Abnormal behavior recognition system

A technology for identifying systems and behaviors, applied in the field of information security, can solve problems such as non-fixed rules, rigid fixed rules, and high false alarm rate

Active Publication Date: 2020-08-07
ZHEJIANG QIZHI TECH CO LTD
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

3. WWW deception, the webpage being visited has been tampered with by hackers, and the information on the webpage is false! For example, the hacker rewrites the URL of the webpage that the user wants to browse to point to the hacker's own server. When the user browses the target webpage, it actually sends a request to the hacker's server.
4. Node attack, after the attacker breaks through a device, he often uses this device as a base to attack other devices
The problems of this abnormal event alarm mechanism are: 1. The fixed rules are rigid and unable to keep pace with the times
However, it is possible that the account needs to enter the data center for a temporary work task, and has been approved by the workflow engine to form an allowed operation, but the allowed operation is not a fixed rule, therefore, a legally allowed operation When the account logs in to the data center during the valid period specified by the non-fixed rules, the account dimension will send out an account abnormal event alarm
2. Alarms are only issued from a single dimension, and abnormal events in a single dimension cannot constitute abnormal behavior or attack behavior
The problems caused by these reasons mainly include: 1. High false positive rate. 2. Single-dimension abnormal event alarm. There is no information in other dimensions other than the information in this dimension. Therefore, it is impossible to judge whether the abnormal event is caused by an attack behavior. Abnormal event alarm low reference value
The high rate of false alarms and the low reference value of alarms lead to operation and maintenance personnel habitually ignoring abnormal event alarms, resulting in the alarm being useless

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal behavior recognition system
  • Abnormal behavior recognition system
  • Abnormal behavior recognition system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] abnormal behavior

[0045] The abnormal behavior mentioned in the present invention refers to the operation behavior that does not match the content of the white list, including but not limited to abnormal behavior caused by hacker attacks, abnormal behavior caused by misoperation of internal operation and maintenance personnel, etc.

[0046] gateway

[0047] Everyone knows that to walk from one room to another, one must pass through a door. Similarly, sending information from one network to another must pass through a "gateway", which is a gateway. As the name suggests, a gateway is a "gateway" that connects a network to another network, that is, a network gate. The gateway mentioned in the present invention refers to the door to enter the data center.

[0048] workflow engine

[0049] The so-called workflow engine refers to workflow as a part of the application system, and it provides core solutions such as determining information transmission routing and co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides an abnormal behavior recognition system. The system comprises a data collection layer and a behavior analysis engine, and the data collection layer collects all authorized behavior data, and collects all server-side accounts of a data center, asset data and changes of the asset data; a white list is established according to the authorized behavior data; the change ofthe asset data is taken as an abnormal event, the data of the data acquisition layer is summarized to a behavior analysis engine, each abnormal event is compared with a white list by the behavior analysis engine, it is judged whether the content of the abnormal event belongs to the white list or not, and the abnormal event is made as an abnormal behavior if the content of the abnormal event doesnot belong to the white list; and the behavior analysis engine only gives an alarm for abnormal behaviors. The system has the advantages that the collection layer, the analysis layer and the application layer are transversely extensible, the application modules of the application layer longitudinally integrate the collection layer and the analysis layer, and various safety applications can be continuously and quickly developed according to user requirements.

Description

technical field [0001] The invention relates to the field of information security, in particular to an abnormal behavior identification system. Background technique [0002] This section is only for the convenience of understanding the content of the present invention, and should not be regarded as prior art. [0003] According to the different users of the network, the network can be divided into extranet (Internet) and intranet (local area network). The intranet can be divided into office network and production network. The network behavior of office Internet access is relatively open, and virus and network intrusion incidents are prone to occur. If office users and production users are on the same network, viruses and intrusion events on the office network will almost quickly spread to the production network, posing a great threat to production security. Therefore, the office network and production network are also required to be isolated. The production network is al...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/10H04L63/101H04L63/108H04L63/1416H04L63/1425H04L63/1441
Inventor 吴强
Owner ZHEJIANG QIZHI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products