Dynamic user behavior-based cloud forensics method and dynamic user behavior-based cloud forensics system

A dynamic user and behavior technology, applied in the computer field

Inactive Publication Date: 2013-04-17
INSPUR GROUP CO LTD
View PDF1 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the absence of huge loopholes in the encryption algorithm and security authentication system, exhaustive enumeration has become the only way to crack passwords, but the amount of calculation generated by exhaustive enumeration is also beyond the reach of ordinary computing technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic user behavior-based cloud forensics method and dynamic user behavior-based cloud forensics system
  • Dynamic user behavior-based cloud forensics method and dynamic user behavior-based cloud forensics system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0038] The cloud forensics method based on dynamic user behavior in the present invention proposes a formalized definition of dynamic user behavior, based on which, dynamic user behavior and behavior data are collected, and after data integration, cleaning and data mining, forensic analysis data is formed, which is processed by MapReduce Forensic analysis data is analyzed to dig out potential user behavior patterns and possible attack behaviors to form forensic evidence and present it in a visual way.

[0039] Referring to Figure 1 and Figure 2, the cloud forensics method based on dynamic user beha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dynamic user behavior-based cloud forensics method and a dynamic user behavior-based cloud forensics system; the formalized definition of dynamic user behavior is put forward as basis; and the method comprises the steps of: collecting dynamic user behavior and behavior data, and storing the behavior data as primary evidence data; carrying out data integration, data cleaning and data mining to form forensic analysis data, and storing the forensic analysis data into a data analysis library (key value database); using Map Reduce to carry out correlation analysis, sequence pattern analysis and isolated point analysis on the forensic analysis data, and digging out the potential user behavior patterns and the possible aggressive behavior to form forensic evidence; and displaying the forensic evidence in a visual way. The high performance computing power of cloud computing and large-scale distributed-memory environment are applied into computer forensic analysis, so that various problems in cloud computing forensics can be solved.

Description

technical field [0001] The invention belongs to the technical field of computers, and relates to a cloud evidence collection method and system based on dynamic user behavior. Background technique [0002] Computer forensics is the process of using various computer software and hardware knowledge and discrimination techniques to identify, store, analyze and submit digital evidence for computer intrusion, destruction, attack, fraud and other criminal acts in a legally compliant manner. It is the most direct weapon to combat computer and network crimes and ensure information security. It is an important branch of network security technology. It can not only be used for network security protection and emergency response, but also can intervene in judicial procedures when necessary. Legal proceedings provide admissible evidence. Since computer forensics was proposed in 1991, after more than ten years of continuous in-depth research and development, research in this direction at ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08G06F17/30
Inventor 李清玉
Owner INSPUR GROUP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products