User entity behavior analysis method based on density peak value adaptive clustering

An adaptive clustering and user entity technology, applied in the field of analysis, can solve the problems of identity theft, infringement of ordinary people's interests, insufficient security performance, etc., to achieve the effect of increasing network security performance

Pending Publication Date: 2022-01-11
WENZHOU POLYTECHNIC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The above methods also increase the value of digital assets accordingly, so they are also coveted by cybercriminal organizations to obtain economic benefits through various viruses and ransomware, and the above methods will greatly infringe on the interests of ordinary people, so network security It is the top priority of the current digital age. The main defense method of the existing network security is to isolate criminal organizations by setting identity permissions, such as account passwords, etc. However, identity permissions will be stolen in actual situations, so The security performance of the existing network security methods is far from enough to meet the needs of the current network environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following examples will be given to further describe the present invention.

[0025] A user entity behavior analysis method based on density peak adaptive clustering in this embodiment includes the following steps:

[0026] Step 1, extracting the access user data of the important data server within a certain period of time, constructing a data graph based on the number of visits and access behavior, so that the access user data forms data points on it;

[0027] Step 2, calculate the local density and mutual distance of the user data points in step 1, calculate the product of the local density and the distance, arrange the products in order from large to small, and determine the inflection point;

[0028] Step 3, use the point before the inflection point as the cluster center point, and divide the remaining data points into each cluster center point to obtain the clustered data point cluster;

[0029] Step 4: Analyze the user behavior types in each data point cluste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user entity behavior analysis method based on density peak value adaptive clustering, which comprises the following steps of: 1, extracting access user data of an important data server within a certain time period, and constructing a data graph according to access times and access behaviors; 2, calculating the local density of the user data points in the step 1 and the distance between the user data points; 3, taking a point before the inflection point as a cluster center point; 4, analyzing user behavior types in each data point cluster; 5, analyzing abnormal behavior information of the user according to the user behavior baseline constructed in the step 4; and step 6, screening a suspicious personnel list according to the information. According to the user entity behavior analysis method based on density peak value adaptive clustering, the user entity behaviors can be effectively analyzed through setting of the steps 1-6, and suspicious users can be found in time.

Description

technical field [0001] The present invention relates to an analysis method, in particular to a user entity behavior analysis method based on density peak adaptive clustering. Background technique [0002] With the rapid development of digital information technology, the phenomenon of using mobile devices to work in non-office places is becoming more and more common, which greatly increases the convenience and convenience of office, which also increases work efficiency and accelerates social development. . [0003] The above methods also increase the value of digital assets accordingly, so they are also coveted by cybercriminal organizations to obtain economic benefits through various viruses and ransomware, and the above methods will greatly infringe on the interests of ordinary people, so network security It is the top priority of the current digital age. The main defense method of the existing network security is to isolate criminal organizations by setting identity permi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40G06V10/762
CPCH04L63/1425H04L63/10H04L63/1408H04L63/101G06F18/23
Inventor 刘世华叶展翔张浩
Owner WENZHOU POLYTECHNIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products