Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method used for predicting whether malicious behaviors of user exist and calculating equipment

A technology for computing equipment and users, applied in the field of information security, can solve the problems of easy forgery, increase cost, lack of related information, etc., and achieve the effect of high accuracy and cost saving

Inactive Publication Date: 2017-09-12
BEIJING KNOWNSEC INFORMATION TECH
View PDF4 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, due to the fact that the basic information of users is relatively easy to forge, and the information of each user is largely isolated and lacks relevant information with other information, resulting in low accuracy in detecting network anomalies, and the situation of false detection and missed detection is high. many
On the other hand, the content of the abnormal mode is relatively single, which will also lead to missed detection, and most of them are manually configured, which increases the cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method used for predicting whether malicious behaviors of user exist and calculating equipment
  • Method used for predicting whether malicious behaviors of user exist and calculating equipment
  • Method used for predicting whether malicious behaviors of user exist and calculating equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0016] figure 1 A structural block diagram of a computing device 100 according to an exemplary embodiment of the present invention is shown. The computing device 100 can be implemented as a server, such as a file server, a database server, an application program server, and a network server, etc., and can also be implemented as a personal computer including a configuration of a desktop computer and a notebook computer. Additionall...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method used for predicting malicious behaviors of a user exist based on a user relation diagram, and the method is suitable for being implemented in calculating equipment. The user relation diagram comprises nodes and edges used for connecting the nodes. The method comprises steps that the user data of the user is acquired; the user relation diagram is updated according to the acquired user data; the at least one category of associated characteristics of the user are acquired according to the node related to the user and the attribute values of the nodes connected with the node of the user by the edges; according to the extracted associated characteristics, a pre-established categorizing model is used to determine whether the malicious behaviors of the user exist. The invention also discloses the corresponding calculating equipment and a corresponding computer readable storage medium.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and computing device for predicting whether a user has malicious behavior. Background technique [0002] With the rapid development of network communication technology, the continuous deepening of Internet applications, and the increasingly rich information carried, the Internet has become an important infrastructure of human society. At the same time, network security problems are becoming more and more serious. Among them, malicious network behaviors such as network fraud are gradually becoming an important criminal method that endangers the safety of public property. [0003] At present, the main way to manage malicious online behaviors is to detect based on the configured abnormal patterns and basic information of users, such as the user's credit score, the user's consumption situation, the user's historical loan situation, and so on. On the one hand, d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/62G06Q40/02
CPCG06Q40/03G06F18/24G06F18/214
Inventor 蔡自彬
Owner BEIJING KNOWNSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products