Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Abnormal User Identification Method Based on Email Data Analysis

A technology for user identification and data analysis, applied in the field of anomaly identification, which can solve problems such as inability to detect anomalies

Active Publication Date: 2022-01-07
NAT UNIV OF DEFENSE TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, there may be different types of abnormal user behaviors in reality, and a single anomaly detection method in the prior art cannot detect different types of anomalies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Abnormal User Identification Method Based on Email Data Analysis
  • An Abnormal User Identification Method Based on Email Data Analysis
  • An Abnormal User Identification Method Based on Email Data Analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The present invention will be further described below in conjunction with the accompanying drawings, but the present invention is not limited in any way. Any transformation or replacement based on the teaching of the present invention belongs to the protection scope of the present invention.

[0051] In this embodiment, a non-supervised real-time integrated detection method for abnormal user behavior is proposed by establishing a bridge between the modeling of the mailbox user behavior and the real-time abnormal detection of the mailbox user behavior. This method starts from the mailbox role and builds a dynamic evolution model of nodes based on the hidden variable method. The evolution of user behavior is transformed into multi-dimensional time, therefore, the problem of detecting abnormal user behavior is transformed into the problem of multi-dimensional timing anomaly detection.

[0052] Such as figure 1 As shown, a method for identifying abnormal users based on ema...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an abnormal user identification method based on mail data analysis, which can obtain the mail address, mail sending and receiving address and sending and receiving time in the mail communication network; establish the mail communication network model, the node represents the mailbox, and the connection represents the communication relationship; and the node characteristics Extraction; modeling of node behavior; abnormal detection of node behavior to identify abnormal users. The method of the present invention extracts the local structural features of the nodes in the time series network and the topological structure features of the ego network centered on it as the comprehensive features of the nodes; then builds a node evolution model based on hidden variables, and integrates three different The anomaly detection method of the present invention performs real-time discovery of anomalies in multi-dimensional time series, making the method of the present invention more robust and open to integration.

Description

technical field [0001] The invention belongs to the field of abnormal identification in data processing, and in particular relates to an abnormal user identification method based on email data analysis. Background technique [0002] With the rapid development of social networks, the scale of many online social networks such as Facebook, Twitter, and QQ continues to expand. In some internal networks, e-mail is still a very important way of exchanging information and documents. Real-time monitoring of these e-mail networks, whether many abnormal events or abnormal users can be found, will help regulators to grasp more and more in-depth Case. In the communication between emails, in many cases, even the supervisor does not necessarily know the specific communication content, because these contents may often be encrypted or involve privacy, and the supervisor can only obtain the data of the communication behavior, that is, who and whom happened when Information about communicat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L51/42G06K9/62
CPCH04L63/1416H04L63/1425H04L51/42G06F18/24
Inventor 成清刘忠黄金才程光权冯旸赫
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products