Anti-cheating method and system based on user operation behavior and storage medium

An anti-cheating and behavioral technology, applied to teaching aids, transmission systems, educational appliances, etc. operated by electricity, to reduce cheating, prevent cheating, and improve accuracy

Pending Publication Date: 2021-06-11
中国移动通信集团广西有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The purpose of the present invention is to overcome the defects of cheating in the existing capture the flag competition, and provide a method and system for preventing cheating based on user operation behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-cheating method and system based on user operation behavior and storage medium
  • Anti-cheating method and system based on user operation behavior and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to make the purpose, technical solution, design method and advantages of the present invention clearer, the present invention will be further described in detail through specific embodiments in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0059] Such as Figure 1-2 As shown, the present invention provides a kind of anti-cheating method based on user operation behavior, and described user operation behavior comprises the following steps:

[0060] S1: Sign up to form a team;

[0061] S2: Formal participation;

[0062] S3: log in and register;

[0063] S4: open the topic;

[0064] S5: access topic;

[0065] S6: obtain Flag;

[0066] S7: Submit Flag;

[0067] S8: submit WriteUp;

[0068] The anti-cheating method comprises the following steps:

[0069] Step 1: Monitor the characteristics of steps S1-S8 of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of computer security competitions, and particularly discloses a user operation behavior-based anti-cheating method and system and a storage medium, and the method comprises the following steps: 1, carrying out the feature monitoring of the steps S1 to S8 of each team; 2, storing the monitoring result in a behavior operation record database; 3, performing data analysis on the behavior operation record database; and 4, throwing the suspicious data to analysts for judgment and punishment. The system comprises a feature monitoring module, an abnormal fingerprint analysis module, a Flag analysis module, an access behavior analysis module and a WriteUp analysis module. According to the method, behavior analysis is carried out from the title level to the behavior operation level, the analysis effect is greatly improved through the analysis comprehensiveness, accuracy, multi-condition and multi-factor combination mode, and the cheating phenomenon in the flag snatching competition is effectively reduced.

Description

technical field [0001] The application belongs to the technical field of computer security competitions, and in particular relates to an anti-cheating method, system and storage medium based on user operation behavior. Background technique [0002] The current practical capture-the-flag competition (use the computer technology you have to break through a certain limit or obtain a set string after obtaining a certain authority: flag) has gradually become a method and means of evaluating and judging security capabilities. Due to the particularity of the network security industry (operators are required to have both the ability to build security and defense capabilities, and the ability to "find faults" and discover bugs and loopholes), practicality (requires real use of computing technology for correlation operation, rather than just being familiar with some theoretical knowledge system), systemic (it requires the operator’s skills to be systematic, not only to be able to deve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/34H04L29/06G09B7/00
CPCG06F11/3438G09B7/00H04L63/0876H04L63/1425
Inventor 谭彬莫晓斌刘静邓旭张玉兰兰世战邓远芬梁业裕何伟贤宁建创
Owner 中国移动通信集团广西有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products