Network penetration identification method based on interactive behavior analysis
A network penetration and identification method technology, applied in the direction of electrical components, transmission systems, etc., can solve problems such as high complexity, sensitive behavior data, and thresholds that cannot be adaptively adjusted, and achieve the effect of improving training speed and accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] The technical solution of the present invention will be further described below in conjunction with the accompanying drawings, but it is not limited thereto. Any modification or equivalent replacement of the technical solution of the present invention without departing from the spirit and scope of the technical solution of the present invention should be covered by the present invention. within the scope of protection.
[0023] The present invention provides a network penetration identification method based on interactive behavior analysis, such as figure 1 As shown, the specific steps of the method are as follows:
[0024] Step 1. Data preprocessing
[0025] (1) Use Sebek to collect interactive behavior data.
[0026] Sebek is a security tool that can capture the keystroke records of the host. The captured data format is: [time stamp IP address process ID command user ID] text, where,
[0027] The timestamp indicates the time of the keystroke;
[0028] The IP addre...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com