CN101615186B - BBS user abnormal behavior auditing method based on Hidden Markov theory - Google Patents

BBS user abnormal behavior auditing method based on Hidden Markov theory Download PDF

Info

Publication number
CN101615186B
CN101615186B CN2009100127726A CN200910012772A CN101615186B CN 101615186 B CN101615186 B CN 101615186B CN 2009100127726 A CN2009100127726 A CN 2009100127726A CN 200910012772 A CN200910012772 A CN 200910012772A CN 101615186 B CN101615186 B CN 101615186B
Authority
CN
China
Prior art keywords
parameter
observed value
value sequence
user
audit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2009100127726A
Other languages
Chinese (zh)
Other versions
CN101615186A (en
Inventor
王兴伟
张登科
姜英
陈静
董明
李福亮
李刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northeastern University China
Original Assignee
Northeastern University China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northeastern University China filed Critical Northeastern University China
Priority to CN2009100127726A priority Critical patent/CN101615186B/en
Publication of CN101615186A publication Critical patent/CN101615186A/en
Application granted granted Critical
Publication of CN101615186B publication Critical patent/CN101615186B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a BBS user abnormal behavior auditing method based on Hidden Markov theory, belonging to the technical field of computer and information safety. The method comprises the following steps: reading auditing data from a database to obtain behavior observed sequence to be detected; reading trained model parameters from a Hidden Markov model database; calculating a state value sequence by utilizing a Viterbi algorithm; calculating the observed value sequence probability by forward and afterward algorithms, comparing the observed value sequence probability with the preset threshold, and giving an alarm if the observed value sequence probability is lower than the threshold, otherwise, belonging to normal behavior, correcting the Hidden Markov model parameter and storing the Hidden Markov model parameter into a parameter file of the Hidden Marko model. The BBS added with audit tracking helps system managers to prevent systems and resources from being damaged by illegal authorized users and provides help when data is recovered. The audit tacking can realize associated targets of safety, comprising personal function, event reconstruction, intrusion detection and fault analysis, and greatly improves the safety of the system.

Description

A kind of BBS user's abnormal behaviour auditing method based on Hidden Markov theory
Technical field
The invention belongs to computing machine and field of information security technology, particularly a kind of BBS user's abnormal behaviour auditing method based on Hidden Markov theory.
Background technology
The English full name of BBS is Bulletin Board System, and being translated as Chinese is exactly " BBS ".
At present BBS system can offer various users to various shared resources, everyone can be after the registration account number article in the browing system, the file in the shared system.At present, domestic except the BBS that the public is provided, the BBS that comprises various commercial uses also is provided the service station.BBS provides such as multiple work columns such as zone of discussion, mail district, Free Talk, file-sharing districts, also can preside over and open up new BBS column according to the head of a station at BBS station or user's oneself needs.
But; In the current all kinds of BBS system; Often only be concerned about the safety of data of transmission over networks and the identity security in the access process; The user has been used the time of which information, resource, use and how to have used (carrying out which kind of operation) to produce evidence with written mode, caused the keeper after accident takes place, can't carry out cause investigation, analysis and responsibility and identify.
Summary of the invention
In order to overcome the weak point of prior art, a kind of BBS user's abnormal behaviour auditing method based on Markov theory is proposed during the object of the invention.
It is following, as shown in Figure 1 to handle concrete performing step based on the audit-trail of HMM (HMM):
Step 1: read Audit data from database, obtain the observed value sequence of behavior to be detected;
Step 2: get trained model parameter from the HMM database read;
Step 3. is utilized the Viterbi algorithm, through observed value sequence computing mode value sequence, is saved in the database;
Step 4. is called forward direction, back to algorithm, calculates the probability that the observed value sequence occurs, and compares with pre-set threshold, is lower than threshold value, gets into step 5, otherwise gets into step 6;
Step 5. is lower than threshold value as abnormal behaviour, produces alarm;
Step 6. normal behaviour, the correction of HMM parameter, and deposit in the Parameter File of HMM.
The described observed value sequence of step 1 is meant BBS user's behavior, and user behavior main in BBS is following: read article, publish an article; Revise article, deletion article, amusement; Receiving and dispatching mail,, the deletion user, forbid that the user publishes an article, arbitrates, audit and stealthy.Because the deletion user, forbid that the user publishes an article, arbitrates, audit and stealthy be that the user with certain authority just can carry out, belong to special behavior, unifiedly be classified as other.The observed value sequence of confirming be read article, publish an article, revise article, delete article, amusement, receiving and dispatching mail, other.
Confirm good observed value sequence, need to use the information statement that quantizes.The information definition that the inventive method observed value sequence quantizes is: the user operates in the number of times that carries out in a certain period for every kind.Be observed value sequence O (i, t) ∈ { O 1.t..., O 7.t, t representative here be a period of time, can get the time in a week, and the i representative is different operating, its value is 1≤i≤7 here.
The described HMM of step 2, initial parameter is provided with as follows:
A) the observed value sequence read article, publish an article, revise article, the deletion article, chat, receiving and dispatching mail, other };
B) state number often, sometimes, seldom, never };
C) original state probability vector (π) confirms.Owing to be to confirm these parameters for the first time, under data volume also is not very big situation, can thinks and shift with equiprobability between various states.π=(π 1, π 2..., π N), π wherein i=p (q 1=S i), because state S iHave only often, sometimes, seldom, never such four kinds of states, i.e. N=4 is so have
π 1=π 2=π 3=π 4=1/4。
D) confirming of state transition probability (A): adopt equiprobability to shift and carry out initial setting, promptly all values are 1/4 in the state transition probability matrix.
E) observed value probability (B) is definite, and concrete steps are following:
A. random initializtion observed value probability matrix B constitutes the initial model parameter lambda jointly with original state probability vector π that configures and state transition probability matrix A;
B. call the Baum-Welch algorithm; Initial parameter is carried out maximum likelihood estimates, obtain new model parameter
Figure G2009100127726D00021
wherein Baum-Welch be a kind of known algorithm;
Figure G2009100127726D00022
that C. will obtain as initial parameter again, the parameter when detecting as abnormal behaviour;
D. when normal behaviour being carried out the model parameter training; Be initial parameter also, and progressively be modified to λ with
Figure G2009100127726D00023
;
The described state value sequence of step 3 is meant the operation frequency of the various observed values of user, according to the user to the frequent degree of certain operation be divided into often, sometimes, seldom, never } such four kinds of states, i.e. state value sequence q (m)=S 1S 2S 3S 4S 5S 6S 7, S wherein i∈ often, sometimes, seldom, never }.The described Viterbi algorithm of step 3 is a kind of known algorithm, and the inventive method adopts the method for taking the logarithm that the value of probability matrix is amplified on former Viterbi algorithm basis;
Threshold value described in the step 4, this paper adopts the method for average, and promptly the average of the probability through this observed reading repeatedly occurring is tried to achieve.As detected observed value sequence O={O 1, O 2..., O TThe Probability p (O| λ) that occurs, when probability of occurrence is lower than preset threshold, think ERST.Forward direction described in the step 4, back also are a kind of known algorithm to algorithm, and the present invention adopts the scale factor method to operate when calculating alpha matrix and beta matrix.Because the middle alpha matrix that obtains; The parameter value that the beta matrix all need call as the Baum-Welch algorithm so their value can not only be amplified, also will have reduction; Also promptly amplify earlier the process of afterwards reducing; What adopt here is that the scale factor method is operated, and amplifies certain scale factor earlier, finally restores to be initial value.
The correction of the described HMM parameter of step 6 is meant that owing to the starting stage not enough for the priori of user model, the initial setting up of HMM is not what fix, needs to revise gradually.Preserve current HMM parameter through file.Model parameter comprises:
1) π: original state probability vector π=(π 1, π 2..., π N), π wherein i=p (q 1=S i), q1 is a state value.Because state S iHave only often, sometimes, seldom, never such four kinds of states, i.e. N=4, the variable that need write down here has corresponding π iSubscript and corresponding π iValue.
2) state transition probability matrix A
A wherein Ij=p [q T+1=S j| q t=S i], 1≤i, j≤N.The variable that need preserve has the starting point i of state, the terminal point j and a of state IjValue.
3) observed value probability matrix B
B wherein j(k)=p [O k| q t=S j], 1≤j≤N, 1≤k≤T.The variable that need preserve has the starting point j of state, state terminal point k and b j(k) value.
According to the Baum-Welch algorithm, by observed value sequence O with choose initial value model λ=(π), the revaluation formula is tried to achieve one group of new argument π for A, B i, a Ij, b Jk, then can obtain a new model λ=(A, B π), can prove, p (O| λ)>p (O| λ), the λ that is obtained by the revaluation formula is better at performance observed value sequence O than λ.Then repeat this process, progressively the parameter of improved model restrains up to p (O| λ), and till just no longer obviously increasing, the λ of this moment is exactly the model of being asked.
Beneficial effect: the BBS after the adding audit-trail not only helps the help system keeper to guarantee that system and resource thereof exempt from the infringement of illegal authorized user, can also when data are recovered, offer help simultaneously.Audit-trail can realize multiple safe related objective, comprises individual's function, incident reconstruction, intrusion detection and fault analysis, the security that has improved system greatly.
Description of drawings
Fig. 1, be audit-trail process flow diagram based on HMM.
Fig. 2, be BBS audit module The general frame.
Fig. 3, be Fig. 2 Audit data acquisition module data flow diagram of publishing an article.
Fig. 4, for revising article Audit data acquisition module data flow diagram.
Fig. 5, be deletion article Audit data acquisition module data flow diagram.
Fig. 6, be user profile Audit data acquisition module data flow diagram.
Fig. 7, be layout information Audit data flow diagram.
Fig. 8, be auditor's log-on message Audit data image data flow diagram.
Fig. 9, be auditor's operation information Audit data image data flow diagram.
Figure 10, be abnormality detection part function call process flow diagram.
Figure 11, be foreground BBS and the synoptic diagram that combines of backstage HMM.
Embodiment
BBS audit module The general frame is as shown in Figure 2.
The Audit data of gathering comprises the Audit data of publishing an article, modification article Audit data, deletion article Audit data, user profile Audit data, layout information Audit data and audit module self Audit data.The module of wherein auditing its data is made up of auditor's log-on message Audit data and auditor's operation information Audit data.
The collecting flowchart of Audit data of publishing an article is as shown in Figure 3.Audit data derives from space of a whole page article index file and the article file under the BBS; Space of a whole page index file comprises a plurality of fileheader structures; The corresponding one piece of article of each structure; From index file, can extract corresponding data, from text file, extract the article text, all data are through handling in the Publish_p table and audit document Publish.txt that is kept at database.
The collecting flowchart of revising the article Audit data is as shown in Figure 4.Audit data derives from space of a whole page article index file and the article file under the BBS; The parameter that is provided by the function that calls this module finds space of a whole page index file and article file; The act of revision meeting changes the content of these two files; Need to extract amended data, the data that extract are through handling in the Modify_p table and audit document Modify.txt that is kept at database.To revise the modified logo of respective tuple among publish an article in the database table Publish_p and the audit document Publish.txt in addition, former number is added 1.
The collecting flowchart of deletion article Audit data is as shown in Figure 5.Audit data derives from function and the user profile audit table User that calls this module, and the data that extract are through handling in the Delete_p table and audit document Delete.txt that is kept at database.To revise the deleted marker of respective tuple among publish an article in the database table Publish_p and the audit document Publish.txt in addition, former number is put 1.
The collecting flowchart of user profile Audit data is as shown in Figure 6.Audit data derives from the account number side information file userdata under user account number essential information file PASSWDS and each user's oneself the path; The PASSEDS file comprises a plurality of userec structures; Each user has the userec structure of oneself; Write down this user's main account, extract related data, be kept among database table User and the audit document User.txt according to the requirement of Audit data.
The collecting flowchart of layout information Audit data is as shown in Figure 7.Audit data derives from the boardheader structure among the layout information file BOARDS; A space of a whole page under the corresponding BBS of each boardheader structure; The relevant information of the record space of a whole page, the space of a whole page name that provides according to parameter finds corresponding boardheader structure, therefrom obtains this space of a whole page relevant information; And from the shared drive structure, obtain the total article number of the space of a whole page, and calculate increment.Audit information is kept among database table Board and the audit document Board.txt.
Audit module self Audit data comprises auditor's logon information Audit data and auditor's operation information Audit data.
The collecting flowchart of auditor's log-on message Audit data is as shown in Figure 8.Audit data comprises auditor's user name and login time, deposits database table Audit_1 and audit document audit_log.txt in.
The collecting flowchart of auditor's operation information Audit data is as shown in Figure 9.System carries out a certain operating period the auditor; Write down auditorial ID; Recording operation classification simultaneously also will write down the query term of auditing and carrying out to the query manipulation of article state and user behavior, also will write down the statistical items that the auditor carries out to the inquiry of user behavior.To be kept in the database on the one hand after obtaining these information, will be stored in the audit document on the other hand.
To publish an article, revise article and these three behaviors of deletion article in the present embodiment as the audit target; Audit strategy adopts; The audit module is extracted Audit data voluntarily and is stored from the relevant information of these three behaviors; The Audit data of storage is placed in the audit database, and the audit target is stored in the audit database with form.Comprise following form:
Table 1 Audit data---the table of publishing an article
Table 2 Audit data---revise the article table
Figure G2009100127726D00052
Table 3 Audit data---deletion article table
Figure G2009100127726D00053
Table 4 Audit data---layout information table
Figure G2009100127726D00054
Table 5 Audit data---auditor's log
Table 6 Audit data---auditor's query manipulation table
Figure G2009100127726D00056
Audit strategy be (U, M, A, O, APB, C), U={u1 wherein, u2, u3 ..., un} user's set, M is the set that has the user of the right of auditing, A={a1, a2, a3 ..., an} is an operational set, O={o1, and o2, o3 ..., on} is an object set.APB is the audit strategy storehouse, and C representes constraint condition, has defined following relation:
It also is an object that U belongs to O user
It also is an object that M belongs to the O auditor
The corresponding object of each operation of A → O
The audit strategy rule base is by a plurality of audit strategy items, and whether the decision of audit strategy rule base audits to an incident.
The audit strategy item:
<a,o,u,t,r,m>
A representes to treat that audit operation, o represent the object of operating, and u representes that the user that operates, t represent the time range of auditing, and r representes the result that operates, and m representes to formulate the auditor of audit strategy.
Present embodiment is defined as user's behavior model: < B, A, T, IP >.
The user browse the space of a whole page custom B=b1, b2, b3 ..., bn. >.
Bi representes the space of a whole page under the BBS system, according to the degree of concern ordering of user to each space of a whole page.It is select edition that for example some user captures is paid close attention to maximum, secondly is that version is discussed, and other spaces of a whole page were not browsed, and this user's the attribute of browsing space of a whole page custom can be expressed as B=< select edition is discussed version >.
The custom A=of user's operation a1, and a2, a3 ..., an >.
Ai representes the operation that the user of the authority decision of this user role can carry out, the descending in proportion ordering of various operations.For example, the behavior of domestic consumer comprises: read (read), post (publish) revises (modify), deletion (delete), chat (chat), mail (mail).Some users' operating habit is A=< read, publish, chat >.
The time custom T=of logging in system by user t1, and t2, t3 ..., tn >.
With the time of logging in system by user extensive be the morning (morning) [06:00,12:00], afternoon (afternoon) [12:00,18:00], night (evening) [18:00,24:00], four time periods of night (night) [00:00,06:00].For example some user's major parts are logined in the login system in night once in a while in the afternoon, and this user's login time attribute just can be expressed as T=< evening, afternoon >.
The custom IP address ip of logging in system by user=and ip1, ip2, ip3 ..., ipn >
Use the descending ordering of frequency of IP address according to the user.For example the fixing IP of use of a user address 192.168.2.110 surfs the Net, and has once used this address of 202.110.12.25 once in a while, and this behavioural habits can be expressed as IP=< 192.168.2.110,202.110.12.25 >.
Audit data is handled in the HMM audit-trail.Because it is integer that HMM reads in the value of sequence, so, represent read, publish respectively with digital 1-7 according to the difference of operating; Modify, delete, chat, email; Other inputs to the observed value sequence of HMM with user's behavior correspondence, realizes combining of HMM and BBS.
Next be the realization that produces observed value sequence OberserveSequence.txt and observed value sequence NewObserveSequence.txt to be detected; Main through from database, reading in the zero-time of certain operation of user; Calculate the duration of user to this operation; Set every operation at a distance from a user of 30s record then, the time period of just detecting according to auditor's desire automatically produces user's historical information ObserveSequence.txt and user information NewObserveSequence.txt to be detected.The user's abnormal behaviour information that finally calculates through model algorithm can be deposited in the alertinfo table; Use when supplying the foreground to call return results; The testing result table alertinfo table that returns after the traininfo of put user historical operation information table and the abnormality detection in the abnormality detection module background data base, as follows:
Table 7traininfo table
Field name Major key Type Describe
userid Be varchar(20) User name
op Not varchar(20) User's operation
opdate Not date Date of operation
starttime Not datetime The operation start time
endtime Not datetime The EO time
Table 8alertinfo table
Field name Major key Type Describe
auserid Be varchar(20) User name to be detected
aresult Not varchar(10) This user's testing result
atime Not datetime Detection time
Idiographic flow is shown in figure 10, and step is gone into down:
Step 1. is called Hidden Markov initial model (InitHMM);
Step 2. is opened observed value sequential file ObserveSequence.txt;
It is 25 that step 3. is provided with window size, and step-length is 1;
Step 4. judges whether read in data finishes, if finish then execution in step 8, if do not finish then execution in step 5;
Step 5. is read in the observed value sequence of window size one by one from observed value sequential file OberveSequence.txt;
Step 6. is revised Hidden Markov (ModifyHMM) training pattern;
The amended model parameter of step 7. writes in the Hmm.txt file;
Step 8. is opened observed value sequence NewObserveSequence.txt file to be detected;
Step 9. is called abnormality detection function (Abnormal Detect) with the HMM that trains;
Step 10. judges whether unusually, if unusually then execution in step 11, otherwise execution in step 12;
Step 11. stops user's abnormal behaviour;
Step 12. writes abnormality detection result among the Alert.txt.
Combining of foreground and background interface is shown in figure 11.

Claims (1)

1. BBS user's abnormal behaviour auditing method based on Hidden Markov theory is characterized in that: may further comprise the steps:
Step 1: read Audit data from database, obtain the observed value sequence of behavior to be detected;
Step 2: get trained model parameter from the HMM database read;
Step 3. is utilized the Viterbi algorithm, through observed value sequence computing mode value sequence, is saved in the database;
Step 4. is called forward direction, back to algorithm, calculates the probability that the observed value sequence occurs, and compares with pre-set threshold, is lower than threshold value, gets into step 5, otherwise gets into step 6;
Step 5. is lower than threshold value as abnormal behaviour, produces alarm;
Step 6. normal behaviour, the correction of HMM parameter, and deposit in the Parameter File of HMM;
The described observed value sequence of step 1 is defined as every kind of user and operates in the number of times that carries out in a certain period;
The method that the described Viterbi algorithm use of step 3 is taken the logarithm is amplified the value of probability matrix;
The described state value sequence of step 3 is meant user's behavior frequency;
The call parameters of the result of generation as Baum-Welch calculated to algorithm in the described forward direction of step 4, back, and this parameter employing scale factor method is amplified and reduced;
The said threshold value of step 4 adopts Mean Method to try to achieve, and promptly the average of the probability through this observed value repeatedly occurring is tried to achieve, the observed value probability confirm that concrete grammar is following:
A. random initializtion observed value probability matrix B constitutes the initial model parameter lambda jointly with original state probability vector π that configures and state transition probability matrix A;
B. call the Baum-Welch algorithm; Initial parameter is carried out maximum likelihood estimate, obtain new model parameter
Figure FSB00000304333100011
Figure FSB00000304333100012
that C. will obtain as initial parameter again, the parameter when detecting as abnormal behaviour;
D. when normal behaviour being carried out the model parameter training; Be initial parameter also, and progressively be modified to
Figure FSB00000304333100014
with
Figure FSB00000304333100013
The concrete grammar of the described HMM parameter of step 6 correction is following:
1) π: original state probability vector π=(π 1, π 2..., π N), π wherein i=p (q 1=S i), N=4;
2) state transition probability matrix A
A wherein Ij=p [q T+1=S j| q i=S i], 1≤i, j≤N, the variable that need preserve has the starting point i of state, the terminal point j and a of state IjValue;
3) observed value probability matrix B
B wherein j(k)=p [O k| q t=S j], 1≤j≤N, 1≤k≤T, the variable that need preserve has the starting point j of state, state terminal point k and b j(k) value;
According to the Baum-Welch algorithm; By observed value sequence O and the initial value model λ=(A that chooses; B; π); The revaluation formula is tried to achieve one group of new argument
Figure FSB00000304333100015
and then can be obtained a new model and can prove;
Figure FSB00000304333100021
is better at performance observed value sequence O than λ by
Figure FSB00000304333100022
that the revaluation formula obtains; Then repeat this process; The parameter of improved model progressively; Restrain up to
Figure FSB00000304333100023
; Till just no longer obviously increasing, this moment
Figure FSB00000304333100024
is exactly the model of being asked.
CN2009100127726A 2009-07-28 2009-07-28 BBS user abnormal behavior auditing method based on Hidden Markov theory Expired - Fee Related CN101615186B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100127726A CN101615186B (en) 2009-07-28 2009-07-28 BBS user abnormal behavior auditing method based on Hidden Markov theory

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100127726A CN101615186B (en) 2009-07-28 2009-07-28 BBS user abnormal behavior auditing method based on Hidden Markov theory

Publications (2)

Publication Number Publication Date
CN101615186A CN101615186A (en) 2009-12-30
CN101615186B true CN101615186B (en) 2012-07-04

Family

ID=41494828

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100127726A Expired - Fee Related CN101615186B (en) 2009-07-28 2009-07-28 BBS user abnormal behavior auditing method based on Hidden Markov theory

Country Status (1)

Country Link
CN (1) CN101615186B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106936781A (en) * 2015-12-29 2017-07-07 亿阳安全技术有限公司 A kind of decision method and device of user's operation behavior
CN108108588A (en) * 2014-12-30 2018-06-01 江苏理工学院 A kind of ship conflict method for early warning of Rolling Planning

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101901251B (en) * 2010-06-28 2012-04-11 吉林大学 Method for analyzing and recognizing complex network cluster structure based on markov process metastability
CN104052617A (en) * 2013-03-13 2014-09-17 北京千橡网景科技发展有限公司 Method and device for user behavior analysis based on continuous-time Markov chain
CN103366091B (en) * 2013-07-11 2015-08-26 西安交通大学 Based on the abnormal tax return data detection method of multilevel threshold exponent-weighted average
CN103345590B (en) * 2013-07-22 2016-05-25 电子科技大学 A kind of infection control quality event based on RFID is location and retroactive method fast
CN103400040A (en) * 2013-07-31 2013-11-20 中国人民解放军国防科学技术大学 Fault diagnosis and prediction method utilizing multistep time domain difference value learning
CN104348817B (en) * 2013-08-07 2018-09-28 深圳市腾讯计算机系统有限公司 The guard method of user account number and device
JP2015060675A (en) * 2013-09-18 2015-03-30 ソニー株式会社 Power storage system
CN103631145B (en) * 2013-12-11 2016-08-17 清华大学 Multiple operating modes process monitoring method and system based on monitor control index switching
CN103853841A (en) * 2014-03-19 2014-06-11 北京邮电大学 Method for analyzing abnormal behavior of user in social networking site
CN105787365A (en) * 2014-12-24 2016-07-20 Tcl集团股份有限公司 Malicious application detection method and device
CN104731914A (en) * 2015-03-24 2015-06-24 浪潮集团有限公司 Method for detecting user abnormal behavior based on behavior similarity
CN106815125A (en) * 2015-12-02 2017-06-09 阿里巴巴集团控股有限公司 A kind of log audit method and platform
CN105791286B (en) * 2016-03-01 2018-10-02 上海海事大学 The abnormality detection and processing method of cloud virtual environment
CN106330949B (en) * 2016-09-13 2019-07-16 哈尔滨工程大学 One kind being based on markovian intrusion detection method
CN108256540A (en) * 2016-12-28 2018-07-06 中国移动通信有限公司研究院 A kind of information processing method and system
CN106685996A (en) * 2017-02-23 2017-05-17 上海万雍科技股份有限公司 Method for detecting account abnormal logging based on HMM model
CN108537243B (en) * 2017-03-06 2020-09-11 中国移动通信集团北京有限公司 Violation warning method and device
CN107808168B (en) * 2017-10-31 2023-08-01 北京科技大学 Social network user behavior prediction method based on strong and weak relation
CN109639526A (en) * 2018-12-14 2019-04-16 中国移动通信集团福建有限公司 Network Data Control method, apparatus, equipment and medium
US11336668B2 (en) * 2019-01-14 2022-05-17 Penta Security Systems Inc. Method and apparatus for detecting abnormal behavior of groupware user
CN110633569A (en) * 2019-09-27 2019-12-31 上海赛可出行科技服务有限公司 Hidden Markov model-based user behavior and entity behavior analysis method
CN110912908B (en) * 2019-11-28 2022-08-02 中国电子产品可靠性与环境试验研究所((工业和信息化部电子第五研究所)(中国赛宝实验室)) Network protocol anomaly detection method and device, computer equipment and storage medium
CN111090885A (en) * 2019-12-20 2020-05-01 北京天融信网络安全技术有限公司 User behavior auditing method and device, electronic equipment and storage medium
CN111553726B (en) * 2020-04-22 2023-04-28 上海海事大学 HMM-based bill-of-brush prediction system and method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108108588A (en) * 2014-12-30 2018-06-01 江苏理工学院 A kind of ship conflict method for early warning of Rolling Planning
CN106936781A (en) * 2015-12-29 2017-07-07 亿阳安全技术有限公司 A kind of decision method and device of user's operation behavior
CN106936781B (en) * 2015-12-29 2019-11-15 亿阳安全技术有限公司 A kind of determination method and device of user's operation behavior

Also Published As

Publication number Publication date
CN101615186A (en) 2009-12-30

Similar Documents

Publication Publication Date Title
CN101615186B (en) BBS user abnormal behavior auditing method based on Hidden Markov theory
CN101222348B (en) Method and system for calculating number of website real user
Domingos et al. Mining the network value of customers
CN101166159B (en) A method and system for identifying rubbish information
Sun et al. Hiding sensitive frequent itemsets by a border-based approach
CN105373614A (en) Sub-user identification method and system based on user account
Althebyan et al. A knowledge-base model for insider threat prediction
CN102654864A (en) Independent transparent security audit protection method facing real-time database
Takemura et al. Tweet classification based on their lifetime duration
Palma et al. A robust optimization approach protected harvest scheduling decisions against uncertainty
Zhan et al. Anomaly detection in dynamic systems using weak estimators
CN111582955A (en) Promotion information display method and device, electronic equipment and storage medium
Lin et al. Fault diagnosis model based on Bayesian network considering information uncertainty and its application in traction power supply system
Fukuda et al. Estimating the bot population on Twitter via random walk based sampling
Zhang et al. SKIF: a data imputation framework for concept drifting data streams
Lane Optimizing the use of micro-data: an overview of the issues
Wan et al. Link-based event detection in email communication networks
Otgonbayar et al. $ X-BAND $: Expiration Band for Anonymizing Varied Data Streams
CN116401639A (en) Big data-based computer network security supervision system and method
West et al. Autonomous link spam detection in purely collaborative environments
Sloothaak et al. Robustness of power-law behavior in cascading line failure models
CN114118880A (en) Method and system for identifying consignment risk figure, electronic device and storage medium
De Choudhury et al. Multi-scale characterization of social network dynamics in the blogosphere
Hauffa et al. A Comparative Temporal Analysis of User-Content-Interaction in Social Media
Hu Data mining in the application of criminal cases based on decision tree

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120704

Termination date: 20140728

EXPY Termination of patent right or utility model