User portrait method applied to field of network security

A network security and user technology, applied in the field of information security, to achieve accurate user behavior, accurate description, and reduce the effect of false alarm rate

Pending Publication Date: 2020-01-10
蓝盾信息安全技术有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the traditional user portrait method focuses on the extraction and analysis of structured data. For unstructured and semi-structured data, only simple rule matching is used for extraction.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User portrait method applied to field of network security
  • User portrait method applied to field of network security
  • User portrait method applied to field of network security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] 1. Obtain data

[0012] Get user's data from multiple data sources. Structured data includes: user demographic attributes (such as age, gender, location, department, education level, etc.), job characteristics (such as working hours, workload, working years, overtime hours, working time periods, etc.). Semi-structured data includes: system operations (such as authority compliance, commonly used functions, operation frequency, operation time period, valid operands, etc.), sensitive operations (such as unauthorized operations, non-personal operations, data leakage, etc.). Unstructured data is mainly the specific content of traffic, in the format of text, pictures, audio, video, etc.

[0013] 2. Data preprocessing

[0014] It mainly deals with structured and semi-structured data. There are two main directions of processing: statistical description, and vectorized description.

[0015] In machine learning, non-digital data can only be embedded in one-hot without convers...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user portrait drawing method applied to the field of network security, which is used for drawing a user portrait in combination with natural attributes, operation behavior characteristics and data use habits of a user. On the basis of a traditional user portrait method based on statistics and rules, a machine learning method, such as semantic mining, time sequence fitting, clustering and correlation analysis, is added, a user behavior model is deeply mined and analyzed, and more accurate and effective anomaly detection capability is provided.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a user portrait method applied in the field of network security. Background technique [0002] The difficulty of user portraits lies in the modeling and analysis of large-scale historical data. There are two main difficulties, one is the collation and analysis of a large amount of semi-structured and unstructured data, and the other is the lack of in-depth insight into user operation behavior. A traditional user portrait method, mainly through simple statistics, counts some user attributes such as frequency, frequency, occurrence time period, etc., based on the assumption of normal distribution (although there is no proof that these attributes obey the normal distribution) , using the 3Sigma principle to identify samples that deviate significantly from the sample mean as anomalies. In addition, the traditional user portrait method focuses on the extraction and anal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/35
Inventor 杨育斌黄冠寰柯宗贵
Owner 蓝盾信息安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products