Unlock instant, AI-driven research and patent intelligence for your innovation.

Abnormal access behavior detection method, device and equipment and readable storage medium

A behavioral and abnormal technology, applied in the field of data processing, can solve the problems of ambiguous business scope, inaccurate and efficient, and difficult to define clearly, and achieve the effect of avoiding the leakage of confidential or sensitive documents, reducing the rate of misjudgment, and improving the accuracy rate.

Active Publication Date: 2021-09-03
YANGTZE MEMORY TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are many directories (access paths) and users in the server, it is difficult for the server administrator to accurately and correctly set the user permissions of each directory, and because the user's personal needs and personal behavior are volatile, the scope of their work is vague and difficult. Clearly defined, so it is not accurate and efficient to detect whether the current user's access behavior is abnormal based on some discrete feature points of historical users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal access behavior detection method, device and equipment and readable storage medium
  • Abnormal access behavior detection method, device and equipment and readable storage medium
  • Abnormal access behavior detection method, device and equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] For a better understanding of the application, various aspects of the application will be described in more detail with reference to the accompanying drawings. It should be understood that these detailed descriptions are descriptions of exemplary embodiments of the application only, and are not intended to limit the scope of the application in any way. Throughout the specification, the same reference numerals refer to the same elements. The expression "and / or" includes any and all combinations of one or more of the associated listed items.

[0038] It should be noted that in this specification, expressions such as first, second, third, etc. are only used to separate one feature from another feature area, and do not represent any limitation on the features, especially do not represent any sequential order.

[0039] In the drawings, the thickness, size and shape of components have been slightly adjusted for convenience of illustration. The drawings are examples only and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an abnormal access behavior detection method, device and equipment and a computer readable storage medium. The detection method comprises the following steps: acquiring access data of a user, including an access behavior, an access path and a group where the user is located; determining a membership degree value according to historical access paths of all users in the group; and detecting whether the access behavior of the user is abnormal or not according to the membership degree value of the group where the user is located corresponding to the access path. According to the detection method, the membership degree values of the group to different access paths are determined through the historical access paths formed by all the users in the group where the users are located based on the work business requirements, and then whether the access behaviors of the users are abnormal or not is detected according to the membership degree values, so that the abnormal access behavior detection efficiency can be improved; the misjudgment rate of access behavior auditing is reduced, the accuracy of abnormal access behavior detection and judgment is improved, and leakage of confidential or sensitive files is avoided.

Description

technical field [0001] The present application relates to the technical field of data processing, and more specifically, to an abnormal access behavior detection method, an abnormal access behavior detection device, an abnormal access behavior detection device, and a computer-readable storage medium. Background technique [0002] Network behavior analysis is an important branch in the field of information security. However, since the current research cannot effectively give a clear definition of abnormal rules, in the process of mining abnormal access behaviors, it often occurs when detecting what kind of operation behavior is abnormal access. Too high a false positive rate. Further, the above-mentioned detection with an excessively high false positive rate may also increase the possibility of leaking sensitive or confidential documents. [0003] Conventional abnormal access behavior detection methods are mainly based on the number of operations, file types, and file name k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/30G06F11/34G06N3/04G06N3/08G06N20/00
CPCG06F11/3006G06F11/3438G06N20/00G06N3/08G06N3/045
Inventor 陈予郎
Owner YANGTZE MEMORY TECH CO LTD