Network user behavior risk assessment method based on AHP

A network user and risk assessment technology, applied in the direction of electrical components, transmission systems, etc., can solve problems such as inestimable harm, and achieve the effect of solving general and uncertain problems

Inactive Publication Date: 2017-10-03
CHENGDU GOLDTEL IND GROUP
View PDF8 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 4) Unknownness: The attacker constructs a special code to trigger the attack based on the targeted security vulnerability found, according to the application itself, and writes a special Trojan horse that meets his own attack target but can bypass the existing defender detection system. These 0DAY vulnerabilities and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network user behavior risk assessment method based on AHP

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] Such as figure 1 , the AHP-based network user behavior risk assessment method is to decompose the overall user behavior risk layer by layer according to the actual application requirements and functional characteristics, decompose the comprehensive and general user behavior risk into several behavior risk attributes, and then divide the behavior risk attributes Continue to refine it into behavioral risk evidence that can be directly measured by software and hardware, and obtain a comprehensive risk value.

[0061] AHP-based network user behavior risk assessment method, which includes the following steps:

[0062] S1: Preprocessing of network user behavior data;

[0063] S2: fingerprint modeling;

[0064] S3: Obtain the comprehensive risk value.

[0065] The preprocessing of network user behavior data includes network user behavior data collection, label classification and analysis;

[0066] The network user behavior data collection objects include a user information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network user behavior risk assessment method based on AHP. The method comprises the steps that an integral user behavior risk is decomposed layer by layer through analytic hierarchy process (AHP) according to the practical application requirements and the functional characteristics, the comprehensive and general user behavior risk is decomposed into a plurality of behavior risk attributes, then the behavior risk attributes continue to be refined into behavior risk evidence which can be directly measured by software and hardware, and a comprehensive risk value is obtained finally. According to the method, for intrusion routes of APT attacks, risk assessment is conducted on network user behaviors by starting with personal online behavior data analyzing and mining, intrusion of APT attack initiators is monitored from the source, and the APT attack monitoring and defending purposes are achieved.

Description

technical field [0001] The invention relates to the field of network user behavior risk assessment, in particular to an AHP-based network user behavior risk assessment method. Background technique [0002] 1. The danger of APT attacks [0003] APT attacks are generally professional or even organized and national-backed hackers, an attack method launched against important targets and systems. The main features are: [0004] 1) Terminal nature: Although the attacker's attack target is for important assets, the starting point is the terminal, and the terminal must be accessed by people. However, in a large organization, it is difficult to guarantee everyone's security capabilities and security awareness All are of a high standard. Therefore, it is much more difficult to do a good job of terminal protection for everyone than server-side protection. If you attack the WEB server through SQL injection, you generally hope to use it to attack the end users who use these WEB servers...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1433H04L63/1441H04L63/20
Inventor 彭光辉屈立笳陶磊苏礼刚林伟何羽霏
Owner CHENGDU GOLDTEL IND GROUP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products