Risk model construction method and device, risk detection method and device and computer equipment

A technology of risk detection and construction method, applied in the field of security, can solve the problems of difficulty in risk confirmation, time cost, misoperation, and inability to judge, and achieve the effect of increasing clustering effect and good clustering effect

Active Publication Date: 2022-07-29
深圳竹云科技股份有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, it is difficult to find the real risk point when carrying out risk detection through the risk prevention and control system at present, because each risk event is relatively independent, such as IP risk, use time r

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk model construction method and device, risk detection method and device and computer equipment
  • Risk model construction method and device, risk detection method and device and computer equipment
  • Risk model construction method and device, risk detection method and device and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] In order to make the objectives, technical solutions and advantages of the present disclosure more clear, the present disclosure will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present disclosure, but not to limit the present disclosure.

[0067] It should be noted that the terms "first", "second" and the like in the description and claims herein and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It is to be understood that data so used may be interchanged under appropriate circumstances such that the embodiments herein described can be practiced in sequences other than those illustrated or described herein. Furthermore, the terms "comprising" and "having", and any variations thereof, are intended to cover non-exclusive inclusion, f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a risk model construction method and device, a risk detection method and device and computer equipment. The risk model construction method comprises the steps that behavior log data and risk log data are obtained, the behavior log data comprise log data generated by behaviors using a system, and the risk log data comprise log data recorded when the system generates risks; integrating and screening the behavior log data and the risk log data to obtain risk behavior data; determining risk feature dimensions according to the triggering conditions of the risks; determining a behavior deviation degree according to the behavior log data and a predetermined behavior clustering model; and constructing a risk detection model according to the risk feature dimension, the behavior deviation degree and the risk behavior data. By adopting the method, the risk confirmation difficulty and time cost can be reduced.

Description

technical field [0001] The present disclosure relates to the field of security technologies, and in particular, to a risk model construction method, a risk detection method, an apparatus, and a computer device. Background technique [0002] With the development of science and technology, people use more and more business systems in work and life. Therefore, it is extremely important to conduct risk detection on the security of business systems. [0003] At present, the risk detection method is usually to perform risk detection on the online log files of the business system through the risk prevention and control system, thereby realizing the interception and control of risky business events. [0004] However, it is difficult to find the real risk point when conducting risk detection through the risk prevention and control system at present, because each risk event is relatively independent, such as IP risk, usage time risk and so on. It is impossible to judge from a single...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/34G06K9/62
CPCG06F11/3447G06F11/3452G06F11/3476G06F18/23
Inventor 蔡文锴史晓婧范阳阳
Owner 深圳竹云科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products