Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

User identification system and method based on heterogeneous information network embedding algorithms

A technology of heterogeneous information network and embedded algorithm, applied in the field of information security detection, can solve problems such as the difficulty of modeling multi-source heterogeneous behavior data association

Active Publication Date: 2020-05-15
INST OF INFORMATION ENG CAS
View PDF8 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technology of the present invention solves the problem: to solve the problem of difficult association modeling of multi-source heterogeneous behavior data existing in the existing user identification method based on behavior analysis, the present invention provides a user identification system and method based on heterogeneous information network embedding algorithm , can build a more comprehensive behavior model, greatly improve the accuracy of user identification, and can analyze suspicious situations, providing event-level suspicious operation sorting

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identification system and method based on heterogeneous information network embedding algorithms
  • User identification system and method based on heterogeneous information network embedding algorithms
  • User identification system and method based on heterogeneous information network embedding algorithms

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0061] The invention mainly solves how to identify potential operating users based on multi-source heterogeneous host audit logs, and provides instructive abnormal analysis for suspicious situations of identification errors.

[0062] Such as figure 1 As shown, the system of the present invention includes a data processing module, a joint embedding module, and an evaluation and analysis module. The data processing module analyzes and processes the original multi-source heterogeneous host audit log data, retains predefined key fields, and uses standardized historical log data to build a heterogeneous information network; the joint embedding module uses two kinds of heterogeneous information The network embedding algorithm learns the operation mode of a single host and captures the global association of the network respectively. The two heterogeneous i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a user identification system and method based on heterogeneous information network embedding algorithms. The user identification system comprises a data processing module, a joint embedding module and an evaluation analysis module. According to the invention, multi-source heterogeneous user behavior data is utilized for constructing a normal behavior model based on the thought of behavior analysis, and user identification is executed by comparing the similarity between a current behavior and the normal behavior model when behavior data of a new time period arrives. Forthe condition of identification errors, suspicious behavior sorting is given based on dot product similarity operation. The system and method can be applied to an enterprise intranet to detect potential internal threats, a more comprehensive and accurate behavior model can be obtained by combining two heterogeneous information network embedding algorithms, and the user identification accuracy isimproved by about 10%. In addition, event-level traceability clues can be provided for further analysis of the safety monitoring personnel.

Description

technical field [0001] The invention relates to a user identification system and method based on a heterogeneous information network embedding algorithm, belongs to the technical field of information security detection, and is used in an enterprise intranet environment. Background technique [0002] Today's most damaging security threats come not from malicious people or malware from the outside, but from trusted insiders. Members in the organization obtain certain access control rights according to their responsibilities, and effective identity authentication is an important way to defend against internal attacks. However, the identity authentication mechanism mainly includes account password, fingerprint recognition, etc., which are only valid when logging in, and there are still many security risks. Existing research usually establishes a user's normal behavior model based on behavior analysis, so as to obtain continuous and effective user identity monitoring after login...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24G06N3/08
CPCG06N3/08H04L41/147H04L63/1425
Inventor 于爱民李梦蔡利君马建刚孟丹于海波
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products