Detection and analysis method for abnormal behaviors of user in big data environment

An analysis method and big data technology, applied in special data processing applications, electrical digital data processing, instruments, etc., can solve problems such as the inability to guarantee absolute data security

Active Publication Date: 2017-05-31
STATE GRID CORP OF CHINA +2
View PDF8 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the face of massive real-time data streams and diversified use case scenarios, security policies need to have gr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection and analysis method for abnormal behaviors of user in big data environment
  • Detection and analysis method for abnormal behaviors of user in big data environment
  • Detection and analysis method for abnormal behaviors of user in big data environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] see figure 1 It shows a schematic flowchart of a method for intelligent detection and analysis of abnormal user behavior in a big data environment disclosed by an embodiment of the present invention.

[0026] The method includes:

[0027] S11: According to the log records of users in a historical statistical period in HDFS (HDFS is a general term in the big data industry, referring to the distributed file system), use machine learning to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a detection and analysis method for the abnormal behaviors of a user in a big data environment. The method is characterized in that the method comprises the following steps: enabling a user abnormal behavior detection system to carry out the abnormality analysis of user access behaviors in an offline mode through machine learning according to the log record of the user in HDFS in one historical statistical period, and building a user behavior model; enabling the user abnormal behavior detection system to carry out the online comparison of real-time behaviors and historical behaviors based on the current real-time user's operation behavior in Storm; transmitting safety early-warning information to Kaffka and displaying the safety early-warning information at a Stream interface if the difference between real-time behaviors and historical behaviors is big, or else judging that the behavior is a legal safe behavior. Compared with the prior art, the method supports the definition of a behavior mode or a user portrait according to the historical use behavior habit of the user at a Hadoop platform through a machine learning algorithm. A training system updates a model each month in a default manner, and the granularity of the model is one minute.

Description

technical field [0001] The invention relates to a method for detecting and analyzing abnormal user behaviors in a big data environment. Background technique [0002] In the era of big data, data as an asset has become an industry consensus. Therefore, the issue of data security has risen to the strategic height of the enterprise. For enterprises, data security is very important. Once the data is hacked, the consequences will be very bad. [0003] Generally, data security products generally protect data from brutal intrusion through access control, security isolation, data classification, data encryption, and other methods. In the traditional small data environment, administrators rely on setting some basic security policies, such as single event execution policy (user accesses sensitive data columns, or moves 1TB of data from safe area A to unsafe area B, etc.), window-based Policy (the user accesses the restricted data more than 5 times within 10 minutes), which can basi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F17/30
CPCG06F16/1815G06F16/182G06F16/24568H04L63/1425
Inventor 贾博于烨吴旻荣柴育峰华荣锦夏绪卫孙寅冯国礼李蓉周蕾施科峰
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products