Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Threat behavior analysis method based on big data analysis and server

A behavior analysis and big data technology, applied in the field of big data, can solve the problems of increasing server processing pressure, cumbersome recognition technology, and reducing recognition efficiency

Active Publication Date: 2022-05-13
深圳市众成信息技术有限公司
View PDF18 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the process of big data analysis, in order to ensure the accuracy and reliability of business analysis, it is usually necessary to conduct in-depth identification of abnormal business behavior or threat behavior. On the one hand, it will reduce the recognition efficiency, on the other hand, it will increase the processing pressure of the server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat behavior analysis method based on big data analysis and server
  • Threat behavior analysis method based on big data analysis and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Hereinafter, the terms "first", "second" and "third" etc. are used for descriptive purposes only, and cannot be understood as indicating or implying relative importance or implicitly specifying the quantity of indicated technical features. Thus, a feature defined as "first", "second" or "third" etc. may expressly or implicitly include one or more of such features.

[0033] figure 1 It shows a schematic flowchart of a threat behavior analysis method based on big data analysis provided by an embodiment of the present invention. A threat behavior analysis method based on big data analysis can be implemented by a big data analysis server, and the big data analysis server can include A memory and a processor; the memory is coupled to the processor; the memory is used to store computer program codes, and the computer program codes include computer instructions; wherein, when the processor executes the computer instructions, the The big data analysis server executes the techn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a threat behavior analysis method based on big data analysis and a server, and the method comprises the steps: determining updated second to-be-analyzed session behavior data through first to-be-analyzed session behavior data and second to-be-analyzed session behavior data; the accuracy and reliability of the first threat behavior recognition result determined through the first to-be-analyzed session behavior data and the updated second to-be-analyzed session behavior data are better than those of the threat behavior recognition result determined through the first to-be-analyzed session behavior data and the second to-be-analyzed session behavior data; in this way, threat behavior recognition processing can be accurately and credibly realized as much as possible through limited to-be-analyzed session behavior data, so that the recognition efficiency of threat behaviors is improved, and the operation pressure of a big data analysis server is reduced.

Description

technical field [0001] The present invention relates to the technical field of big data, in particular to a threat behavior analysis method and server based on big data analysis. Background technique [0002] At present, data warehouse, data security, data analysis, data mining, etc. have gradually become the focus of people around the commercial value of big data. With the advent of the era of big data, big data analysis also came into being. However, in the process of big data analysis, in order to ensure the accuracy and reliability of business analysis, it is usually necessary to conduct in-depth identification of abnormal business behavior or threat behavior. On the one hand, it will reduce the recognition efficiency, on the other hand, it will increase the processing pressure of the server. Contents of the invention [0003] The present invention provides a threat behavior analysis method and server based on big data analysis. In order to achieve the above technica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/34G06F16/2458
CPCG06F11/3438G06F16/2465Y02D10/00
Inventor 吴丽霞何富春
Owner 深圳市众成信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products