Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for associated playback of privileged threat behavior tracks based on drag and drop

A track-associated and privileged technology, applied in computer security devices, instruments, computing, etc., can solve problems such as timeliness and ease of use, high personal technical requirements for administrators, and potential safety hazards of corporate privileges threatening abnormal behaviors, etc., to improve The effects of timeliness and ease of use

Active Publication Date: 2021-12-10
广州海颐信息安全技术有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the traditional sense, privileged threat abnormal behavior detection analysis and track playback are generally done through tool rule configuration or command filtering, which requires relatively high personal technical skills for administrators, making it impossible for some administrators and leadership personnel to do so. It can only be carried out after the relevant technical personnel are in place, so it is easy to cause timeliness and usability problems, causing corporate privileges to threaten abnormal behavior security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for associated playback of privileged threat behavior tracks based on drag and drop
  • Method and device for associated playback of privileged threat behavior tracks based on drag and drop

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0029] In the method and device embodiment of drag-and-drop-based associated playback of privileged threat behavior tracks in the present invention, the drag-and-drop method for associated playback of privileged threat behavior tracks is applied to a privileged account threat analysis system, and the privileged account threat analysis system includes interconnection Intelligent threat audit unit, real-time threat monitoring unit and overall configuration manage...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a drag-and-drop-based method and device for associated playback of privileged threat behavior tracks, which are applied to a privileged account threat analysis system. The method includes: A) accessing privileged account session log data, accessing privileged account terminal operation audit log data; B) process the privileged account session log data and the privileged account terminal operation audit log data; C) visualize the indicators of various dimensions related to the abnormal behavior of the privileged threat into draggable field blocks; D) drag and drop the Select the relevant dimension index by dragging; E) Select the track playback time range according to the needs; F) Associate the selected dimension index with the track playback time range to restore the track of privileged threat abnormal behavior. The invention enables relevant personnel who do not understand technology or are not deep in technology to quickly realize the trajectory playback analysis of privilege threat abnormal behavior through a simple mouse dragging and combining method, thereby improving timeliness and ease of use.

Description

technical field [0001] The invention relates to the field of privilege security, in particular to a drag-and-drop-based method and device for associated playback of privilege threat behavior tracks. Background technique [0002] Privileged accounts refer to accounts with high risk (such as administrator accounts that can start and stop devices) or high value (such as application accounts that can read business-sensitive data). More than half of major security incidents each year are due to privileged accounts being This behavior of using privileged accounts to cause damage or loss to enterprises is called privileged threat abnormal behavior. In the traditional sense, privileged threat abnormal behavior detection analysis and track playback are generally done through tool rule configuration or command filtering, which requires relatively high personal technical skills for administrators, making it impossible for some administrators and leadership personnel to do so. It canno...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55
CPCG06F21/552
Inventor 董明易伟增张金兴邓帧恒
Owner 广州海颐信息安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products