Process list generation method and device
A process and list technology, applied in the field of network security, can solve the problem of low efficiency of manual preset abnormal process detection rules, and achieve high efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0105] Method 1: If there is only one process running on the server, the process ID of the process is used as the process set corresponding to the server.
[0106] For example, only process A is running on server 4, and processes running on server 5 are A, B, and C. For server 1, the corresponding process set is only 1 {A}.
[0107] In this embodiment of the present invention, for any process set, if the process set includes a process identifier, it is determined that the weight corresponding to the process set is a preset weight, for example, the preset weight is 0.
[0108] Optionally, it can also be determined according to the ratio of the number of running processes of the server to the total number of running processes of all servers, then the weight of the process set {A} corresponding to server 1 is 1 / 4, and the weight of the process set {A} corresponding to server 2 is The weight is 3 / 4.
[0109] It should be noted that, generally, there is more than one process runni...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


