Method and system for determining user behavior track

A user-behavior technology, applied in the transmission system, digital transmission system, electrical components, etc., can solve the problem of not being able to obtain the attack source path

Active Publication Date: 2020-03-27
云南电网有限责任公司信息中心
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a method for determining user behavior trajectory, which solves the technical problem that the system in the prior art cannot obtain the attack source path

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for determining user behavior track
  • Method and system for determining user behavior track
  • Method and system for determining user behavior track

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045]The embodiments will be described in detail hereinafter, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following examples do not represent all implementations consistent with this application. These are merely examples of systems and methods consistent with aspects of the present application as recited in the claims.

[0046] see figure 1 A method for determining user behavior trajectory, the method includes:

[0047] S101: Obtain the associated data source and the isolated data source in the monitored system, wherein, the isolated data source means that the modules storing data are like isolated islands and cannot connect and interact with other data; the relational data means that in the relational database, it is Create a database based on ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for determining a user behavior track, belongs to the technical field of system monitoring, and solves the technical problem that a system in the prior art cannot acquire an attack source path. The method comprises: obtaining an associated data source and an island data source in a monitored system and marking the data after paradigm processing, wherein the associated data source comprises basic information of a user and system service information; obtaining marked data and performing cluster storage; enabling the monitoring system to acquire input basic information of a user or a monitored system; and judging whether the basic information is associated and matched with the data stored in the cluster or not, if so, obtaining the associated data of the basicinformation of the user and / or the system service information, and if not, clearing the input basic information of the user and / or the monitored system. The method is used for perfecting the use function of the system and meeting the requirement that people can search the attack source path.

Description

technical field [0001] The invention belongs to the technical field of system monitoring, in particular to a method and a system for determining user behavior tracks. Background technique [0002] At present, with the diversification and diversification of the network field, people's work and lifestyle are more convenient, but the forms of network threats have also become diverse and complicated, and a new generation of threats has been bred. The new generation of threats not only The propagation speed is faster, and the attack surface used by it is becoming wider and wider. Only rely on the traditional network intrusion detection system, that is, NIDS equipment, and manual analysis and protection, and the assets are not maintained in time, and the address of the terminal is dynamic. distribution, and the data is scattered in various devices, making it difficult to trace security incidents, and more personnel are needed to investigate, which is time-consuming and laborious, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26
CPCH04L63/1416H04L63/1425H04L43/10H04L63/0815H04L63/10H04L2463/146
Inventor 胡健苏永东黄文载刘玉婷杨本富肖鹏王海林张玉雪董文君
Owner 云南电网有限责任公司信息中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products