Detection method, system and device for detecting abnormal behaviors of user and storage medium

A detection method and detection system technology, applied in the computer field, can solve the problems of bad social influence, leakage of sensitive information, false positives and false negatives, etc., so as to reduce the cost of manual detection, improve the detection efficiency, and achieve accurate and effective detection and identification. Effect

Pending Publication Date: 2021-03-09
CHINA CONSTRUCTION BANK
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing network security protection measures mainly focus on external attacks, but pay less attention to abnormal behaviors of internal users
Especially for the banking industry, internal employees have the opportunity to access core information such as customers and funds. Once internal employees operate maliciously or negligently and cause sensitive information leakage, data loss, etc., it will cause huge economic losses to customers and enterprises. loss and adverse social impact
[0003] At present, th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method, system and device for detecting abnormal behaviors of user and storage medium
  • Detection method, system and device for detecting abnormal behaviors of user and storage medium
  • Detection method, system and device for detecting abnormal behaviors of user and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043]The various aspects of the present invention will be described in detail below with reference to the accompanying drawings and specific embodiments. Among them, well-known modules, units, and their connectors, links, communication, or operations are not shown or not described in detail. Also, the features, architectures, or functions described may be combined in any manner in one or more embodiments. Those skilled in the art will appreciate that various embodiments described below are intended to illustrate, rather than limiting the scope of the invention. It is also possible to understand that modules or units or processing methods in the respective embodiments shown in this article and the drawings may be combined and designed in a variety of different configurations.

[0044] One embodiment of the present invention provides a method of detecting user abnormal behavior, such as figure 1 As shown in the embodiment of the invention, the method includes:

[0045] 100: Conver...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a detection method, system and device for detecting abnormal behaviors of a user and a storage medium, and the method comprises the steps: converting a user behavior log into adiscrete symbol sequence; abstracting the user behavior log into a user behavior sub-graph according to the symbol sequence; and performing sub-graph mining on the user behavior sub-graph to obtain anabnormal behavior coefficient, and judging whether the user behavior log is abnormal or not according to the abnormal behavior coefficient. According to the detection method provided by the invention, consistency description is carried out on a large number of heterogeneous user behavior logs existing in an enterprise, fusion of heterogeneous information is achieved, and then a graph mining algorithm is utilized to detect abnormal behaviors of internal users. The complementarity among the user behavior logs can be effectively found and utilized, so that the behavior of the user is reflected from different sides, and the anomaly detection and identification are more accurate and effective. Meanwhile, the automatic detection method reduces the manual detection cost, and greatly improves thedetection efficiency.

Description

Technical field [0001] The present invention relates to the field of computer technology, and more specifically, relates to a method, system, device, and storage medium detecting user abnormal behavior. Background technique [0002] As the infrastructure of social operation, the Internet has now touched all corners of the world, making it an indispensable part of social exchange, learning, enterprise development, national security. With the rapid development of network technology, the network size is increasing, and network security issues are increasing. Existing network security measures are mainly concerned about external attacks, and the abnormal behavior of internal users within the enterprise is relatively small. Especially for the banking industry, internal employees have the opportunity to contact customers, funds, etc., once internal employees lead to sensitive information leakage, data loss, etc., will cause huge economies to customers, enterprises. Loss and harsh socia...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/2458G06F16/18G06F16/901G06F17/18G06K9/62G06F16/174
CPCG06F16/2465G06F17/18G06F16/9024G06F16/1815G06F16/1744G06F18/25
Inventor 程方远杨晓勤
Owner CHINA CONSTRUCTION BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products