Unix system user malicious operation detection method based on deep learning
A malicious operation and system user technology, applied in the field of network security, can solve the problems of malicious users bypassing, one-sided detection of malicious operations, and failure to pay attention to user malicious operations, so as to improve training accuracy, performance, and high accuracy rate effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] The present invention will be further described in detail below in conjunction with the embodiments and the accompanying drawings, but the embodiments of the present invention are not limited thereto.
[0033] The invention discloses a method for detecting malicious operations of Unix system users based on deep learning. The method mainly involves three technologies of data set file preprocessing, feature extraction, and detection of malicious operation behaviors; using the bag-of-words model and TF-IDF (word frequency- Inverse text frequency) model combination method to extract the text features of preprocessed data files and tag files, input the extracted features into the multi-layer perceptron algorithm network for training, and obtain behaviors that can identify malicious operations of the Unix operating system, It can identify whether the user's operation is a normal operation or a malicious operation, and finally output an early warning signal according to the det...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


