Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User behavior analysis-based data theft risk assessment method and system

A technology of behavior analysis and risk assessment, applied in the field of data theft risk assessment based on user behavior analysis, can solve problems such as inability to avoid hidden dangers of unsafe operations and cumbersome procedures

Active Publication Date: 2016-02-24
BEIJING VRV SOFTWARE CO LTD
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The former scheme provides corresponding access rights for specific users, but it cannot avoid the hidden dangers of unsafe operations
The latter makes the process of normal business work cumbersome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User behavior analysis-based data theft risk assessment method and system
  • User behavior analysis-based data theft risk assessment method and system
  • User behavior analysis-based data theft risk assessment method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The specific embodiments of the present invention will be described in further detail below in conjunction with the drawings and embodiments. The following examples are used to illustrate the present invention, but not to limit the scope of the present invention.

[0064] figure 1 Shows a schematic flow chart of a data theft risk assessment method based on user behavior analysis provided by an embodiment of the present invention, such as figure 1 A data theft risk assessment method based on user behavior analysis is shown, and the method includes the following steps:

[0065] S11. Obtain the operation behavior pair of the terminal user.

[0066] It is understandable that a terminal is a device used by an endpoint user to communicate with a host, and it can be a monitor, keyboard, or printer. The data theft risk assessment method based on network behavior is to mine the operation behavior of terminal users and analyze the terminals with potential security risks.

[0067] It i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user behavior analysis-based data theft risk assessment method and system. The method includes the following steps that: operation behavior pairs of a terminal user are obtained; dangerous operation behavior pairs and the number of the dangerous operation behavior pairs are obtained according to the operation behavior pairs, and a first dangerousness coefficient is obtained; the matching number and mismatching number of web site visit behavior business types and registration business types are obtained according to the dangerous operation behavior pairs, and a second dangerousness coefficient is obtained; dangerous copy behaviors and the number of dangerous copy files are obtained according to copy behaviors, and a third dangerousness coefficient and a fourth dangerousness coefficient are calculated; and a preset risk assessment model is adopted to calculate the dangerousness coefficient of a terminal according to the first dangerousness coefficient, the second dangerousness coefficient, the third dangerousness coefficient and the fourth dangerousness coefficient. With the user behavior analysis-based data theft risk assessment method and system of the invention adopted, the network behaviors of the terminal user of an intranet are analyzed; potential terminals where risk operation may exist can be discovered; data security can be protected; the security of the intranet can be improved; and the losses of enterprises can be reduced.

Description

Technical field [0001] The invention relates to the field of network security, in particular to a data theft risk assessment method and system based on user behavior analysis. Background technique [0002] With the widespread use of computers and the rapid development of network technology, terminal security has an increasingly profound impact on enterprise and national information security. While using the network efficiently, the risks of information leakage and abuse also increase. Enterprises are beginning to pay attention to the safety of terminal security and user behavior, and user operation behavior needs to be properly monitored and managed. [0003] At present, the main solutions for the security of the intranet terminal are: one is based on the access control of the intranet website; the other is the audit of the sentry behavior of the network. The former scheme provides corresponding access rights for specific users, but there is no way to avoid hidden dangers of unsaf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24G06F21/62
CPCG06F21/6218H04L41/0631H04L63/1416
Inventor 龚建新赵德滨姚飞李宏恩
Owner BEIJING VRV SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products