Abnormal access detection method, device and equipment and computer readable storage medium

A detection method and abnormal technology, applied in the field of communication, can solve problems such as data leakage, inability to solve important abnormal events, etc., to achieve the effect of protecting security

Inactive Publication Date: 2018-08-24
SANGFOR TECH INC
View PDF8 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although there are various ways to protect the security of intranet servers, most of the current solutions cannot solve some important abnormal events with small probability
For example,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal access detection method, device and equipment and computer readable storage medium
  • Abnormal access detection method, device and equipment and computer readable storage medium
  • Abnormal access detection method, device and equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0049] At present, there is a lack of an effective solution for abnormal access detection based on the behavior of intranet users accessing intranet servers. In this embodiment, the analysis is centered on the intranet server, and the important abnormal events with a small probability in the process of host access to the intranet server are d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an abnormal access detection method. The method comprises the following steps of: judging whether an access object, accessing an appointed intranet server, in obtained to-be-detected network audition data is a legal access object corresponding to the appointed intranet server or not; if the access object is not the legal access object, determining a probability value of a probability interval to which access behavior data corresponding to the access object belongs according to an access behavior probability distribution model; and when the probability value is smaller than a probability threshold value, determining an access behavior of the access object as abnormal access. The method is capable of recognizing small probability events so as to comprehensively and effectively protecting the safety of intranet servers. The invention furthermore discloses an abnormal access detection device and equipment and a computer readable storage medium, which also have abovebeneficial effects.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an abnormal access detection method, device, equipment and computer-readable storage medium. Background technique [0002] In an enterprise's intranet, the intranet server is a core asset. Wherein, the intranet server includes a mail server, an office server, a file server, a database server, and the like. The intranet server is related to the normal business operation and data flow of the enterprise. Therefore, the security of the intranet server is a key part of intranet security. [0003] Although there are various ways to protect the security of intranet servers, most of the current solutions cannot solve some important abnormal events with small probability. For example, the user's account is stolen or becomes an insider to access assets that would not be accessed under normal circumstances; the user collects various asset data, resulting in data leakage, e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F21/55
CPCG06F21/31G06F21/552
Inventor 刘伯仲邓守勋
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products