Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User risk assessment and analysis method based on multi-dimensional behavior model

A technology of risk assessment and analysis method, applied in the direction of electrical components, transmission systems, etc., can solve the problem of low accuracy of user risk judgment

Active Publication Date: 2018-06-29
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

All users use this model for risk determination, so the accuracy of user risk determination is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User risk assessment and analysis method based on multi-dimensional behavior model
  • User risk assessment and analysis method based on multi-dimensional behavior model
  • User risk assessment and analysis method based on multi-dimensional behavior model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] First of all, it should be explained that the present invention is an application of computer technology in the field of information security technology. During the implementation of the present invention, the application of multiple software function modules will be involved. The applicant believes that after carefully reading the application documents and accurately understanding the realization principle and purpose of the present invention, and in combination with existing known technologies, those skilled in the art can fully implement the present invention by using their software programming skills. All the software functional modules mentioned in the application documents of the present invention belong to this category, and the applicant will not list them one by one.

[0063] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail:

[0064] Such as figure 1 A user risk assessment and analysis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of network information security, and aims to provide a user risk assessment and analysis method based on a multi-dimensional behavior model. The user risk assessmentand analysis method based on the multi-dimensional behavior model can evaluate the user risk of an application with a log. Users are acquired by a product log; behavior features of the users are searched; behavior data form sample data; a cluster of normal behaviors is obtained by birch; lastly, normal behavior probability distribution of the user is obtained through a mixed Gauss model; and thenBayesian linear regression is adopted to obtain a linear model capable of accurately generalizing normal behaviors of the users. Through adoption of the method, risk assessment can be performed on online user states accurately, efficiently and intelligently.

Description

technical field [0001] The invention relates to the field of network information security, in particular to a user risk assessment and analysis method based on a multidimensional behavior model. Background technique [0002] In the Internet age, the Internet carries all aspects of our lives, from study to work, from life to entertainment, whether it is online shopping or online entertainment, it has brought us great convenience, but at the same time, there are many hidden network traps and unsafe factors. [0003] The weakest link in network security is user security. Internet users have weak security awareness and poor security management and control capabilities. [0004] In view of the current situation of network security, most network security products will give early warning of user risks. However, most network security products assess user risks based on a single large machine learning model. [0005] Based on a single huge machine learning model, a user model is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1425
Inventor 刘博范渊杨锦峰聂桂兵
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products