User behavior monitoring method, system and equipment based on bastion host and medium
A bastion machine and behavioral technology, applied in hardware monitoring, neural learning methods, biological neural network models, etc., can solve problems such as inability to effectively discover and process security issues, leakage of private information, and inability to monitor in real time, so as to reduce manpower input, The effect of avoiding safety hazards and losses and avoiding false positives
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0039] Combine below figure 1 A flowchart illustrating the main steps of one embodiment of the method of the present invention is shown.
[0040] In step S110, preset rules for judging whether the user behavior is an abnormal behavior.
[0041] In one embodiment, based on corresponding business operations in actual application scenarios, rules for judging detected user behaviors are preset. For example, it can be based on the combination of the corresponding actual application scenarios and the corresponding business operation behavior, according to the normal behavior of business personnel (users), or misoperation behavior, and the behavior of illegal users (hackers, etc.) invading personnel, etc. Set different rules.
[0042] Further, according to the actual application scenario, the correct / normal business operators are usually in the majority, while the abnormal operators are in the minority, based on the actual application scenario and its corresponding business, determ...
example 3
[0048] Example 3 of an application, taking the working status as an example, setting sensitive operation rules such as:
[0049] Combined with business scenarios, the working status of business personnel is screened. If they are personnel who have applied for resignation, the operation alarm level of the bastion machine will be raised to the highest level, and the trigger conditions of sensitive rules will be reduced. For example: according to the working status, the user behavior of a business person in a specific working status in a specific period of time is regarded as an abnormal behavior. If there is an unsafe instruction library, an alarm will be issued immediately. This is the difference between this embodiment and other bastion machine monitoring methods in combination with business scenarios.
[0050] An application example 4, taking the information association between business operation equipment and business personnel as an example, set sensitive operation rules s...
Embodiment 2
[0072] In order to make the object, technical solution and advantages of the present invention clearer, the implementation of the system of the present invention will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.
[0073] In one embodiment of the present invention, the user behavior monitoring system based on the bastion machine mainly includes a rule module, which is used to preset judgment rules; Analysis to predict whether it is an abnormal behavior; the processing module is used to call the police when the user behavior is abnormal.
[0074] Here, will combine image 3 A block diagram showing the main structure of an embodiment of the system of the present invention will be described. In this embodiment, the system at least includes a rule module 110 , an analysis module 120 and a processing module 130 .
[0075] The rule module 110 is configured to preset rules for judging whether the user ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


