Substation terminal account anomaly detection method based on machine learning
An anomaly detection and machine learning technology, applied in machine learning, instruments, electrical components, etc., can solve the problems of non-generalization, inaccurate and untimely account anomaly detection, etc., and achieve the effect of preventing violations
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0042] Such as figure 1 As shown, this embodiment proposes a machine learning-based abnormal detection method for substation terminal accounts, including:
[0043] S1: Collect the access log generated by the login account accessing the substation terminal, input the access log into the trained behavior analysis engine, and screen out the login account with abnormal behavior in the access log;
[0044] S2: Obtain the mapping relationship between the login account and the login IP, and identify the abnormal type of the login account based on the mapping relationship;
[0045] S3: Output the identification results of login accounts with abnormal behaviors and abnormal types as an abnormality detection report.
[0046]This embodiment builds a behavior analysis engine based on user and entity behavior analysis technology (User and Entity Behavior Analytics, UEBA) to realize comprehensive monitoring of terminal access in substations, and can detect login accounts that deviate from ...
Embodiment 2
[0065] The difference between Embodiment 2 and Embodiment 1 is that when S2 is executed to classify and analyze abnormal types, a machine learning model is used to implement, specifically including:
[0066] Respectively obtain the second historical access log generated by the substation terminal when logging in to multiple IPs with the same account and logging in to multiple accounts with the same IP;
[0067] Obtain the historical mapping relationship between the historical login account number and the historical login IP in the second historical access log as a training sample, and train the machine learning model according to the training;
[0068] Input the mapping relationship between login account and login IP into the trained machine learning model to judge the abnormal type of the mapping relationship.
[0069] In this embodiment, the machine learning model is a support vector machine (Support Vector Machine, SVM), and the SVM model is a generalized linear classifier ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
