Unlock instant, AI-driven research and patent intelligence for your innovation.

Abnormal behavior detection method

A detection method and behavioral technology, applied in the field of Internet data security, can solve the problems of time-consuming, hindering fast-paced life, and complex identification process of personal security information, so as to avoid losses and save time.

Active Publication Date: 2019-03-29
YUNNAN UNIV
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because people need to frequently verify their identity on the network, the existing personal security information identification process is complicated and time-consuming, which undoubtedly hinders the current fast-paced life

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal behavior detection method
  • Abnormal behavior detection method
  • Abnormal behavior detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] Below in conjunction with specific example the present invention is further described:

[0061] See figure 1 , figure 2 , an abnormal behavior detection method, the present invention is characterized in that: in a social network or a pervasive computing environment, the abnormality is monitored by observing the specific pattern presented by the individual's behavior within a period of time; each individual has many social tags in the social network , so they are divided into different categories or groups according to these labels, and the behavior patterns of individuals should be similar to the group behavior patterns of the category they belong to. Therefore, when new behaviors are found, refer to the behavior patterns of individuals and groups to find the behavior of individuals. Abnormal degree; use the monitoring of individual abnormal degree to construct personal behavior feature vector (such as time, place, frequency of occurrence, sum and other multi-dimensio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an abnormal behavior detection method, which detects abnormality through observing specific modes, shown in the social network or the pervasive computing environment, of the behaviors of subjects / individuals within a certain period. Users can be divided into different groups according to own social tags, and the behavior mode of the user should be similar to the behavior modes of the other users in the same group. Then the abnormality degree of the new behavior is computed through integrating the behavior modes of the individuals and the group. Characteristics of a corresponding multidimensional array, such as time, site, frequency, sum and other multidimensional array information are collected through monitoring the behaviors of the subjects / individuals. According to the abnormal behavior detection method, a learning mode knowledge base is established through analyzing and mining the records; the group behavior mode is established based on the social tags for computing an abnormal behavior coefficient; and a self-update mechanism within a certain period is established for updating collected dynamic weights. In the abnormal behavior detection method, the all behaviors are monitored and analyzed.

Description

technical field [0001] The invention proposes a method for abnormal behavior detection, which relates to the fields of Internet data security, big data security and the like. Background technique [0002] The growing number of web applications of all kinds has contributed to the development of the web. But while people are enjoying the convenience brought by the network, they are also facing security problems brought along with it. Such as personal information leakage, identity theft and so on. Since people need to frequently perform identity verification on the Internet, the existing identification process of personal security information is complicated and time-consuming, which undoubtedly hinders the current fast-paced life. [0003] In order to solve this problem, the present invention proposes a method for detecting abnormal behavior of subjects / individuals based on value coefficients. [0004] In a social network or pervasive computing environment, we notice that th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416
Inventor 张德海张德刚
Owner YUNNAN UNIV