judging result, and jumping to the step of performing engineering judging on the target alarm data by using the target table item so as to determine the current judging result corresponding to the target alarm data based on the alarm data judging result recorded in advance in the target table item.
Further, if the current research and judgment result represents that the access flow type corresponding to the target alarm data is real attack flow, extracting an attack source IP address, a data flow direction and the current research and judgment result of the target alarm data to form a target table item corresponding to the target alarm data in the dynamic table, and if the current research and judgment result represents that the access flow type corresponding to the target alarm data is harmless flow, extracting an alarm name, an alarm type, an application protocol, a compromise index, the source IP address and the current research and judgment result of the target alarm data to form a target table item corresponding to the target alarm data in the dynamic table. The method comprises the steps of extracting an attack source IP address, a data flow direction and a current grinding result of target alarm data to generate a target table item corresponding to the target alarm data in the dynamic table if the current grinding result represents that the access flow type corresponding to the target alarm data is real attack flow, and extracting an alarm name, an alarm type, an application protocol, a compromise index, the source IP address and the current grinding result of the target alarm data to generate the target table item corresponding to the target alarm data in the dynamic table if the current grinding result represents that the access flow type corresponding to the target alarm data is harmless flow.
And step S14, determining whether the target alarm data reach a preset security threat degree or not based on the current research judgment result corresponding to the target alarm data, and if not, eliminating the target alarm data.
In this embodiment, if the current research and judgment result corresponding to the target alarm data determines that the target alarm data reaches the preset security threat level, if the target alarm data does not reach the preset security threat level, a third party device or a SOAR (Security Orchestration, automation and Response, i.e. security arrangement automation and response) is used to automatically process the target alarm data, log recording can be performed on flow information corresponding to real attack flow corresponding to the target alarm data, or a blocking policy can be formulated according to the attack property and severity of the target alarm data, for example, for an IP address frequently initiated with an attack, permanent blocking or periodic re-evaluation of blocking status can be performed, if the target alarm data does not reach the preset security threat level, a preset whitelist database can be created, the target alarm data which does not reach the preset security threat level is stored, and the preset whitelist database can be updated periodically according to actual service requirements.
From the above, the application carries out engineering research and judgment on the target alarm data by the target table item corresponding to the target alarm data in the dynamic table, if the target table item matched with the target alarm data does not exist in the dynamic table, the target alarm data is analyzed and judged by utilizing the preset large model, so that the problem of complex alarm information and low coverage of the large model is solved, the accuracy and coverage of the alarm research and judgment are improved, and noise reduction is carried out on the alarm to identify important, real and effective alarms, thereby reducing the workload of safety operators.
As can be seen from the above embodiments, the present application performs the research alarm based on the large model research result and in combination with the engineering research to improve the accuracy and coverage of the alarm research, and therefore, the description will be made on the process of performing the research alarm based on the large model research result and in combination with the engineering research.
Referring to fig. 2, the embodiment of the invention discloses a specific method for noise reduction of safety alarm data, which comprises the following steps:
In this embodiment, the target alarm data is first obtained, and whether there is a target table item matched with the target alarm data in the locally pre-created dynamic table is determined, and fig. 3 is a schematic diagram of matching the dynamic table with the target alarm data provided in this embodiment. If a target table item matched with the target alarm data exists in the dynamic table, carrying out engineering research and judgment on the target alarm data by utilizing the target table item so as to determine a current research and judgment result corresponding to the target alarm data based on an alarm data research and judgment result corresponding to the target table item; and if the target table item matched with the target alarm data does not exist in the dynamic table, analyzing and judging the target alarm data by using a preset large model.
Fig. 4 is a schematic diagram of analysis and analysis of a large model provided in this embodiment, and analysis of the target alarm data by using a preset large model includes analysis and analysis of whether the target alarm data is alarm information corresponding to an active attack, analysis and analysis of whether the target alarm data is alarm information corresponding to threat information, and analysis of access traffic types of an attacker corresponding to the target alarm data, so as to obtain a current analysis result corresponding to the target alarm data.
Fig. 5 is a schematic diagram of an engineering grinding and judging diagram provided in this embodiment, if the current grinding and judging result represents that the access flow type corresponding to the target alarm data is real attack flow or harmless flow, the target alarm data corresponding to the current grinding and judging result is transmitted to the engineering grinding and judging result, so that the attack source IP address, the data flow direction and the current grinding and judging result of the target alarm data are extracted based on the fact that the access flow type corresponding to the target alarm data represented by the current grinding and judging result is real attack flow, so as to generate a target table item corresponding to the target alarm data in the dynamic table, or the alarm name, the alarm type, the application protocol, the compromise index, the source IP address and the current grinding and judging result of the target alarm data are extracted based on the fact that the access flow type corresponding to the target alarm data represented by the current grinding and judging result is harmless flow, so as to generate a target table item corresponding to the target alarm data in the dynamic table. Fig. 6 is a schematic diagram of a security alarm processing provided in this embodiment, in which the target alarm data is extracted based on the current determination result to form a pending alarm, and the alarm is automatically handled by using a three-party device or a SOAR.
As can be seen from the above, in this embodiment, the target alarm data is analyzed and judged by using the preset large model, and the engineering judging capability is formed by combining the judging results of the large model, so that the performance load of the large model is reduced, and the large model is used for judging more data, so as to identify important and real and effective alarms, reduce the workload of safety operators, and improve the accuracy and coverage of alarm judging.
Correspondingly, referring to fig. 7, the application also provides a device for reducing noise of safety alarm data, which comprises:
the alarm data judging module 11 is used for judging whether a target table item matched with the currently acquired target alarm data exists in a local pre-established dynamic table;
the alarm data research and judgment module 12 is configured to, if a target table entry matching the target alarm data already exists in the dynamic table, perform engineering research and judgment on the target alarm data by using the target table entry, so as to determine a current research and judgment result corresponding to the target alarm data based on a pre-recorded alarm data research and judgment result in the target table entry;
the target table item generating module 13 is configured to analyze and judge the target alarm data by using a preset large model if there is no target table item matched with the target alarm data in the dynamic table, so as to obtain a current judging result corresponding to the target alarm data, and generate a target table item corresponding to the target alarm data in the dynamic table based on the current judging result corresponding to the target alarm data;
And the alarm data eliminating module 14 is configured to determine whether the target alarm data reaches a preset security threat level based on a current judging result corresponding to the target alarm data, and if not, execute eliminating processing on the target alarm data.
From the above, the application carries out engineering research and judgment on the target alarm data by the target table item corresponding to the target alarm data in the dynamic table, if the target table item matched with the target alarm data does not exist in the dynamic table, the target alarm data is analyzed and judged by utilizing the preset large model, so that the problem of complex alarm information and low coverage of the large model is solved, the accuracy and coverage of the alarm research and judgment are improved, and noise reduction is carried out on the alarm to identify important, real and effective alarms, thereby reducing the workload of safety operators.
In some embodiments, the target table entry generating module 13 may specifically include:
The first characteristic information acquisition unit is used for extracting the characteristics of the target alarm data meeting the first preset research judgment condition if no target table item matched with the target alarm data exists in the dynamic table, so as to obtain first characteristic information;
And the first analysis and judgment unit is used for analyzing and judging whether the target alarm data is the alarm information corresponding to the active attack by utilizing a first preset large model and the first characteristic information so as to obtain the current judgment result corresponding to the target alarm data.
In some embodiments, the target table entry generating module 13 may specifically include:
The second feature information obtaining unit is used for grouping the target alarm data meeting a second preset judging condition based on a first preset grouping condition if a target table item matched with the target alarm data does not exist in the dynamic table, and obtaining second feature information by aggregating a response code corresponding to the target alarm data in each group, an IP address returned by a domain name server and alarm occurrence time;
and the second analysis and judgment unit is used for analyzing and judging whether the target alarm data is the alarm information corresponding to the threat information by utilizing a second preset large model and the second characteristic information so as to obtain the current judgment result corresponding to the target alarm data.
In some embodiments, the target table entry generating module 13 may specifically include:
A third feature information obtaining unit, configured to, if there is no target entry matching the target alarm data in the dynamic table, group the target alarm data that meets a third preset judging condition based on a second preset grouping condition, and aggregate a response code corresponding to the target alarm data in each group, an IP address returned by a domain name server, a source IP address, and an alarm occurrence time, so as to obtain third feature information;
And the third analysis and judgment unit is used for analyzing and judging the access flow type of the attacker corresponding to the target alarm data by utilizing a third preset large model and the third characteristic information so as to obtain the current judgment result corresponding to the target alarm data, wherein the access flow type comprises real attack flow, harmless flow and unknown flow.
In some embodiments, the security alarm data noise reduction device may specifically further include:
And the first flow type determining unit is used for jumping to the step of grouping the target alarm data meeting the third preset judging condition based on the second preset grouping condition if the current judging result represents that the access flow type of the attacker corresponding to the target alarm data is unknown flow, and aggregating the response code corresponding to the target alarm data in each group, the IP address returned by the domain name server, the source IP address and the alarm occurrence time.
In some embodiments, the security alarm data noise reduction device may specifically further include:
And the second flow type determining unit is used for acquiring the target alarm data corresponding to the current judging result if the current judging result represents that the access flow type corresponding to the target alarm data is real attack flow or harmless flow, and jumping to the step of carrying out engineering judging on the target alarm data by utilizing the target table item so as to determine the current judging result corresponding to the target alarm data based on the alarm data judging result recorded in the target table item in advance.
In some embodiments, the target table entry generating module 13 may specifically include:
The first data extraction unit is used for extracting an attack source IP address, a data flow direction and the current research and judgment result of the target alarm data if the current research and judgment result represents that the access flow type corresponding to the target alarm data is real attack flow, so as to generate a target table item corresponding to the target alarm data in the dynamic table;
And the second data extraction unit is used for extracting the alarm name, the alarm type, the application protocol, the compromise index, the source IP address and the current grinding result of the target alarm data if the current grinding result represents that the access flow type corresponding to the target alarm data is harmless flow, so as to generate a target table item corresponding to the target alarm data in the dynamic table.
Further, the embodiment of the present application further discloses an electronic device, and fig. 8 is a block diagram of an electronic device 20 according to an exemplary embodiment, where the content of the diagram is not to be considered as any limitation on the scope of use of the present application. The electronic device 20 may include, in particular, at least one processor 21, at least one memory 22, a power supply 23, a communication interface 24, an input-output interface 25, and a communication bus 26. The memory 22 is used for storing a computer program, and the computer program is loaded and executed by the processor 21 to implement relevant steps in the security alarm data denoising method disclosed in any of the foregoing embodiments. In addition, the electronic device 20 in the present embodiment may be specifically an electronic computer.
In this embodiment, the power supply 23 is configured to provide working voltages for each hardware device on the electronic device 20, the communication interface 24 is capable of creating a data transmission channel with an external device for the electronic device 20, and the communication protocol to be followed is any communication protocol applicable to the technical solution of the present application, which is not specifically limited herein, and the input/output interface 25 is configured to obtain external input data or output data to the external device, and the specific interface type of the input/output interface may be selected according to the specific application needs and is not specifically limited herein.
The memory 22 may be a carrier for storing resources, such as a read-only memory, a random access memory, a magnetic disk, or an optical disk, and the resources stored thereon may include an operating system 221, a computer program 222, and the like, and the storage may be temporary storage or permanent storage.
The operating system 221 is used for managing and controlling various hardware devices on the electronic device 20 and the computer program 222, which may be Windows Server, netware, unix, linux, etc. The computer program 222 may further comprise a computer program capable of performing other specific tasks in addition to the computer program capable of performing the security alert data denoising method performed by the electronic device 20 as disclosed in any of the foregoing embodiments.
Furthermore, the application also discloses a computer readable storage medium for storing a computer program, wherein the computer program realizes the method for reducing the noise of the safety alarm data when being executed by a processor. For specific steps of the method, reference may be made to the corresponding contents disclosed in the foregoing embodiments, and no further description is given here.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different point from other embodiments, so that the same or similar parts between the embodiments are referred to each other. For the device disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the relevant points refer to the description of the method section.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative elements and steps are described above generally in terms of functionality in order to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. The software modules may be disposed in Random Access Memory (RAM), memory, read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
While the foregoing has been provided to illustrate the principles and embodiments of the present application, specific examples have been provided herein to assist in understanding the principles and embodiments of the present application, and are intended to be in no way limiting, for those of ordinary skill in the art will, in light of the above teachings, appreciate that the principles and embodiments of the present application may be varied in any way.