User abnormal behavior detection method and system

A detection method and detection system technology, which is applied in the field of information security, can solve problems such as reduced accuracy, inability to adjust rules adaptively, and inability to detect malicious behaviors in advance, so as to achieve rapid and accurate identification

Active Publication Date: 2019-06-14
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If expert rules are set based on known risk events, they can be effectively identified in a short period of time, but when the attack method changes, the rules cannot be adaptively adjusted, and the accuracy will decrease, resulting in the inability to perceive unknown malicious behaviors in advance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User abnormal behavior detection method and system
  • User abnormal behavior detection method and system
  • User abnormal behavior detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the present invention will be further described in detail below in conjunction with the embodiments and the accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0040] In addition, the steps shown in the flow diagrams of the figures may be performed in a computer system, such as a set of computer-executable instructions, and, although a logical order is shown in the flow diagrams, in some cases, the sequence may be different. The steps shown or described are performed in the order herein.

[0041] Please refer to Figure 1B As shown, the abnormal user behavior detection method provided by the present invention specifically includes: S1001 Acquiring historical transaction data, according to the historical transaction data, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user abnormal behavior detection method and system, and the method comprises the steps: obtaining historical transaction data, carrying out the training through a Markov modeland a probability suffix tree model according to the historical transaction data, and obtaining a Markov transition probability matrix and a probability suffix tree transition probability matrix; combining the Markov transition probability matrix and the probability suffix tree transition probability matrix through a linear weighted fusion method to obtain a fraud early warning transition probability matrix, and obtaining a fraud transaction early warning model according to the fraud early warning transition probability matrix; identifying the historical transaction data through a preset critical value and the fraud transaction early warning model, and adjusting the preset critical value according to an identification result to obtain a final critical value; and identifying to-be-detectedtransaction data according to the final critical value and the fraud transaction early warning model to obtain a detection result.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and system for detecting abnormal user behavior. Background technique [0002] Abnormal user behavior refers to hackers maliciously detecting Internet applications and services, looking for ways to attack, and directly obtaining benefits. [0003] At present, malicious detection behavior identification for attackers has become a common pain point in the industry, and there is no mature solution. The existing network security protection methods and business risk control methods in the industry are difficult to detect. Discovering this kind of malicious detection behavior mainly faces the following two difficulties: [0004] 1. Since the information submitted during the detection process does not contain unreasonable content, and the transaction frequency has no obvious abnormal characteristics, the network protection rules will not be triggered; the detection process ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/62
Inventor 程佩哲金驰姜城叶红苏建明敦宏程
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products