Unlock instant, AI-driven research and patent intelligence for your innovation.

Abnormal behavior detection method and device

A detection method and behavior technology, applied in the field of network security, can solve the problems of inability to analyze abnormal behavior and low data analysis efficiency, and achieve the effect of reducing the risk of data leakage, protecting data security, and improving efficiency

Pending Publication Date: 2021-06-29
BEIJING GRIDSUM TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiments of the present invention provide a method and device for detecting abnormal behaviors, which are used to solve the problem in the prior art that the efficiency of data analysis is low and abnormal behaviors cannot be analyzed from massive data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal behavior detection method and device
  • Abnormal behavior detection method and device
  • Abnormal behavior detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0058] The term "and / or" in this article is just an association relationship describing associated objects, which means that there can be three relationships, for example, A and / or B can mean: A exists alone, A and B exist simultaneously, and there exists alone B these three situations.

[0059] The terms "first" and "second" in the specification and claims of the present invention are used to distinguish different objects, rather than to describe a sp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an abnormal behavior detection method and device, relates to the technical field of network security, and is used for solving the problems that in the prior art, the efficiency of data analysis is low, and abnormal behaviors cannot be analyzed from mass data. The method comprises the following steps: acquiring to-be-detected data; detecting the to-be-detected data through a data detection model to determine an abnormal behavior, wherein the data detection model is a machine learning model constructed by taking historical data of a user as sample data and taking an isolated forest algorithm as a model algorithm, and the historical data comprises abnormal data corresponding to the abnormal behavior; and carrying out event reporting on the abnormal behavior. The embodiment of the invention is used for abnormal behavior detection.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an abnormal behavior detection method and device. Background technique [0002] With the rapid development of network technology, sensitive information and personal privacy information are ubiquitous, and ensuring the security of sensitive information and personal privacy information is one of the important tasks of network security. [0003] In traditional network security technology, the security of sensitive information and personal privacy information is generally guaranteed by formulating targeted access control strategies. However, the rapid growth of massive data makes sensitive information and personal privacy information ubiquitous in big data platforms. Accurate discovery and It is becoming more and more difficult to locate sensitive information and formulate targeted access control policies. Therefore, access control policies alone cannot completely prevent se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06N20/00H04L29/06
CPCG06F21/554G06N20/00H04L63/1425
Inventor 许建东
Owner BEIJING GRIDSUM TECH CO LTD