Abnormal detection method for user access activity in attached net storage device

A network-attached storage and user technology, applied in the field of abnormal identification, can solve the problems of deployment without security weaknesses, unable to prevent system abnormal events, and limit the widespread promotion and application of NAS technology, so as to reduce query matching time, simple implementation, and The effect of small storage space

Inactive Publication Date: 2005-03-02
TSINGHUA UNIV
View PDF0 Cites 63 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although most NAS devices have protection barriers such as user identity authentication and file permission settings, and peripheral protection technologies such as firewalls in the network, NAS technology itself has security weaknesses in operating systems, data access, network connections, and management access. These traditional information protection te

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal detection method for user access activity in attached net storage device
  • Abnormal detection method for user access activity in attached net storage device
  • Abnormal detection method for user access activity in attached net storage device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The present invention will be further described below in conjunction with the accompanying drawings.

[0014] The purpose of the user's access to the NAS is to obtain files or manage the device. When legitimate users perform authorized operations, the process will generate corresponding system call sequences; similarly, when illegal users maliciously invade the system, and legitimate users perform unauthorized operations, the process of these abnormal behaviors will also generate corresponding System call sequence. The system call sequence generated by abnormal behavior and normal behavior is always different in the function name of the system call, the calling sequence, and the number of requests.

[0015] The abnormal detection method of user access behavior in network-attached storage devices provided by the present invention extracts and matches the characteristic values ​​of the system call sequence generated by user access behaviors in network-attached storage de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for testing abnormal access behaviors in attached network storage devices is to extract and match with the character value by a system dispatch series generated by user access behaviors to identify the abnormal behavior by normal behavior characters and generate response to prevent users in the network from abnormal access operation to the attached network storage device which not only can prevent the non-authorized users from illegal access, but also can prevent the authorized users from power-exceeds access.

Description

technical field [0001] The invention belongs to the technical field of network storage, and in particular relates to an abnormal identification technology of user access behavior in network-attached storage devices. Background technique [0002] The explosive growth of digital information has promoted the research and application of data storage and processing technology based on optical and magnetic media. With the rapid development and popularization of computer networks, the data storage mode is increasingly showing a trend of decentralization. . Network Attached Storage (NAS) technology enables storage devices to be directly connected to the network through a dedicated operating system, and act as a dedicated server in the network, becoming a storage node in the network information system. The biggest difference between this dedicated NAS server and traditional network servers is that it optimizes the system hardware and software architecture, removes many inapplicable ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F15/18H04L12/24
Inventor 董永贵孙照焱贾惠波
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products