Operation behavior detection method, server and system
A detection method and server technology, which is applied in the field of information processing, can solve problems such as instability of organizational personnel and crimes, and achieve the effect of improving information security and accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0036] An embodiment of the present invention provides a method for detecting operation behavior, such as figure 1 shown, including:
[0037] Step 101: Obtain user operation behavior information, wherein the operation behavior information includes at least one operation for at least one target object;
[0038] Step 102: Analyze at least one analysis dimension for at least one operation on at least one target object in the user's operation behavior information, and obtain an analysis result of at least one analysis dimension corresponding to the user;
[0039] Step 103: Based on the analysis result of at least one analysis dimension corresponding to the user, the detection result of the behavior level of the user is obtained.
[0040] First of all, it should be noted that this embodiment can be applied to the network side, specifically, it can be applied to a management device or a server.
[0041] The manner of obtaining the operation behavior information of the user may be:...
Embodiment 2
[0092] An embodiment of the present invention provides a method for detecting operation behavior, such as Figure 8 shown, including:
[0093] Step 801: Obtain the user's operation behavior information, wherein the operation behavior information includes at least one operation for at least one target object;
[0094] Step 802: Analyze at least one analysis dimension for at least one operation on at least one target object in the user's operation behavior information, and obtain an analysis result of at least one analysis dimension corresponding to the user;
[0095] Step 803: Prioritize the at least one analysis dimension to obtain analysis dimensions corresponding to N priorities, where N is an integer greater than or equal to two;
[0096] Step 804: According to at least one analysis result of at least one analysis dimension corresponding to the N priorities, a detection result for the user's behavior level is acquired.
[0097] First of all, it should be noted that this e...
Embodiment 3
[0121] Based on the solution provided in Embodiment 1 or Embodiment 2, this embodiment further explains whether to issue an alarm message after the detection result is obtained: according to the detection result for the user’s behavior level, determine whether to generate and output at least The prompt information of the user's behavior level.
[0122] Specifically, see Figure 12 , implement different warning measures according to the behavior level, for example: Suspicious level, use email to send an alarm to the security administrator. High-risk level, use text messages and phone calls to alert the security administrator. Normal level, it can be determined that no alarm will be issued. The means of warning include but are not limited to email, text message and phone call.
[0123] In this way, by collecting data, it is possible to detect in time the behavior of employees maliciously exporting sensitive information of the organizational structure and issue an alarm, so th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


