Access control strategy generation method and device based on machine learning
An access control strategy and machine learning technology, applied in neural learning methods, biological neural network models, neural architectures, etc., can solve problems such as labor-intensive, difficult to automatically construct, and rely on, so as to increase statistical strength and solve the problem of sparse authorization data. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0050] Such as figure 1 As shown, this embodiment proposes a method for generating an access control policy based on machine learning, the method comprising:
[0051] S101. Obtain an authorization log and historical authorization records of different access resources in the access log, and construct attribute tuple pairs for the historical authorization records through the authorization log.
[0052] Specifically, in this embodiment, each access record in the authorization log includes user attributes, resource attributes, and operation attributes. In each authorization record, any two or more attributes form an attribute tuple. For example, the authorization record contains attributes: a, b, c; then the attribute tuple is obtained: (a, b), (a, c), (b,c),(a,b,c), thus constructing multiple attribute tuple pairs.
[0053] S102. Train the attribute weight neural network through the attribute tuple pairs.
[0054] Specifically, in this embodiment, the attribute weight neural n...
corresponding Embodiment 1
[0075] Corresponding to Embodiment 1, this embodiment proposes a device for generating an access control policy based on machine learning. The device includes a processor, and the processor is internally configured with a processor-executable operation instruction to perform the following operate:
[0076] Obtain the authorization log and the historical authorization records of different access resources in the access log, construct an attribute tuple pair for the historical authorization record through the authorization log, and the attribute tuple pair includes any two and the above attributes;
[0077] training an attribute weight neural network by said attribute tuple pair;
[0078] Obtaining the vector representation of the attribute according to the attribute weight neural network, and calculating the correlation between the accessed resources through the vector representation of the resource attribute;
[0079] calculating the occurrence frequency of the attribute tup...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


