A user behavior trust evaluation method and system based on improved ahp

A user and behavior technology, applied in the field of network security, can solve the problems of ignoring user historical behavior trust considerations, lack of accuracy and comprehensiveness of evaluation results, and inability to obtain comprehensive information of user trust evaluation, so as to reduce one-sidedness and ensure safety and credibility Effect

Active Publication Date: 2019-10-25
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, user behavior evaluation based on AHP only provides user behavior evaluation at a single moment, ignoring the trust consideration of user historical behavior, making the results one-sided and unable to obtain comprehensive information of user trust evaluation, so the evaluation results lack accuracy and comprehensiveness

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A user behavior trust evaluation method and system based on improved ahp
  • A user behavior trust evaluation method and system based on improved ahp
  • A user behavior trust evaluation method and system based on improved ahp

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Based on the improved AHP user behavior trust evaluation and decision-making method, the invention uses the AHP principle to add time factors to collect and model the evidence of the user's historical continuous time, constructs the user behavior evidence matrix and weight matrix of the continuous time, and calculates the comprehensive security of the user. The evaluation results make the security evaluation for network users more accurate and comprehensive, thereby effectively ensuring the security and credibility of the network.

[0024] In order to make the objectives, technical solutions and advantages of the embodiments of the present invention clearer, the present invention will be described in detail below with reference to the accompanying drawings.

[0025] A user behavior trust evaluation and decision-making method based on improved AHP, the process of the method is as follows figure 1 As shown, the specific process is:

[0026] Step 201, using a security mon...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user behavior trust evaluation method and system based on the improved AHP. The invention uses the AHP thought to model the user behavior evidence, adds the time factor to calculate the multi-dimensional trust vector of a continuous time, and evaluates whether a security threat is exist in the user behavior or not according to the integrated trust. The user behavior trust evaluation method based on the improved AHP comprises the key steps such as user behavior collection and processing, user behavior evaluation and modeling, user behavior evidence weight matrix construction, the construction of the trust matrix based on the time, the construction of the weight matrix based on the time, and user integrated trust evaluation and decision and the like. The invention can effectively guarantee the security and credibility of the network system.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a user behavior trust evaluation method and system based on improved AHP. Background technique [0002] With the development and wide application of the network, network security has become increasingly prominent. Recently, attack techniques and threat methods for various network architectures have emerged one after another, and the security threats faced by network systems will become more and more serious in the future. According to the statistics of the FBI, 83% of information security incidents are caused by insiders or internal and external collusion, of which 16 % from unauthorized use by internal users, so monitoring and evaluation of user behavior in the internal network is important. [0003] At present, the AHP idea has been used at home and abroad to calculate and evaluate the trust degree of user behavior in the network. For example, the invention patent ap...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/1408H04L63/20H04L63/30H04L63/302
Inventor 杨倩谢德俊宋晨王利明
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products