Website abnormal access behavior detection method based on visual analysis

A detection method and behavior technology, applied in the field of network security visual analysis, to achieve high efficiency and clear effect

Active Publication Date: 2013-06-05
TIANJIN UNIV
View PDF1 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the problem of the design of the visualization method in the existing visual analysis technology, there has not yet been

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Website abnormal access behavior detection method based on visual analysis
  • Website abnormal access behavior detection method based on visual analysis
  • Website abnormal access behavior detection method based on visual analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The invention proposes a method for analyzing and discovering website attack patterns based on visual analysis, and at the same time provides cluster analysis of malicious users and reproduction of attack behaviors. Through effective visualization methods and cluster analysis based on different parameters, this method enables users to find out malicious users in the iterative process of discovery, data mining, and discovery, and vividly reproduces the behavior of malicious users through animation. According to this method, the inventor has established a set of computer software system, which can efficiently analyze website log data, find several specific attack modes, find malicious users, and automatically recommend the corresponding ones according to the behavior characteristics of malicious users. Other users with similar behavior patterns of this user can intuitively display the information contained in the website logs and show the behavior patterns of website visit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of network security visual analysis and relates to a website abnormal access behavior detection method based on the visual analysis. The method includes the steps of carrying out preprocessing on log data of a web server, utilizing a visual method to display position, time and content information of the data, utilizing an animation effect to display access events, carrying out clustering analysis on access users, carrying out acquisition and calculation on data attributes, and carrying out pattern discovery on abnormal access behaviors through combination of observation to visual results and clustering results and manual analysis. Compared with a traditional pure-machine computation method, the website abnormal access behavior detection method based on the visual analysis is capable of enabling a user to understand more clearly and visually, fully utilizes human intelligence, finds good balance between intelligent degree and human involvement, and is favorable for improving efficiency of solving problems.

Description

technical field [0001] The invention belongs to the field of visual analysis of network security, and relates to a method for reproducing user's behavior on a website by using visualization technology and combining artificial analysis to effectively discover abnormal behavior of visiting the website. Background technique [0002] With the rapid development of the Internet in recent years, attacks against websites show a trend of frequent and diversified development. Now popular attack methods include DoS / DDoS attacks, SQL injection attacks, etc. Behaviors that may have malicious intentions include malicious probing behaviors and website lying behaviors. The economic losses caused by hackers attacking websites are countless, which brings great harm to Internet order and personal privacy. Therefore, it is extremely important for website security maintenance to find abnormal access patterns from massive user visits to discover malicious behaviors. [0003] Visual analysis is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/08H04L29/06
Inventor 张加万康凯吕文瀚赵煜陈章磊李彦霖
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products