BBS user abnormal behavior auditing method based on Hidden Markov theory

A hidden Markov and behavior technology, applied in the field of BBS user abnormal behavior audit based on hidden Markov theory, can solve problems such as the reason why administrators cannot perform, and achieve the effect of improving security

Inactive Publication Date: 2009-12-30
NORTHEASTERN UNIV
View PDF0 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the current various BBS systems, they often only care about the security of the data transmitted on the network and the identity security during the access process, and what information, resources, time of use, and how t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • BBS user abnormal behavior auditing method based on Hidden Markov theory
  • BBS user abnormal behavior auditing method based on Hidden Markov theory
  • BBS user abnormal behavior auditing method based on Hidden Markov theory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The overall block diagram of the BBS audit module is as follows: figure 2 shown.

[0048] The collected audit data includes published article audit data, modified article audit data, deleted article audit data, user information audit data, layout information audit data and the audit module's own audit data. The audit module's own data is composed of auditor login information audit data and auditor operation information audit data.

[0049] The collection process of published article audit data is as follows: image 3 shown. The audit data comes from the page index file and article file under the BBS. The page index file contains multiple fileheader structures, and each structure corresponds to an article. The corresponding data can be extracted from the index file, and the text of the article can be extracted from the text file. , all the data are processed and stored in the Publish_p table of the database and the audit file Publish.txt.

[0050] Modify the collect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a BBS user abnormal behavior auditing method based on Hidden Markov theory, belonging to the technical field of computer and information safety. The method comprises the following steps: reading auditing data from a database to obtain behavior observed sequence to be detected; reading trained model parameters from a Hidden Markov model database; calculating a state value sequence by utilizing a Viterbi algorithm; calculating the observed value sequence probability by forward and afterward algorithms, comparing the observed value sequence probability with the preset threshold, and giving an alarm if the observed value sequence probability is lower than the threshold, otherwise, belonging to normal behavior, correcting the Hidden Markov model parameter and storing the Hidden Markov model parameter into a parameter file of the Hidden Marko model. The BBS added with audit tracking helps system managers to prevent systems and resources from being damaged by illegal authorized users and provides help when data is recovered. The audit tacking can realize associated targets of safety, comprising personal function, event reconstruction, intrusion detection and fault analysis, and greatly improves the safety of the system.

Description

technical field [0001] The invention belongs to the technical field of computer and information security, in particular to a BBS user abnormal behavior auditing method based on hidden Markov theory. Background technique [0002] The full English name of BBS is Bulletin Board System, which translates to Chinese as "electronic bulletin board system". [0003] At present, the BBS system can provide various shared resources to various users, and everyone can browse articles in the system and share files in the system after registering an account. At present, in addition to providing public BBS, domestic BBS service stations including various commercial purposes are also provided. BBS provides a variety of work columns such as discussion area, letter area, chat area, file sharing area, etc. It can also host and open up new BBS columns according to the needs of BBS station owners or users themselves. [0004] However, in the current various BBS systems, they often only care abou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30G06F21/00H04L12/24
Inventor 王兴伟张登科姜英陈静董明李福亮李刚
Owner NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products