Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

31 results about "Threatening behaviour" patented technology

Threatening behavior is intentional behavior which would cause a person of ordinary sensibilities fear of injury or harm. It can include acts of aggression such as yelling at a colleague, pounding on desks, slamming doors,blocking or cornering, and sending threatening voice-mails, e-mails, or other written threats.

Alarm log processing method and device, equipment and storage medium

The invention belongs to the technical field of computers, and discloses an alarm log processing method and device, equipment and a storage medium. The method comprises: determining threat behavior information and the alarm identification information according to the alarm log of the target device; obtaining an alarm accumulated score and an event generation threshold corresponding to the alarm identification information, and determining an alarm type and a threat level corresponding to the alarm log according to the threat behavior information; adjusting the alarm accumulated score according to the alarm type and the threat level to obtain a current alarm score; and if the current alarm score is greater than or equal to an event generation threshold, generating an alarm event according to the alarm type and the alarm identification information, and displaying the alarm event. The alarm accumulated score is accumulated according to the alarm log, and the alarm event is generated and displayed when the alarm accumulated score is greater than or equal to the event generation threshold value, so that a manager does not need to pay attention to a complex log, and can quickly respond to a network security event according to the alarm event.
Owner:CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD +1

Testing machine family confidence method, device and equipment and storage medium

The invention belongs to the technical field of network security, and discloses a method, a device and equipment for testing family confidence of a machine, and a storage medium. The method comprises the steps of obtaining sample information of a suspected test machine sample; matching the sample information with each matching rule in a family matching rule set corresponding to the target advanced threat behavior body family to obtain a rule matching result; and determining family confidence scores of the suspected test machine sample and the target advanced threat behavior body family according to a rule matching result. As the family matching rule set is preset, real-time setting is not needed, the matching efficiency is high, the family confidence score can be quickly determined, and then the possibility that the suspected test machine sample belongs to the target advanced threat behavior body family can be judged through the family confidence score; whether the suspected test machine sample is the advanced threat behavior body or not can be judged according to the possibility that the suspected test machine sample belongs to the target advanced threat behavior body family, so that whether the suspected test machine sample is the advanced threat behavior body or not can be quickly identified.
Owner:三六零数字安全科技集团有限公司

Data noise reduction method and device based on sample dimension, equipment and storage medium

The invention belongs to the technical field of network security, and discloses a data noise reduction method and device based on sample dimensions, equipment and a storage medium. According to the method, sample features corresponding to all suspected test machine samples in a suspected test machine sample set are obtained, the sample features are matched with a sample organization rule, a corresponding sample family is obtained, and then the incidence relation between the sample family and an advanced threat behavior body is obtained; and performing noise reduction processing on the suspected test machine sample set according to the association relationship. According to the method, the sample features of the suspected test machine samples are matched with the sample organization rules to obtain the corresponding sample family, so that the suspected test machine sample set can be quickly de-noised according to the incidence relation between the sample family and the advanced threat behavior body; and the samples with relatively low possibility that the suspected test machine samples are test machine samples are cleared, so that the loss of computing resources is reduced, the sample analysis speed is increased, and the sample analysis difficulty is reduced.
Owner:三六零数字安全科技集团有限公司

Mining method for discovering dependency relationship between threat behaviors, terminal and storage medium

ActiveCN112261006APrevent Threat AttacksImprove incident response capabilitiesTransmissionAlgorithmBusiness enterprise
The invention provides a mining method for discovering a dependency relationship between threat behaviors, a terminal and a storage medium, and the method comprises the steps: collecting log files ofall users a in a system, cleaning and arranging data in the log files, forming an employee behavior set S = {behai}, and carrying out the statistics of the time span wt in the set S; counting a behavior occurrence probability P (behai) and a behavior co-occurrence probability P (behai, behaj) based on S and wt; calculating dependency relationship values depai, aj based on the two probabilities, wherein the depai, aj reflects the dependency degree of the behavior behai on the behavior behaj; constructing an attack dependence matrix M according to all depai and aj, wherein the matrix M reflectsthe dependence relationship between every two of all behaviors of one employee; and obtaining an attack behavior path pahag -> ak through the M, wherein the pahag -> ak represents a series of completeattack actions which are most likely to occur. According to the method, the potential relationship among employee behaviors is found out, and the dependency relationship is quantified. Enterprises can quickly find out two behaviors with the closest relationship through the dependency relationship numerical value, early warning is conducted on threat behaviors according to a preset danger threshold value, and the enterprises are prevented from suffering from some threat attacks from the inside.
Owner:中孚安全技术有限公司 +3

Electric power information threat context awareness and defense system based on big data

The invention discloses an electric power information threat context awareness and defense system based on big data. The system comprises a power grid big data information acquisition module, a power grid big data storage module, an information threat feature extraction module, a context awareness module, a protection monitoring module and a response processing module. Wherein the power grid big data information acquisition module is used for acquiring power grid threat information; the power grid big data storage module is used for storing power grid threat intelligence; the information threat feature extraction module is used for extracting operation features of current power grid threat intelligence and realizing extraction of threat feature information; the context awareness module generates a threat behavior warning according to the threat feature information extracted by the information threat feature extraction module; the protection monitoring module is used for blocking threat behaviors; and the response processing module is used for studying and judging the threat behavior, obtaining evidence and feeding back the threat behavior to the context awareness module. The method provides powerful guarantee for information security of power systems, communication systems and the like, and has a good application effect.
Owner:STATE GRID HEBEI ELECTRIC POWER RES INST +2

Industrial robot system security threat evaluation method based on time-sharing frequency

The invention discloses an industrial robot system security threat evaluation method based on time-sharing frequency. The method comprises the following steps of: S1, recognizing potential threats of an industrial robot system according to system logs, historical behaviors and other information, classifying the threats according to a threat expression form, and determining a threat subject and a threat approach; S2, aiming at a threat behavior selected by the industrial robot system, counting occurrence frequency of the threat behavior in a historical period, and forming a threat frequency sequence diagram of the industrial robot system; S3, performing segmentation processing on the total statistical time of the occurrence frequency of the threat behavior, selecting multiple experts to evaluate the threat frequency, and sequentially evaluating the threat frequency in different time periods by each expert; and S4, calculating a threat frequency evaluation result trust weight of each expert, forming a threat frequency vector, and realizing threat assignment of the industrial robot system. According to the method, security threat evaluation can be carried out on the industrial robot system with a relatively long historical security threat behavior record.
Owner:HARBIN INST OF TECH

Method and device compatible with structured and unstructured privileged threat behavior data

The invention discloses a method and a device compatible with structured and unstructured privilege threat behavior data. The method comprises the following steps: accessing privilege account sessionlog data and privilege account terminal operation audit log data; planning classified storage indexes for the privileged account session log data and the privileged account terminal operation audit log data as required, wherein the classified storage indexes comprise a structured log data structure and an unstructured log data structure; respectively defining corresponding analysis templates for the structured log data structure and the unstructured log data structure, and manually updating the analysis templates as required; according to the analysis template, carrying out isomorphism processing on various abnormal log data; and associating various types of heterogeneous privilege threat abnormal behavior data as required, and detecting privilege threat abnormal behaviors. According to the method, various heterogeneous log data can be accessed and analyzed in a perfect adaptation manner, and a guarantee is provided for subsequent privilege threat abnormal behavior detection and analysis, so that the risk of loss caused by privilege threat abnormal behaviors of enterprises is reduced to the minimum.
Owner:广州海颐信息安全技术有限公司

A mining method, terminal and storage medium for discovering dependencies between threat behaviors

ActiveCN112261006BPrevent Threat AttacksImprove incident response capabilitiesSecuring communicationPathPingBusiness enterprise
The present invention provides a mining method, a terminal and a storage medium for discovering dependencies between threat behaviors, collects log files of all users a in the system, cleans and organizes the data in the log files, and forms an employee behavior set S={ beh ai }, the time span w in the statistical set S t ; based on S and w t The probability of occurrence of statistical behavior P(beh ai ) and the behavior co-occurrence probability P(beh ai ,beh aj ); calculates the dependency value dep based on the two probabilities ai,aj , dep ai,aj reflects the behavior beh ai on behavior beh aj degree of dependence; according to all dep ai,aj Construct the attack dependency matrix M, which reflects the dependency between all behaviors of an employee; the attack behavior path path is obtained from M ag→ak , path ag→ak Represents a complete, most likely series of attack actions. The present invention finds potential connections between employee behaviors and quantifies such dependencies. Enterprises can quickly find out the two most closely related behaviors through the value of the dependency relationship, and warn the threat behavior according to the pre-specified risk threshold to prevent the enterprise from being attacked by some internal threats.
Owner:中孚安全技术有限公司 +3

Semi-automatic anti-crawling system based on behavior characteristics

PendingCN111914255AAccurate killingRealize semi-automatic anti-climbing closed loopDatabase management systemsPlatform integrity maintainanceUniform resource identifierEngineering
The invention belongs to the field of network data security, and relates to a semi-automatic anti-crawling system based on behavior characteristics, which comprises an ETL processing unit, a behavioranalysis and management unit, a log analysis engine and a request protection processing unit, wherein the ELT processing unit is used for carrying out ETL (Extract Transform and Load) processing on request information of a request initiated by a user side to obtain UID (Uniform Identifier) and URI (Uniform Resource Identifier) data; the behavior analysis and management unit performs deduplicationprocessing on the received URI data by taking the received URI as a main key aggregation to generate a behavior set and statistical indexes related to a service scene;, takes the behavior set as a main key aggregation, and generates an analysis view to judge whether the behavior set is threatened or not; manages the threat behavior set,and if it is judged that the behavior set is the threat behavior set, records and tracks the threat behavior set, automatically generates a disposal strategy parameter according to the behavior set access frequency, the URI data type and the URI data quantity, and pushs the disposal strategy parameter to a database for crawler real-time monitoring.
Owner:北京人人云图信息技术有限公司

Method and system for monitoring internal threat behavior in virtual network

ActiveCN110958267BEnsure safetyRealize internal security risk monitoringSecuring communicationAttackNetwork management
Embodiments of the present invention provide a method and system for monitoring internal threat behaviors in a virtual network. The method includes: acquiring a tenant's normal behavior request, and constructing a trusted level calling model based on the normal behavior request; collecting the tenant's actual behavior request, and if it is detected that the tenant performs a virtual network management configuration operation, based on the collected actual behavior request information, The actual invocation process model is generated through behavior tracing; the actual invocation process model and the trusted-level invocation model are matched to obtain the behavior matching result. According to the matching result, it is judged whether the actual behavior request is a malicious attack behavior, and the matching result is fed back to the tenant. In the embodiment of the present invention, by adopting a behavior tracing and monitoring method for internal security threats and combining behavior matching, on the basis of a credible hierarchical association model, the actual behavior is compared with the credible behavior model, and feedback is realized, so as to realize the internal security Risk monitoring to ensure the security of virtual networks in the cloud environment.
Owner:BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products