CN107623688A - User network security configuration recommends method - Google Patents
User network security configuration recommends method Download PDFInfo
- Publication number
- CN107623688A CN107623688A CN201710838371.0A CN201710838371A CN107623688A CN 107623688 A CN107623688 A CN 107623688A CN 201710838371 A CN201710838371 A CN 201710838371A CN 107623688 A CN107623688 A CN 107623688A
- Authority
- CN
- China
- Prior art keywords
- module
- user
- matrix
- data processing
- business
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The invention discloses a kind of user network security configuration to recommend method, including user's group, business module, data processing module, timer module and management control module;Comprise the following steps:(1 1) business module carries out data preparation by " the user security item usage log " of timer periodic collection user's group;The data that (1 2) data processing module puts business module in order carry out analysis calculating, obtain matrix of consequence;The result of acquisition and predetermined threshold value are carried out com-parison and analysis by (1 3) data processing module, and final result matrix is transmitted into business module;(1 4) business module is recommended and reminded to user according to the content of matrix of consequence;(1 5) record to integral device running situation, and carry out operation next time for integral device and prepare.The present invention has the characteristics of security service that may can be used to user in real time is predicted and recommended.
Description
Technical field
The present invention relates to network security to match somebody with somebody technical field, recommends method more particularly, to a kind of user network security configuration.
Background technology
In current numerous and diverse network world, various safety problems are flooded with network world, for above-mentioned threat,
People are on the defensive and handled by a variety of network services, however, the configuration of complicated various network securitys for
The common network user is excessively cumbersome and complicated, and the network security configuration for different user is ten in current network environment
Divide necessary.
Traditional solution:There are two kinds currently for the primary solutions of network security configuration, specialty safety personnel enter
Row management, or configuration secure item as much as possible, above two method will not only expend very high expense, and not possess
The ability of real-time update, and substantial amounts of unnecessary user resources can be consumed.
The content of the invention
The goal of the invention of the present invention is to overcome network security configuration solution of the prior art to expend high expense
With, poor real, the deficiency of a large number of users resource is consumed, there is provided a kind of user network security configuration recommends method.
To achieve these goals, the present invention uses following technical scheme:
A kind of user network security configuration recommends method, including user's group, business module, data processing module, timer
Module and management control module;
Comprise the following steps:
(1-1) business module is by " the user security item usage log " of timer periodic collection user's group, line number of going forward side by side
According to arrangement;
The data that (1-2) data processing module puts business module in order carry out analysis calculating, obtain matrix of consequence;
The result of acquisition and predetermined threshold value are carried out com-parison and analysis by (1-3) data processing module, and final result matrix is passed
To business module;
(1-4) business module is recommended and reminded to user according to the content of matrix of consequence;
(1-5) records to integral device running situation, and carries out operation next time for integral device and prepare.
The present invention is for different user, the security service used according to active user, the peace that may be used to user in real time
Full service is predicted and recommended, so as to prevent user may due to not configuring some secure item and by network harm,
Preferably, step (1-1) comprises the following steps:
Timer configuration is passed to timer, management control by administrator configurations management control module, management control module
Module will recommend threshold value F configurations to pass to business module, and iterations N is decomposed dimension K, step rate α by management control module
Data processing module is passed to learning rate λ, management control module sends signal, opening timing device to timer module;
When timer reaches preset time, timer module sends timeout signal, and business module starts perform prediction industry
Business function;
User security configuration information is read business module by business module by reading configuration file, using network transmission
It is local;
Business module is local to business module using network transmission by reading " user security item usage log ";
Business module is extracted the log information got, and secure item call number in daily record is arranged, obtained
To the data of arrangement;
Business module establishes user-project matrix R using user's group U as row, the secure item S of each user's group as row
(U, S);
The data of arrangement are inserted matrix R (U, S) by business module;
Matrix R (U, S) is used as data source by network delivery to data processing module by business module;
Data processing module establishes matrix P (U, K) and matrix Q (K, S) according to matrix R (U, S) and K.
Preferably, step (1-2) comprises the following steps:
(3-1) data processing module carries out random initializtion using Random () function pair P (U, K) and Q (K, S);
(3-2) data processing module reads matrix R (U, S) each single item R (i, j), utilizes formula Calculate user i secure item j current iteration error e (i, j):
(3-3) data processing module is iterated using e (i, j) to P (U, K) and Q (K, S), i.e., for each single item P (i,
K) with Q (k, j), P (i, k) is made to increase α (e (i, k) × Q (k, j)-λ (P (i, k))),
Q (k, j) increase α (e (i, k) × P (i, k)-λ (Q (k, j)));
(3-4) data processing module uses
Observe each iteration
Error transfer factor result, e (step) change curve is drawn and recorded using Matlab;
(3-5) is not converged as P (U, K) and Q (K, S), return to step (3-2);Otherwise, it is transferred to step (3-6);
(3-6) data processing module predicted by calculating R ' (U, S)=P (U, K) × Q (K, S) after matrix R ' (U,
S);
(3-7) data processing module establishes new matrix A (U, S), and is 0 by matrix initialisation;
(3-8) data processing module compares matrix R ' (U, S) and original matrix R (U, S), for each in two matrixes
Item R (i, j) and R ' (i, j), formula e (i, j)=R ' (i, j)-R (i, j) is utilized to calculate e (i, j).
Preferably, step (1-3) comprises the following steps:
Data processing module compared with F, for e (i, j) > F, matrix A (U, S) is corresponded to each single item e (i, j)
Position A (i, j) put 1;
Data processing module is by A (U, S) by network delivery to business module;
Business module is parsed to the matrix A (U, S) received.
Preferably, step (1-4) comprises the following steps:
Business module is recorded the item A (i, j) that 1 is put in matrix A (U, S), and the meaning that wherein A (i, j) puts 1 is user
I secure item j is highly desirable and is configured without;
Business module puts 1 by network recommendation to corresponding user by what business module recorded;
Business module is sent to management control module by signal is completed.
Preferably, step (1-5) comprises the following steps:
Management control module receives the signal of business module, and for the information of statistical service module, and transmission timer is read
Take signal-obtaining timer;
Timer signal is read in timer module response, and current time T is sent into management control module by network;
The time T read recorded local system and counted by management module;
Management control module passes through network transmission timer reset signal;
Timer module receives reset signal, and timer is reset.
Therefore, the present invention has the advantages that:For different user, the safety clothes that can be used according to active user
Business, the security service that may be used to user in real time are predicted and recommended, may be due to not configuring some so as to prevent user
Secure item and by network harm.
Brief description of the drawings
Fig. 1 is a kind of structure chart of the present invention;
Fig. 2 is a kind of flow chart of the present invention.
Embodiment
The present invention will be further described with reference to the accompanying drawings and detailed description.
Embodiment as described in Figure 1 is that a kind of user network security configuration recommends method, including user's group, business module,
Data processing module, timer module and management control module;
Comprise the following steps:
Step 100, business module is by " the user security item usage log " of timer periodic collection user's group, and carries out
Data preparation;
Timer configuration is passed to timer, management control by administrator configurations management control module, management control module
Module will recommend threshold value F configurations to pass to business module, and iterations N is decomposed dimension K, step rate α by management control module
Data processing module is passed to learning rate λ, management control module sends signal, opening timing device to timer module;
When timer reaches preset time, timer module sends timeout signal, and business module starts perform prediction industry
Business function;
User security configuration information is read business module by business module by reading configuration file, using network transmission
It is local;
Business module is local to business module using network transmission by reading " user security item usage log ";
Business module is extracted the log information got, and secure item call number in daily record is arranged, obtained
To the data of arrangement;
Business module establishes user-project matrix R using user's group U as row, the secure item S of each user's group as row
(U, S);
The data of arrangement are inserted matrix R (U, S) by business module;
Matrix R (U, S) is used as data source by network delivery to data processing module by business module;
Data processing module establishes matrix P (U, K) and matrix Q (K, S) according to matrix R (U, S) and K.
Step 200, the data that data processing module puts business module in order carry out analysis calculating, obtain matrix of consequence;
Step 210, data processing module carries out random initializtion using Random () function pair P (U, K) and Q (K, S);
Step 220, data processing module reads matrix R (U, S) each single item R (i, j), utilizes formulaCalculate user i secure item j current iteration error e (i, j);
Step 230, data processing module is iterated using e (i, j) to P (U, K) and Q (K, S), i.e., for each single item P
(i, k) and Q (k, j), makes P (i, k) α (e (i, k) × Q (k, j)-λ (P (i are increased, k))) .Q (k, j) increases such as α (e (i, k) × P
(i, k)-λ (Q (k, j)));
Step 240, data processing module uses
Observe each iteration
Error transfer factor result, e (step) change curve is drawn and recorded using Matlab;
Step 250, when P (U, K) and Q (K, S) are not converged, return to step step 220;Otherwise, it is transferred to step 260;
Step 260, the matrix R ' after data processing module is predicted by calculating R ' (U, S)=P (U, K) × Q (K, S)
(U, S);
Step 270, data processing module establishes new matrix A (U, S), and is 0 by matrix initialisation;
Step 280, data processing module compares matrix R ' (U, S) and original matrix R (U, S), in two matrixes
Each single item R (i, j) and R ' (i, j), e (i, j) is calculated using formula e (i, j)=R ' (i, j)-R (i, j).
Step 300, the result of acquisition and predetermined threshold value are carried out com-parison and analysis by data processing module, by final result matrix
It is transmitted to business module;
Data processing module compared with F, for e (i, j) > F, matrix A (U, S) is corresponded to each single item e (i, j)
Position A (i, j) put 1;
Data processing module is by A (U, S) by network delivery to business module;
Business module is parsed to the matrix A (U, S) received.
Step 400, business module is recommended and reminded to user according to the content of matrix of consequence
Business module is recorded the item A (i, j) that 1 is put in matrix A (U, S), and the meaning that wherein A (i, j) puts 1 is user
I secure item j is highly desirable and is configured without;
Business module puts 1 by network recommendation to corresponding user by what business module recorded;
Business module is sent to management control module by signal is completed.
Step 500, integral device running situation is recorded, and carries out operation next time for integral device and prepare
Management control module receives the signal of business module, and for the information of statistical service module, and transmission timer is read
Take signal-obtaining timer;
Timer signal is read in timer module response, and current time T is sent into management control module by network;
The time T read recorded local system and counted by management module;
Management control module passes through network transmission timer reset signal;
Timer module receives reset signal, and timer is reset.
It should be understood that the present embodiment is only illustrative of the invention and is not intended to limit the scope of the invention.In addition, it is to be understood that
After having read the content of the invention lectured, those skilled in the art can make various changes or modifications to the present invention, these etc.
Valency form equally falls within the application appended claims limited range.
Claims (6)
1. a kind of user network security configuration recommends method, it is characterized in that, including user's group, business module, data processing module,
Timer module and management control module;
Comprise the following steps:
(1-1) business module is by " the user security item usage log " of timer periodic collection user's group, and it is whole to carry out data
Reason;
The data that (1-2) data processing module puts business module in order carry out analysis calculating, obtain matrix of consequence;
The result of acquisition and predetermined threshold value are carried out com-parison and analysis by (1-3) data processing module, and final result matrix is transmitted into industry
Business module;
(1-4) business module is recommended and reminded to user according to the content of matrix of consequence;
(1-5) records to integral device running situation, and carries out operation next time for integral device and prepare.
2. user network security configuration according to claim 1 recommends method, it is characterized in that, step (1-1) includes as follows
Step:
Timer configuration is passed to timer, management control module by administrator configurations management control module, management control module
Threshold value F configurations will be recommended to pass to business module, iterations N is decomposed dimension K, step rate α and by management control module
Practise speed λ and pass to data processing module, management control module sends signal, opening timing device to timer module;
When timer reaches preset time, timer module sends timeout signal, and business module starts perform prediction business work(
Energy;
User security configuration information is read business module sheet by business module by reading configuration file, using network transmission
Ground;
Business module is local to business module using network transmission by reading " user security item usage log ";
Business module is extracted the log information got, and secure item call number in daily record is arranged, obtained whole
The data of reason;
Business module using user's group U as row, the secure item S of each user's group as row, establish user-project matrix R (U,
S);
The data of arrangement are inserted matrix R (U, S) by business module;
Matrix R (U, S) is used as data source by network delivery to data processing module by business module;
Data processing module establishes matrix P (U, K) and matrix Q (K, S) according to matrix R (U, S) and K.
3. user network security configuration according to claim 2 recommends method, it is characterized in that, step (1-2) includes as follows
Step:
(3-1) data processing module carries out random initializtion using Random () function pair P (U, K) and Q (K, S);
(3-2) data processing module reads matrix R (U, S) each single item R (i, j), utilizes formula Calculate user i secure item j current iteration error e (i, j);
(3-3) data processing module is iterated using e (i, j) to P (U, K) and Q (K, S), i.e., for each single item P (i, k) and Q
(k, j), make P (i, k) increase α (e (i, k) × Q (k, j)-λ (P (i, k))), Q (k, j) α (e (i, k) × P (i, k)-λ (Q are increased
(k, j)));
(3-4) data processing module uses
Observe the mistake of each iteration
The result of difference adjustment, is drawn and is recorded to e (step) change curve using Matlab;
(3-5) is not converged as P (U, K) and Q (K, S), return to step (3-2);Otherwise, it is transferred to step (3-6);
(3-6) data processing module predicted by calculating R ' (U, S)=P (U, K) × Q (K, S) after matrix R ' (U, S);
(3-7) data processing module establishes new matrix A (U, S), and is 0 by matrix initialisation;
(3-8) data processing module compares matrix R ' (U, S) and original matrix R (U, S), for each single item R in two matrixes
(i, j) and R ' (i, j), e (i, j) is calculated using formula e (i, j)=R ' (i, j)-R (i, j).
4. user network security configuration according to claim 2 recommends method, it is characterized in that, step (1-3) includes as follows
Step:
Data processing module by each single item e (i, j) compared with F, for e (i, j) > F, by position corresponding to matrix A (U, S)
Put A (i, j) and put 1;
Data processing module is by A (U, S) by network delivery to business module;
Business module is parsed to the matrix A (U, S) received.
5. user network security configuration according to claim 1 recommends method, it is characterized in that, step (1-4) includes as follows
Step:
Business module is recorded the item A (i, j) that 1 is put in matrix A (U, S), and the meaning that wherein A (i, j) puts 1 is user i's
Secure item j is highly desirable and is configured without;
Business module puts 1 by network recommendation to corresponding user by what business module recorded:
Business module is sent to management control module by signal is completed.
6. user network security configuration according to claim 1 recommends method, it is characterized in that, step (1-5) includes as follows
Step:
Management control module receives the signal of business module, and for the information of statistical service module, and transmission timer reads letter
Number reading timer;
Timer signal is read in timer module response, and current time T is sent into management control module by network;
The time T read recorded local system and counted by management module;
Management control module passes through network transmission timer reset signal;
Timer module receives reset signal, and timer is reset.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710838371.0A CN107623688B (en) | 2017-09-15 | 2017-09-15 | User network security configuration recommended method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710838371.0A CN107623688B (en) | 2017-09-15 | 2017-09-15 | User network security configuration recommended method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107623688A true CN107623688A (en) | 2018-01-23 |
CN107623688B CN107623688B (en) | 2019-11-19 |
Family
ID=61090084
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710838371.0A Active CN107623688B (en) | 2017-09-15 | 2017-09-15 | User network security configuration recommended method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107623688B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110106817A1 (en) * | 2009-10-30 | 2011-05-05 | Rong Pan | Methods and systems for determining unknowns in collaborative filtering |
CN103020163A (en) * | 2012-11-26 | 2013-04-03 | 南京大学 | Node-similarity-based network community division method in network |
CN105183727A (en) * | 2014-05-29 | 2015-12-23 | 上海研深信息科技有限公司 | Method and system for recommending book |
CN105550240A (en) * | 2015-11-30 | 2016-05-04 | 浪潮通用软件有限公司 | Recommendation method and recommendation device |
CN106157156A (en) * | 2016-07-29 | 2016-11-23 | 电子科技大学 | A kind of cooperation recommending system based on communities of users |
-
2017
- 2017-09-15 CN CN201710838371.0A patent/CN107623688B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110106817A1 (en) * | 2009-10-30 | 2011-05-05 | Rong Pan | Methods and systems for determining unknowns in collaborative filtering |
CN103020163A (en) * | 2012-11-26 | 2013-04-03 | 南京大学 | Node-similarity-based network community division method in network |
CN105183727A (en) * | 2014-05-29 | 2015-12-23 | 上海研深信息科技有限公司 | Method and system for recommending book |
CN105550240A (en) * | 2015-11-30 | 2016-05-04 | 浪潮通用软件有限公司 | Recommendation method and recommendation device |
CN106157156A (en) * | 2016-07-29 | 2016-11-23 | 电子科技大学 | A kind of cooperation recommending system based on communities of users |
Also Published As
Publication number | Publication date |
---|---|
CN107623688B (en) | 2019-11-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102624705B (en) | A kind of intelligent image verification method and system | |
EP4020349A1 (en) | Risk control method, computer device, and readable storage medium | |
CN107733851A (en) | DNS tunnels Trojan detecting method based on communication behavior analysis | |
CN108428141A (en) | A kind of foodstuff traceability information management system based on ERP system Yu block chain | |
CN112468347B (en) | Security management method and device for cloud platform, electronic equipment and storage medium | |
Tseng et al. | Fraudetector: A graph-mining-based framework for fraudulent phone call detection | |
CN106888194A (en) | Intelligent grid IT assets security monitoring systems based on distributed scheduling | |
CN103617279A (en) | Method for achieving microblog information spreading influence assessment model on basis of Pagerank method | |
CN104580222A (en) | DDoS attack distributed detection and response system and method based on information entropy | |
CN103338451B (en) | Distributed malicious node detection method in a kind of wireless sensor network | |
CN106162584A (en) | Identify the method for refuse messages, client, cloud server and system | |
Li et al. | Modeling and performance analysis of information diffusion under information overload in Facebook‐like social networks | |
TWI698102B (en) | Threat detection system for mobile communication system, and global device and local device thereof | |
CN111652732A (en) | Bit currency abnormal transaction entity identification method based on transaction graph matching | |
CN105871585A (en) | Terminal association method and device | |
CN109284075A (en) | A kind of measures and procedures for the examination and approval of print request, storage medium and server | |
CN107016272A (en) | A kind of high anti-information of security performance loses telecommunications transaction login system | |
CN105933316A (en) | Network security level determination method and device | |
CN114663104A (en) | PBFT based on block chain product supply chain tracing | |
CN107040532B (en) | Data evaluation device using verification code for verification | |
CN109561100A (en) | Method and system based on the distributed duplexing energized network attacking and defending with artificial intelligence | |
Jin et al. | Byzantine-robust and efficient federated learning for the internet of things | |
CN107623688A (en) | User network security configuration recommends method | |
Kesidis | An introduction to communication network analysis | |
CN110569357A (en) | method and device for constructing mail classification model, terminal equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address | ||
CP03 | Change of name, title or address |
Address after: 310000 Rooms 103-27, Building 19, No. 1399, Liangmu Road, Cangqian Street, Yuhang District, Hangzhou, Zhejiang Patentee after: Hangzhou Meichuang Technology Co.,Ltd. Address before: 12 / F, building 7, Tianxing International Center, 508 Fengtan Road, Gongshu District, Hangzhou City, Zhejiang Province 310011 Patentee before: HANGZHOU MEICHUANG TECHNOLOGY CO.,LTD. |