Method, apparatus, equipment and medium for identifying abnormal operating behavior

A technology for identifying methods and behaviors, applied in the field of cloud computing security, which can solve problems such as the difficulty in preventing security policies, the inability to fully protect the rights and interests of users, and the inability to determine whether a cloud operator is a legitimate cloud operator, so as to achieve the effect of protecting the rights and interests of users.

Active Publication Date: 2019-02-15
北京中测安华科技有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For the malicious behavior of cloud administrators, traditional security policies are difficult to prevent, and it is impossible to dete

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, apparatus, equipment and medium for identifying abnormal operating behavior
  • Method, apparatus, equipment and medium for identifying abnormal operating behavior
  • Method, apparatus, equipment and medium for identifying abnormal operating behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The characteristics and exemplary embodiments of various aspects of the present invention will be described in detail below. In order to make the purpose, technical solutions and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only configured to explain the present invention, not to limit the present invention. It will be apparent to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present invention by showing examples of the present invention.

[0029] It should be noted that in this article, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, apparatus, equipment and medium for identifying abnormal operating behavior. The method comprises the following steps of obtaining a set of historical operation behaviors according to behavior logs of a plurality of cloud operators; obtaining a set of preferred operating behaviors according to the behavior log of the first cloud operator; calculating similarity between each kind of operation behavior in the historical operation behavior set and each kind of operation behavior in the preference operation behavior set; generating a prediction operation behaviorset according to similarity; based on the set of predicted operating behaviors, identifying whether the actual operating behaviors of the first cloud operator are abnormal operating behaviors in eachpreset time period of the second preset period. Through the technical proposal of the invention, the abnormal behavior of the cloud operator can be recognized in time, so that the rights and interestsof users can be fully protected.

Description

technical field [0001] The present invention relates to the field of cloud computing security, in particular to an identification method, device, equipment and computer-readable medium for abnormal operation behavior. Background technique [0002] Cloud computing refers to the unified management and scheduling of computing, storage, network, software and other resources through virtualization technology, and uses the Internet model to provide basic resources, platform capabilities, software applications and other services to users. In short, cloud computing means that users migrate data and services to the cloud platform, and use the cloud computing platform to manage data. [0003] Obviously, the essential feature of the cloud computing model is the separation of data ownership and management rights. Therefore, under the cloud computing model, users lose direct control over their own data and business systems on the cloud, while cloud administrators objectively have the ab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/34
CPCG06F11/3438
Inventor 梁露露常文娟宋岩蔚李玉志
Owner 北京中测安华科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products