User behavior association analysis method and system based on bypass audit equipment

A technology of correlation analysis and application system, applied in the field of network technology and database audit, can solve the problems of losing real user information, difficult to trace the source of user behavior, and difficult to correlate real user information

Active Publication Date: 2018-01-05
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF7 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the Internet application environment is on the public network, access requests from various clients, that is, network access data traffic packets, must pass through layers of networks to reach the proper environment, that is, the audit object pair, so the data traffic packets captured by the audit device will be lost. Some real user information, it is difficult to associate real user information with these request behaviors from all parties, making it difficult to trace the source of user behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User behavior association analysis method and system based on bypass audit equipment
  • User behavior association analysis method and system based on bypass audit equipment
  • User behavior association analysis method and system based on bypass audit equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] First of all, it should be explained that the present invention is an application of computer technology in the field of information security technology. During the implementation of the present invention, the application of multiple software function modules will be involved. The applicant believes that, after carefully reading the application documents and accurately understanding the realization principle and purpose of the present invention, combined with existing known technologies, those skilled in the art can fully implement the present invention by using their software programming skills.

[0067] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail:

[0068] Such as figure 1 A user behavior association analysis method based on a bypass audit device is shown, which specifically includes the following steps:

[0069] A) Collect network access traffic

[0070] The step A specifically include...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network technology and a database audit technology, and aims to provide a user behavior association analysis method based on bypass audit equipment. The user behavior association analysis method based on the bypass audit equipment comprises the steps of: acquiring network access traffic; and analyzing a network access traffic packet. According to the invention, real useraccess information of non-user-information URLs in the traffic packet can be rapidly associated to, the real user access information of the non-user-information URLs in the traffic packet can be accurately associated to, and real user access information of each URL in the traffic packet can be intelligently associated to.

Description

technical field [0001] The invention relates to the field of network technology and database audit technology, in particular to a user behavior association analysis method and system based on bypass audit equipment. Background technique [0002] With the popularization and development of computer information technology and Internet applications, various Internet application systems have been widely used, and the access from clients has become more and more complicated, which makes the security problems of Internet applications more and more prominent. Therefore, more and more manufacturers, enterprises, and governments use independent audit equipment to audit user behavior. [0003] In the actual Internet application environment, the application system processes operations from various client terminals and generates massive amounts of data. Since the Internet application environment is on the public network, access requests from various clients, that is, network access data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06H04L29/08G06F17/30
Inventor 王飞飞范渊刘博龙文洁
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products