Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anomaly detection device and method for security information interaction

A security information and anomaly detection technology, applied in the field of anomaly detection devices, can solve the problems of high false alarm rate and false negative rate, inappropriate feature selection, and inability to detect local anomalies well, achieving high security and low Effect of False Positive and False Negative Rates

Active Publication Date: 2014-01-29
CHINA UNIONPAY
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the existing detection devices and methods for the second abnormality have the following problems: (1) For the first detection method, its limitation is that the data distribution in reality often does not conform to any known ideal In addition, most of the tests are for a single attribute, which is not ideal for anomaly detection in multidimensional data; (2) for the second detection method, it mainly uses sequence anomaly technology, that is, imitating human Thinking mode, find elements different from most data from a set of continuous sequences, but its false positive rate and false negative rate are high; (3) For the third detection method, it can only detect global abnormalities Data is not suitable for data sets with multiple densities, so local anomalies cannot be detected well; (4) For the fourth detection method, its false positive rate and false negative rate are also high
It can be seen from the above that the existing detection devices and methods for the second type of anomaly have high false alarm rate and false negative rate due to inappropriate feature selection or insufficient detection range, which affects the performance and performance of the security information interaction system. safety

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anomaly detection device and method for security information interaction
  • Anomaly detection device and method for security information interaction
  • Anomaly detection device and method for security information interaction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] figure 1 is a schematic structural diagram of an anomaly detection device for security information interaction according to an embodiment of the present invention. like figure 1 As shown, the anomaly detection device disclosed in the present invention includes a preprocessing module 1 and an anomaly detection module 2 . Wherein, the preprocessing module 1 is used to complete the preprocessing operation based on the safety information interaction records in the database to construct a classifier model, a conditional probability table and a group table for sequence comparison. The anomaly detection module 2 is used to receive and analyze the security information interaction data from a data processing server (such as a transaction processing server), and judge and determine the difference based on the classifier model, conditional probability table and group table used for sequence comparison. The type of security information interaction (such as financial transaction) ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an anomaly detection device and method for security information interaction. The method includes the following steps of completing preprocessing operation on the basis of security information interaction records in a database to build a classifier model and conditional probability table and a group table for sequence alignment, analyzing security information interaction data, and judging the types of security information interaction related to the security information interaction data on the basis of the classifier model and conditional probability table and the group table for sequence alignment. The anomaly detection device and method for security information interaction have high security, the low false alarm rate and the low missing report rate.

Description

technical field [0001] The present invention relates to an anomaly detection device and method, and more particularly, to an anomaly detection device and method for security information interaction. Background technique [0002] At present, with the increasingly wide application of the network and the increasing variety of business types in different fields, the anomaly detection device and method used for security information interaction (that is, information interaction with high security requirements, such as financial transactions) become more and more complex. more and more important. [0003] Usually, abnormal security information interaction includes the following two types: (1) does not meet the requirements of the security information interaction system on the flow and format of security information interaction; (2) meets the requirements of the security information interaction system on normal security However, the security information interaction itself has certa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/50
CPCG06F21/50
Inventor 柴洪峰吴承荣何朔叶家炜王兴建廖健
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products