User behavior risk assessment method and device

A technology of risk assessment and risk assessment model, which is applied in the field of user behavior risk assessment methods and devices, and can solve problems such as the inability to assess the degree of user risk

Active Publication Date: 2019-08-30
NEW H3C SECURITY TECH CO LTD
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the above user behavior detection, it can only detect whether the user's behavior is risky, but cannot evaluate the risk level of the user's behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User behavior risk assessment method and device
  • User behavior risk assessment method and device
  • User behavior risk assessment method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0027] At present, in user behavior detection, only user behavior and pre-configured risky behavior rules can be used to determine whether user behavior is risky, and the degree of risk of user behavior cannot be assessed, which is not conducive to the user's handling of user behavior.

[0028] In order to realize the assessment of the user behavior risk degree, the embodiment of the present application provides a user behavior risk assessment method. The user behavior risk assessme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a user behavior risk assessment method and device. The scheme comprises the following steps: acquiring behavior data of a to-be-evaluated user; extracting a target behavior sequence vector corresponding to the preset behavior event from the behavior data; inputting the target behavior sequence vector into a risk assessment model obtained by pre-training toobtain a behavior risk assessment value of a to-be-assessed user, wherein the risk assessment model is a model obtained by training a recurrent neural network and a logistic regression algorithm according to a preset training set, and the preset training set comprises behavior sequence vectors of a plurality of sample users and real behavior risk assessment values of the sample users. By applyingthe technical scheme provided by the embodiment of the invention, the evaluation of the user behavior risk degree can be realized.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a user behavior risk assessment method and device. Background technique [0002] With the rapid development of information technology, network information security, especially intranet information security has attracted more and more attention. [0003] At present, in order to improve network security, it is common to use user behavior to match pre-configured risky behavior rules. If the two match, it is determined that the user's behavior is risky. For example, the pre-configured risky behavior rule is 5 times of wrong passwords entered within 1 minute. If a user enters the wrong password for 5 times within 1 minute, it is determined that the user's behavior is risky. [0004] In the above user behavior detection, it is only possible to detect whether the user's behavior is risky, but it is impossible to evaluate the risk degree of the user's behavior. Co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/20
Inventor 孙尚勇
Owner NEW H3C SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products