User abnormal operation behavior detection method and system and storage medium

A detection method and detection system technology, applied in the field of information security, can solve problems such as no solution proposed, and achieve the effects of improving the detection rate, improving the accuracy, and reducing the false alarm rate

Inactive Publication Date: 2019-06-14
SF TECH
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the information will be sent out through email channels, and whether it contains sensitive information is detected through post-event auditing or through hook-up equipment. If existing security detection equipmen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User abnormal operation behavior detection method and system and storage medium
  • User abnormal operation behavior detection method and system and storage medium
  • User abnormal operation behavior detection method and system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0022] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments of the present invention belong to the protection scope of the present invention.

[0023] figure 1 It is a flow chart of the method for detecting abnormal user operation behavior in the present invention.

[0024] like figure 1 As shown, a method for detecting abnormal user operation behavior according to an embodiment of the present invention includes the following steps:

[0025] S1. Build a free proxy IP database;

[0026] S2. Match the login IP of the account with the free agent IP database, and if the matching is successful, log in as abnormal.

[0027] Free proxy ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user abnormal operation behavior detection method. The method comprises the following steps: S1, constructing a free agent IP database; and S2, matching the login IP of the account with the free agent IP database, and if the matching is successful, taking the login IP as abnormal login. The beneficial effects of the invention are as follows: the paint has good effects; according to the user abnormal operation behavior detection method provided by the invention, aiming at the characteristic that a normal user does not log in by using a free proxy IP, the account numberof which the IP is the free proxy IP is early warned, so that the accuracy of abnormal login detection of the user can be improved, the false alarm rate is reduced, and the detection rate of malicious login accounts is improved. And a deterrent effect on attacking external personnel to maliciously log in the client account and steal sensitive information behaviors is achieved.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method, system and storage medium for detecting abnormal user operation behavior. Background technique [0002] In the prior art, security detection only detects attack content (such as SQL injection, XSS attack, etc.) on the application layer. For many enterprises, the above security detection items still cannot guarantee the security of information. For example, in the express delivery industry, a large amount of user privacy information and internal top-secret business information with the characteristics of the express delivery industry will be generated during the data interaction process. Most of the information will be sent out through email channels, and whether it contains sensitive information is detected through post-event auditing or through hook-up equipment. If existing security detection equipment or systems are used, it is difficult to reaso...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 刘卫明吕栋梁卢樱洁杜洋
Owner SF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products