Method and system for analyzing user access compliance

A compliance and access relationship technology, applied in the field of network information security

Active Publication Date: 2018-11-23
武汉思普崚技术有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Some users have fixed services and evenly distributed traffic demands.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for analyzing user access compliance
  • Method and system for analyzing user access compliance
  • Method and system for analyzing user access compliance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0056] figure 1 A flow chart of an embodiment of the method for user access compliance analysis provided by the present invention, the method includes:

[0057] Step 101, monitor the network access situation of a specific object in the network, and collect the access traffic of the specific object.

[0058] Step 102, obtaining the historical access data of the specific object from the server, and learning and summarizing the access relationship model of the specific object.

[0059] The obtaining the historical access data of the specific object from the server further includes: sending a request to the server for obtaining the access data, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for analyzing the user access compliance. The method comprises the following steps: acquiring historical access data of a specific object from a server, learning and summarizing an access relation model of the specific object, matching real-time access data of the specific object with the access relation model, and judging whether the specific object isdeviated from the reference of the access relation model according to a matching result. Therefore, attributes of different users can be distinguished, and whether an access to the specific object isabnormal or not is determined.

Description

technical field [0001] The present application relates to the technical field of network information security, in particular to a method and system for user access compliance analysis. Background technique [0002] Users access network resources more and more frequently, and there are more and more application resources, which brings great challenges to network security management. Traditional network security management is to analyze the flow of user behavior, such as abnormal increase in flow, to determine whether user behavior is abnormal or there is a network attack. [0003] However, this user behavior analysis does not consider the attributes of different users. For example, some users have various services and need to access a variety of different network resources. It is very normal for periodic traffic increases. However, some users have fixed services and evenly distributed traffic demands. Therefore, it is very necessary to provide a method and system for user ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/31
CPCG06F21/316H04L63/1408
Inventor 段彬
Owner 武汉思普崚技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products