Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dragging-based privileged threat behavior track associated playback method and device

A trajectory correlation and privilege technology, applied in computer security devices, instruments, electronic digital data processing, etc., can solve the problems of timeliness and ease of use, no way to start, corporate privileges threaten abnormal behavior safety hazards, etc., to improve timeliness and ease of use

Active Publication Date: 2019-11-29
广州海颐信息安全技术有限公司
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the traditional sense, privileged threat abnormal behavior detection analysis and track playback are generally done through tool rule configuration or command filtering, which requires relatively high personal technical skills for administrators, making it impossible for some administrators and leadership personnel to do so. It can only be carried out after the relevant technical personnel are in place, so it is easy to cause timeliness and usability problems, causing corporate privileges to threaten abnormal behavior security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dragging-based privileged threat behavior track associated playback method and device
  • Dragging-based privileged threat behavior track associated playback method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0029] In the method and device embodiment of drag-and-drop-based associated playback of privileged threat behavior tracks in the present invention, the drag-and-drop method for associated playback of privileged threat behavior tracks is applied to a privileged account threat analysis system, and the privileged account threat analysis system includes interconnection Intelligent threat audit unit, real-time threat monitoring unit and overall configuration manage...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dragging-based privileged threat behavior track associated playback method and device, being applied to a privileged account threat analysis system. The dragging-based privileged threat behavior track associated playback method comprises the following steps: A) accessing privileged account session log data, and accessing privileged account terminal operation audit log data; B) processing the privileged account session log data and the privileged account terminal operation audit log data; C) visualizing each dimension index related to privilege threat abnormal behaviors into a draggable field block; D) selecting related dimension indexes through a mouse dragging mode according to needs; E) selecting a track playback time range as required; and F) associating the selected dimension index with the trajectory playback time range, and restoring the privileged threat abnormal behavior trajectory. According to the dragging-based privileged threat behavior track associated playback method, even related personnel who do not understand technologies or are not deep in technologies can rapidly achieve track playback analysis of privilege threat abnormal behaviors in asimple mouse dragging combination association mode, and timeliness and usability are improved.

Description

technical field [0001] The invention relates to the field of privilege security, in particular to a drag-and-drop-based method and device for associated playback of privilege threat behavior tracks. Background technique [0002] Privileged accounts refer to accounts with high risk (such as administrator accounts that can start and stop devices) or high value (such as application accounts that can read business-sensitive data). More than half of major security incidents each year are due to privileged accounts being This behavior of using privileged accounts to cause damage or loss to enterprises is called privileged threat abnormal behavior. In the traditional sense, privileged threat abnormal behavior detection analysis and track playback are generally done through tool rule configuration or command filtering, which requires relatively high personal technical skills for administrators, making it impossible for some administrators and leadership personnel to do so. It canno...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55
CPCG06F21/552
Inventor 董明易伟增张金兴邓帧恒
Owner 广州海颐信息安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products