Supercharge Your Innovation With Domain-Expert AI Agents!

Intrusion detection system and method combining user behavior portrait and equipment resource monitoring

An intrusion detection system and intrusion detection technology, applied in the direction of platform integrity maintenance, etc., can solve problems that cannot meet the needs of daily life, reduce the probability of errors, and ensure security.

Pending Publication Date: 2022-04-15
中电积至(海南)信息技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the main ways of network intrusion include hacker intrusion, system backdoor intrusion, computer virus intrusion, denial of service attack, internal leak, logic bomb, information loss and password cracking, etc. Traditional network protection is based on firewall technology , the rest of the network technology can no longer meet the needs of daily life

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection system and method combining user behavior portrait and equipment resource monitoring
  • Intrusion detection system and method combining user behavior portrait and equipment resource monitoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0017] figure 1 A schematic structural diagram of the intrusion detection system according to Embodiment 1 of the present disclosure is shown.

[0018] refer to figure 1 , Embodiment 1 of the present disclosure introduces an intrusion detection system that combines user behavior profiling and device resource monitoring, including: a user behavior profiling module 101, used to collect user-related information accessing the system and build a profile of user behavior model and determine whether the user's behavior is normal; the equipment resource utilization detection module 102 is used to collect service resource information invoked by the user, model the utilization of system equipment resources, and determine whether the current system resource utilization is normal; The system security detection module 103 integrates the results of the user behavior portrait module 101 and the device resource utilization detection module 102 to comprehensively judge the security situation ...

Embodiment 2

[0031]Embodiment 2 of the present disclosure introduces an intrusion detection method that combines user behavior portraits and device resource monitoring, including: performing intrusion security detection on user access; The role of the user and the historical behavior portrait of the user; analyze the utilization of system resources accessed by the user; monitor whether the resource utilization of the system in the above operations is normal.

[0032] Therefore, by implementing the intrusion detection method combined with user behavior portraits and device resource monitoring described in Embodiment 2, the purpose of ensuring system security is achieved, and the detection of abnormal user behaviors based on user portraits and the invocation of internal system resources are realized. The technical effect of monitoring and detection and timely alerting the administrator of the system under attack solves the technical problem of malicious abuse of internal system resources when...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an intrusion detection system and method combining a user behavior portrait and equipment resource monitoring, and the system comprises a user behavior portrait module which is used for judging whether the operation of a user accords with the historical behavior characteristics of the user or not; the equipment resource utilization monitoring module is used for judging whether the system resource has an abnormal use condition or not; and the system security detection module is used for judging whether the work in the system is normal or not and whether a system administrator needs to be alarmed or not according to the abnormal activity information given by the user behavior portrait module and / or the equipment resource utilization monitoring module. According to the intrusion detection system combining the user behavior portrait and the equipment resource monitoring, the functions of the intrusion detection system are further improved, the error probability is reduced, and the safety of the system is ensured.

Description

technical field [0001] The invention relates to the field of network security, and relates to an intrusion detection system and method combining user behavior portraits and device resource monitoring. Background technique [0002] The computer structure tends to be simple and easy to carry, technological innovation promotes the rapid development of the network, network security has gradually become a new discipline, and network security has penetrated into all aspects of life. It is a combination of computer science, network technology, communication technology, and information security technology. Large-scale and highly complex development and transformation of the network, through the monitoring, investigation and application of the network, the probability of network intrusion is reduced, and the risk of property information leakage is reduced. At present, the main ways of network intrusion include hacker intrusion, system backdoor intrusion, computer virus intrusion, den...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55
Inventor 郑超陆秋文张智勇孙彦斌田志宏
Owner 中电积至(海南)信息技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More