Unlock instant, AI-driven research and patent intelligence for your innovation.

Abnormal detection method and system for application access behavior

A technology for application access and anomaly detection, applied in error detection/correction, instrumentation, digital data authentication, etc., can solve problems such as identifying people with abnormal application access behaviors, incomplete application access related factors, and difficulty in forming security management thresholds, etc. To achieve the effect of reducing data leakage

Active Publication Date: 2020-10-13
BEIJING VRV SOFTWARE CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the management mode of the existing technology can only be implemented in the application system with the authority distribution module on the one hand, and on the other hand, it cannot prevent the personnel with the access authority from performing illegal operations, or the account of the personnel with the access authority is maliciously stolen Used for malicious access to application resources
Moreover, the application access-related factors that can be collected by the existing technology are incomplete, or it is difficult to form a reasonable and complete security management threshold, so it is also difficult to find out the abnormal personnel with application access behavior by setting a complex security model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal detection method and system for application access behavior
  • Abnormal detection method and system for application access behavior
  • Abnormal detection method and system for application access behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are the Some, but not all, embodiments are invented. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] At present, it is difficult for existing technologies to find out users with abnormal application access behaviors through reasonable and effective measures, thereby failing to reduce the occurrence of data leakage.

[0026] Regarding the issue above, figure 1 It is a schematic flowchart of a method for detecting abnormal application access behavior provided by ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an application access behavior anomaly detection method and system. The method comprises the following steps of obtaining the access data of a first user to each application in a period to be detected; according to the history data of the first user, correlating the access data of the user in the period to be detected and the access data of the first user to each application in the period to be detected, and respectively calculating the access deviation degree of the first user to each application ; calculating an application access outlier value of thefirst user according to an access deviation degree of the first user to each application and an importance degree of each application; if the application access outlier value of the first user is greater than the preset threshold value, determining that the application access behavior of the first user is abnormal in the period to be detected. Deviation degree calculation and weighted outlier calculation can successfully detect whether users apply abnormal access behavior, and the detected data source does not rely on too much access behavior factors and complex exception detection mechanism,thereby being simple and fast to reduce the data leakage.

Description

technical field [0001] The present invention implements the technical field of data security, and in particular relates to a method and system for detecting abnormal application access behaviors. Background technique [0002] With the deepening of information production in various industries, various information resources are stored, managed and analyzed and displayed in different application systems, such as office automation OA system, customer relationship management CRM system, enterprise resource planning ERP system, etc. It greatly improves the working efficiency of the staff. At the same time, these systems store a wealth of unit production materials and personal confidential information, and behaviors such as abnormal access related to application systems occur from time to time, especially internal personnel of the unit may use their legitimate application access rights to implement illegal Operations, such as leaking production materials, employee or customer info...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F11/34
CPCG06F11/3438G06F21/31
Inventor 林皓唐彪王能李朗胡瑾莹
Owner BEIJING VRV SOFTWARE CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More