Abnormal-behavior detection method and device

A detection method and behavioral technology, applied in the Internet field, can solve problems such as lack of monitoring and early warning, company data leakage, irreversible data leakage losses, etc., to achieve the effect of improving data security and reducing the risk of data leakage

Inactive Publication Date: 2018-07-20
KE COM (BEIJING) TECHNOLOGY CO LTD
View PDF3 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Some users in the company frequently browse some sensitive data reports, or even download some detailed data with a higher security level, which may lead to the risk of company data leakage
[0003] The existing technical means generally control the user's data authority through the authority system to restrict users from seeing certain data. In addition, after the data leak occurs, combined with the audit log to carry out post-event accountability
However, the method of restricting by using the authority system lacks behavior monitoring and early warning for users with existing data authority, and it cannot solve the situation that user account passwords are stolen
For the data that has been leaked, the post-event audit log is used to pursue accountability, which lacks real-time performance, but the loss of data leakage cannot be recovered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal-behavior detection method and device
  • Abnormal-behavior detection method and device
  • Abnormal-behavior detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0020] figure 1 A schematic flow chart of the abnormal behavior detection method provided by the embodiment of the present invention, such as figure 1 As shown, the method includes:

[0021] S101. Obtain an access log of the system to be detected, and report the log to a message queue, where the log includes at least behavior data;

[0022] S10...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an abnormal-behavior detection method and device. The method includes: acquiring access logs of a to-be-detected system, and reporting the logs into a message queue, wherein thelogs at least include behavior data; analyzing the behavior data in the message queue; and if the behavior data meet a certain preset condition, judging that a behavior is an abnormal behavior. By utilizing the solution provided by the invention, data security can be improved, and risk of data leakage can be reduced as much as possible.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method and device for detecting abnormal behavior. Background technique [0002] In Internet companies, there are quite a lot of data, including user privacy data and confidential data related to company operations. Data is the core asset of the company. Some users in the company frequently browse some sensitive data reports, or even download some detailed data with a higher security level, which may lead to the risk of company data leakage. [0003] The existing technical means generally control the user's data authority through the authority system to restrict users from seeing certain data. In addition, after the data leak occurs, combined with the audit log to carry out post-event accountability. However, the way of restricting by using the permission system lacks behavior monitoring and early warning for users with existing data permissions, and it cannot solve the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
Inventor 李小龙钱大伟张智源张京一韩威
Owner KE COM (BEIJING) TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products