Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User behavior recognition method, system and device and storage medium

A recognition method and behavior technology, applied in transmission systems, neural learning methods, biological neural network models, etc., can solve the problems that data stream encryption technology increases the difficulty of user behavior analysis, cannot directly obtain user behavior information, etc., and achieves rich supervision methods. Effect

Active Publication Date: 2022-01-07
SUN YAT SEN UNIV
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The network link is located in the middle and lower layers of the TCP / IP protocol stack, and the upper layer information is invisible to it. The existing link management technology mainly realizes link management from the perspective of traffic load. With the rapid growth of network scale and heterogeneity , With the rapid development and penetration of network services, the traditional "traffic"-oriented network link management methods can no longer meet new needs. Customized network link management based on user behavior rules, preferences, and habits has become a new development direction. However, Due to the position of the network link in the protocol stack, it is impossible to directly obtain user behavior information at the upper layer, and the increasingly popular data stream encryption technology further increases the difficulty of user behavior analysis. User behavior recognition is one of the important problems to be solved urgently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User behavior recognition method, system and device and storage medium
  • User behavior recognition method, system and device and storage medium
  • User behavior recognition method, system and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The embodiment of the present invention will be explained in detail below in conjunction with the accompanying drawings. The examples given are only for the purpose of illustration, and cannot be interpreted as limiting the present invention. The accompanying drawings are only for reference and description, and do not constitute the scope of patent protection of the present invention. limitations, since many changes may be made in the invention without departing from the spirit and scope of the invention.

[0057] see figure 1 , figure 1 It is a user behavior identification method provided by an embodiment of the present invention, which can be applied to various types of network link-level management. The method includes:

[0058] S1. Collect real-time flow data on the network link to obtain real-time IP data flow;

[0059] In one embodiment, this embodiment collects network data flow in real time through a capture tool on a designated network link to obtain real-tim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network user behavior recognition, in particular to a user behavior recognition method, system and device and a storage medium, and the method comprises the steps: carrying out the preprocessing of an IP data flow, and obtaining a corresponding coding vector and an attribute feature; according to the coding vector and a pre-constructed hypergraph expression model, converting the IP data stream and the attribute characteristics thereof in a preset time window into a multi-layer hypergraph; based on the multi-layer hypergraph, obtaining a hypergraph sequence corresponding to a time window according to an IP data stream in a continuous time window; and performing real-time behavior labeling on the hypergraph sequence to obtain a user behavior labeling sequence. According to the method provided by the invention, the network administrator can identify the user behavior through the network data flow without decrypting and acquiring high-level information, and meanwhile, the continuous access behavior rule of the user is described, so that the security of the Internet is effectively improved, and the application range is wide.

Description

technical field [0001] The invention relates to the technical field of network user behavior recognition, in particular to a network link-oriented user behavior recognition method, system, device and storage medium. Background technique [0002] The network link is a key link in data communication. It is the pipeline connecting the source and the destination. The network link undertakes the transmission task of data services. In order to ensure the normality and stability of the network link, many different technologies are applied to network link management. , including: load balancing, traffic engineering, security detection, etc. [0003] The network link is located in the middle and lower layers of the TCP / IP protocol stack, and the upper layer information is invisible to it. The existing link management technology mainly realizes link management from the perspective of traffic load. With the rapid growth of network scale and heterogeneity , With the rapid development a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L43/0876H04L41/14G06N3/04G06N3/08
CPCH04L43/0876H04L41/14G06N3/04G06N3/08
Inventor 谢逸
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products