Method for generating unexpected pattern, method for determining whether users have malicious behaviors or not and computing device

A technology for computing equipment and users, applied in the field of information security, can solve the problems of low accuracy rate, increased cost, false detection and missed detection, etc., to achieve the effect of high accuracy, saving labor costs, and improving accuracy

Active Publication Date: 2017-10-10
BEIJING KNOWNSEC INFORMATION TECH
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the basic personal information of users is relatively easy to forge, and the information of each user is largely isolated and lacks relevant information with other information, the detection accuracy of network anomalies is not high, and there are many cases of false detection and missed detection.
In addition, the content of abnormal patterns is relatively single, the accuracy of detection is not high, and most of them are manually configured, which increases the cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating unexpected pattern, method for determining whether users have malicious behaviors or not and computing device
  • Method for generating unexpected pattern, method for determining whether users have malicious behaviors or not and computing device
  • Method for generating unexpected pattern, method for determining whether users have malicious behaviors or not and computing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0021] figure 1 A structural block diagram of a computing device 100 according to an exemplary embodiment of the present invention is shown. The computing device 100 can be implemented as a server, such as a file server, a database server, an application program server, and a network server, etc., and can also be implemented as a personal computer including a configuration of a desktop computer and a notebook computer. Additionall...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for generating an unexpected pattern. The method comprises the steps that user data of a plurality of users is obtained; according to the obtained user data, a user relationship diagram is built; in the built user relationship diagram, at least one kind of associated features of each personnel node are extracted according to each personnel node and the attribute values of the other nodes which are connected with the personnel node through sides; for each kind of associated features, the exception reference value of the associated features is computed according to the associated features marked as the associated features of the personnel node without malicious behaviors; according to the associated features marked as the associated features of the personnel node without malicious behaviors, the non-exception reference value of the associated features is computed; according to the computed exception reference value and the computed non-exception reference value of the at least one kind of associated features, the unexpected pattern is generated. The invention further discloses a method for determining whether users have the malicious behaviors, and a corresponding computing device and a computer readable storage medium.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and a computing device for generating an abnormal pattern and determining whether a user has malicious behavior. Background technique [0002] With the rapid development of network communication technology, the continuous deepening of Internet applications, and the increasingly rich information carried, the Internet has become an important infrastructure of human society. At the same time, network security problems are becoming more and more serious. Among them, malicious network behaviors such as network fraud are gradually becoming an important criminal method that endangers the safety of public property. [0003] At present, the main way to manage such malicious behavior is to use anomaly patterns to detect based on the basic information of users. Anomaly patterns usually include the conditions met by users with malicious behaviors. Basic information can ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06Q40/02H04L29/06
CPCH04L63/1425H04L63/1441G06F16/9024G06Q40/03
Inventor 蔡自彬
Owner BEIJING KNOWNSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products