Anomaly detection method and device based on user peer-to-peer group

An anomaly detection and peer-to-peer group technology, applied in the field of information detection, can solve the problem of low accuracy of anomaly detection

Active Publication Date: 2020-02-18
BEIJING TRUSFORT TECH CO LTD
View PDF10 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practical applications, for example, whether a user belongs to a certain peer group is only a probability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anomaly detection method and device based on user peer-to-peer group
  • Anomaly detection method and device based on user peer-to-peer group
  • Anomaly detection method and device based on user peer-to-peer group

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is a part of embodiments of the present invention, but not all embodiments. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an anomaly detection method and device based on a user peer-to-peer group, and the method comprises the steps: carrying out the clustering of a preset number of times of a userset comprising a target user according to a preset clustering algorithm, obtaining a preset number of clustering clusters to which the target user belongs, wherein each clustering corresponds to one clustering cluster; according to a preset number of clustering clusters to which the target user belongs, obtaining a peer-to-peer group probability of the target user and any user in the preset numberof clustering clusters, and constructing a probability clustering cluster based on the peer-to-peer group probability; selecting a preset threshold number of behavior characteristics from a preset behavior characteristic pool, and for each selected behavior characteristic, based on the probability clustering cluster and the selected behavior characteristic, constructing an isolated forest tree containing the target user; and detecting whether the target user is an abnormal user or not according to the obtained isolated forest tree and a preset anomaly detection algorithm. The anomaly detection precision can be effectively improved.

Description

technical field [0001] The present invention relates to the technical field of information detection, in particular to a user peer-to-peer group-based anomaly detection method and device. Background technique [0002] The rapid development of computer communication technology brings great convenience to users' work and life, but at the same time, the losses caused to users due to network security or network anomalies are also increasing. Among them, users' illegal network behavior is an important factor affecting network security or network anomalies. Therefore, monitoring user network behaviors, discovering user abnormal network behaviors and dealing with them in a timely manner is particularly important for ensuring the normal operation of the network. [0003] At present, for network security inside enterprises, it is generally based on statistical and analytical methods, by constructing a user network behavior model, and inputting the monitored user network behavior beha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/62
CPCG06F18/2323G06F18/2321G06F18/23213
Inventor 张尚志丁龙朱纲兴孙悦郭晓鹏
Owner BEIJING TRUSFORT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products