Abnormal computer user behavior detection method
Anomaly detection and computer technology, applied in the field of network security, can solve the problems of difficult rule definition, poor operability, and difficult for administrators to handle.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] In order to make the purpose, content, and advantages of the present invention clearer, the specific embodiments of the present invention will be further described in detail below with reference to the accompanying drawings and embodiments.
[0027] figure 1 Shown is a flow chart of a method for detecting abnormal computer user behavior according to the present invention, such as figure 1 As shown, the present invention combines the characteristics of computer user behavior, and divides the elements used for abnormal computer user behavior detection into four types: user identity information, object information, time information, and behavior information. User identity information mainly includes identity authentication information, IP address information, MAC address information, role information, etc. The object information mainly includes IP address information, object type information, port information, and the like. The time information mainly includes the time o...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


