Behavior risk detection method, clustering model construction method and device

A risk detection and clustering technology, applied in the security field, can solve problems such as deviation, failure to use historical data, and inability to feed back risk conditions, etc.

Active Publication Date: 2022-07-12
深圳竹云科技股份有限公司
View PDF17 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when the current risk model detects risks in user login behavior, it completely relies on pre-set risk detection standards for detection, and does not use previous historical data
In the actual application scenario, the actual situation may deviate from the predicted result, and the real risk situation in the actual application scenario cannot be fed back

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Behavior risk detection method, clustering model construction method and device
  • Behavior risk detection method, clustering model construction method and device
  • Behavior risk detection method, clustering model construction method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the objectives, technical solutions and advantages of the present disclosure more clear, the present disclosure will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present disclosure, but not to limit the present disclosure.

[0064] It should be noted that the terms "first", "second" and the like in the description and claims herein and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It is to be understood that data so used may be interchanged under appropriate circumstances such that the embodiments herein described can be practiced in sequences other than those illustrated or described herein. Furthermore, the terms "comprising" and "having", and any variations thereof, are intended to cover non-exclusive inclusion, f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a behavior risk detection method and device and a clustering model construction method and device. The method comprises the steps that behavior log data are input into a pre-established clustering model, prediction points and clustering results corresponding to the prediction points are obtained, and the behavior log data comprise log data generated by behaviors of a using system; calculating a deviation degree according to the prediction point, the total number of the clustering points in the clustering result and the clustering centroid in the clustering result; and determining a risk level corresponding to the behavior according to the deviation degree and a preset evaluation probability. By adopting the method, the deviation degree can be calculated by using the clustering model without depending on expert experience, and the finally determined risk level can feed back a real risk condition in an actual application scene.

Description

technical field [0001] The present disclosure relates to the field of security technologies, and in particular, to a behavior risk detection method, a cluster model construction method, and an apparatus. Background technique [0002] In order to ensure the security of the user account during the login process, the corresponding login risk control logic will be preset to perform risk detection during login. [0003] The current risk detection methods are usually experts through their experience to create corresponding risk models one by one for each dimension of the login operation, such as login time, login location, etc., and set corresponding risk detection standards. [0004] However, when the current risk model performs risk detection in the user's login behavior, it completely relies on the preset risk detection standards for detection, and does not use the previous historical data. In the actual application scenario, the actual situation may deviate from the predicted...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06V10/762G06K9/62
CPCG06F21/316G06F18/23
Inventor 蔡文锴谢坚高原
Owner 深圳竹云科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products