User security behavior baseline analysis method based on fusion machine learning algorithm

A machine learning and user technology, applied in the field of network security, can solve the problem of not being able to accumulate a large number of training samples

Pending Publication Date: 2020-06-09
中孚安全技术有限公司 +3
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a user security behavior baseline analysis method based on a fusion machine learning algorithm, which is used to solve the problem that the traditional baseline abnormal analysis method of user behavior cannot accumulate a large number of training samples and carry out intelligent training of large data sets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User security behavior baseline analysis method based on fusion machine learning algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to enable those skilled in the art to better understand the technical solutions in the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described The embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0030] Such as figure 1 As shown, a user security behavior baseline analysis method based on fusion machine learning algorithm, the method includes:

[0031] A1. Establish a behavioral feature matrix for the user or device to be monitored;

[0032] A2. Establish a two-dimensional feature matrix based on the time dimension;

[0033] A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user security behavior baseline analysis method based on a fusion machine learning algorithm. The method comprises the following steps: establishing a behavior feature matrixfor a user or equipment to be monitored; establishing a two-dimensional feature matrix based on time dimension; positioning users or equipment with abnormal behavior baselines; extracting feature vectors of time dimensions from users or equipment with abnormal behaviors; and positioning the time when the baseline abnormality occurs. According to the invention, based on the fusion machine learningalgorithm, abnormal matching is carried out on the security of user behaviors from two aspects of behavior features and behavior occurrence frequency, so that whether the behaviors of the user threaten the network security or have the possibility of penetration attack is judged.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a baseline analysis method for user security behavior based on a fusion machine learning algorithm. Background technique [0002] With the development of cyberspace security and big data technology, the security analysis platform for user behavior analysis has entered a stage of rapid development. How to find abnormal behavior in a large amount of data has become the focus of research by various manufacturers and platforms. User behavior baseline anomaly analysis is an important part of user behavior analysis in many scenarios. [0003] User security behavior analysis is fundamentally different from ordinary user behavior analysis on e-commerce platforms. The baseline anomaly analysis of user behavior mostly uses artificial intelligence analysis methods, such as Bayesian, linear regression, etc. These algorithms require a large number of training samples, and these alg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/62
CPCG06F18/23213G06F18/2415G06F18/251
Inventor 李兴国郑传义曲志峰苗功勋魏东晓
Owner 中孚安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products