CN107623688A - User network security configuration recommends method - Google Patents

User network security configuration recommends method Download PDF

Info

Publication number
CN107623688A
CN107623688A CN201710838371.0A CN201710838371A CN107623688A CN 107623688 A CN107623688 A CN 107623688A CN 201710838371 A CN201710838371 A CN 201710838371A CN 107623688 A CN107623688 A CN 107623688A
Authority
CN
China
Prior art keywords
module
user
matrix
data processing
business
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710838371.0A
Other languages
Chinese (zh)
Other versions
CN107623688B (en
Inventor
杜景宇
闻建霞
柳遵梁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Meichuang Technology Co ltd
Original Assignee
Hangzhou Meichuang Science & Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Meichuang Science & Technology Co Ltd filed Critical Hangzhou Meichuang Science & Technology Co Ltd
Priority to CN201710838371.0A priority Critical patent/CN107623688B/en
Publication of CN107623688A publication Critical patent/CN107623688A/en
Application granted granted Critical
Publication of CN107623688B publication Critical patent/CN107623688B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of user network security configuration to recommend method, including user's group, business module, data processing module, timer module and management control module;Comprise the following steps:(1 1) business module carries out data preparation by " the user security item usage log " of timer periodic collection user's group;The data that (1 2) data processing module puts business module in order carry out analysis calculating, obtain matrix of consequence;The result of acquisition and predetermined threshold value are carried out com-parison and analysis by (1 3) data processing module, and final result matrix is transmitted into business module;(1 4) business module is recommended and reminded to user according to the content of matrix of consequence;(1 5) record to integral device running situation, and carry out operation next time for integral device and prepare.The present invention has the characteristics of security service that may can be used to user in real time is predicted and recommended.

Description

User network security configuration recommends method
Technical field
The present invention relates to network security to match somebody with somebody technical field, recommends method more particularly, to a kind of user network security configuration.
Background technology
In current numerous and diverse network world, various safety problems are flooded with network world, for above-mentioned threat, People are on the defensive and handled by a variety of network services, however, the configuration of complicated various network securitys for The common network user is excessively cumbersome and complicated, and the network security configuration for different user is ten in current network environment Divide necessary.
Traditional solution:There are two kinds currently for the primary solutions of network security configuration, specialty safety personnel enter Row management, or configuration secure item as much as possible, above two method will not only expend very high expense, and not possess The ability of real-time update, and substantial amounts of unnecessary user resources can be consumed.
The content of the invention
The goal of the invention of the present invention is to overcome network security configuration solution of the prior art to expend high expense With, poor real, the deficiency of a large number of users resource is consumed, there is provided a kind of user network security configuration recommends method.
To achieve these goals, the present invention uses following technical scheme:
A kind of user network security configuration recommends method, including user's group, business module, data processing module, timer Module and management control module;
Comprise the following steps:
(1-1) business module is by " the user security item usage log " of timer periodic collection user's group, line number of going forward side by side According to arrangement;
The data that (1-2) data processing module puts business module in order carry out analysis calculating, obtain matrix of consequence;
The result of acquisition and predetermined threshold value are carried out com-parison and analysis by (1-3) data processing module, and final result matrix is passed To business module;
(1-4) business module is recommended and reminded to user according to the content of matrix of consequence;
(1-5) records to integral device running situation, and carries out operation next time for integral device and prepare.
The present invention is for different user, the security service used according to active user, the peace that may be used to user in real time Full service is predicted and recommended, so as to prevent user may due to not configuring some secure item and by network harm,
Preferably, step (1-1) comprises the following steps:
Timer configuration is passed to timer, management control by administrator configurations management control module, management control module Module will recommend threshold value F configurations to pass to business module, and iterations N is decomposed dimension K, step rate α by management control module Data processing module is passed to learning rate λ, management control module sends signal, opening timing device to timer module;
When timer reaches preset time, timer module sends timeout signal, and business module starts perform prediction industry Business function;
User security configuration information is read business module by business module by reading configuration file, using network transmission It is local;
Business module is local to business module using network transmission by reading " user security item usage log ";
Business module is extracted the log information got, and secure item call number in daily record is arranged, obtained To the data of arrangement;
Business module establishes user-project matrix R using user's group U as row, the secure item S of each user's group as row (U, S);
The data of arrangement are inserted matrix R (U, S) by business module;
Matrix R (U, S) is used as data source by network delivery to data processing module by business module;
Data processing module establishes matrix P (U, K) and matrix Q (K, S) according to matrix R (U, S) and K.
Preferably, step (1-2) comprises the following steps:
(3-1) data processing module carries out random initializtion using Random () function pair P (U, K) and Q (K, S);
(3-2) data processing module reads matrix R (U, S) each single item R (i, j), utilizes formula Calculate user i secure item j current iteration error e (i, j):
(3-3) data processing module is iterated using e (i, j) to P (U, K) and Q (K, S), i.e., for each single item P (i, K) with Q (k, j), P (i, k) is made to increase α (e (i, k) × Q (k, j)-λ (P (i, k))),
Q (k, j) increase α (e (i, k) × P (i, k)-λ (Q (k, j)));
(3-4) data processing module uses
Observe each iteration Error transfer factor result, e (step) change curve is drawn and recorded using Matlab;
(3-5) is not converged as P (U, K) and Q (K, S), return to step (3-2);Otherwise, it is transferred to step (3-6);
(3-6) data processing module predicted by calculating R ' (U, S)=P (U, K) × Q (K, S) after matrix R ' (U, S);
(3-7) data processing module establishes new matrix A (U, S), and is 0 by matrix initialisation;
(3-8) data processing module compares matrix R ' (U, S) and original matrix R (U, S), for each in two matrixes Item R (i, j) and R ' (i, j), formula e (i, j)=R ' (i, j)-R (i, j) is utilized to calculate e (i, j).
Preferably, step (1-3) comprises the following steps:
Data processing module compared with F, for e (i, j) > F, matrix A (U, S) is corresponded to each single item e (i, j) Position A (i, j) put 1;
Data processing module is by A (U, S) by network delivery to business module;
Business module is parsed to the matrix A (U, S) received.
Preferably, step (1-4) comprises the following steps:
Business module is recorded the item A (i, j) that 1 is put in matrix A (U, S), and the meaning that wherein A (i, j) puts 1 is user I secure item j is highly desirable and is configured without;
Business module puts 1 by network recommendation to corresponding user by what business module recorded;
Business module is sent to management control module by signal is completed.
Preferably, step (1-5) comprises the following steps:
Management control module receives the signal of business module, and for the information of statistical service module, and transmission timer is read Take signal-obtaining timer;
Timer signal is read in timer module response, and current time T is sent into management control module by network;
The time T read recorded local system and counted by management module;
Management control module passes through network transmission timer reset signal;
Timer module receives reset signal, and timer is reset.
Therefore, the present invention has the advantages that:For different user, the safety clothes that can be used according to active user Business, the security service that may be used to user in real time are predicted and recommended, may be due to not configuring some so as to prevent user Secure item and by network harm.
Brief description of the drawings
Fig. 1 is a kind of structure chart of the present invention;
Fig. 2 is a kind of flow chart of the present invention.
Embodiment
The present invention will be further described with reference to the accompanying drawings and detailed description.
Embodiment as described in Figure 1 is that a kind of user network security configuration recommends method, including user's group, business module, Data processing module, timer module and management control module;
Comprise the following steps:
Step 100, business module is by " the user security item usage log " of timer periodic collection user's group, and carries out Data preparation;
Timer configuration is passed to timer, management control by administrator configurations management control module, management control module Module will recommend threshold value F configurations to pass to business module, and iterations N is decomposed dimension K, step rate α by management control module Data processing module is passed to learning rate λ, management control module sends signal, opening timing device to timer module;
When timer reaches preset time, timer module sends timeout signal, and business module starts perform prediction industry Business function;
User security configuration information is read business module by business module by reading configuration file, using network transmission It is local;
Business module is local to business module using network transmission by reading " user security item usage log ";
Business module is extracted the log information got, and secure item call number in daily record is arranged, obtained To the data of arrangement;
Business module establishes user-project matrix R using user's group U as row, the secure item S of each user's group as row (U, S);
The data of arrangement are inserted matrix R (U, S) by business module;
Matrix R (U, S) is used as data source by network delivery to data processing module by business module;
Data processing module establishes matrix P (U, K) and matrix Q (K, S) according to matrix R (U, S) and K.
Step 200, the data that data processing module puts business module in order carry out analysis calculating, obtain matrix of consequence;
Step 210, data processing module carries out random initializtion using Random () function pair P (U, K) and Q (K, S);
Step 220, data processing module reads matrix R (U, S) each single item R (i, j), utilizes formulaCalculate user i secure item j current iteration error e (i, j);
Step 230, data processing module is iterated using e (i, j) to P (U, K) and Q (K, S), i.e., for each single item P (i, k) and Q (k, j), makes P (i, k) α (e (i, k) × Q (k, j)-λ (P (i are increased, k))) .Q (k, j) increases such as α (e (i, k) × P (i, k)-λ (Q (k, j)));
Step 240, data processing module uses
Observe each iteration Error transfer factor result, e (step) change curve is drawn and recorded using Matlab;
Step 250, when P (U, K) and Q (K, S) are not converged, return to step step 220;Otherwise, it is transferred to step 260;
Step 260, the matrix R ' after data processing module is predicted by calculating R ' (U, S)=P (U, K) × Q (K, S) (U, S);
Step 270, data processing module establishes new matrix A (U, S), and is 0 by matrix initialisation;
Step 280, data processing module compares matrix R ' (U, S) and original matrix R (U, S), in two matrixes Each single item R (i, j) and R ' (i, j), e (i, j) is calculated using formula e (i, j)=R ' (i, j)-R (i, j).
Step 300, the result of acquisition and predetermined threshold value are carried out com-parison and analysis by data processing module, by final result matrix It is transmitted to business module;
Data processing module compared with F, for e (i, j) > F, matrix A (U, S) is corresponded to each single item e (i, j) Position A (i, j) put 1;
Data processing module is by A (U, S) by network delivery to business module;
Business module is parsed to the matrix A (U, S) received.
Step 400, business module is recommended and reminded to user according to the content of matrix of consequence
Business module is recorded the item A (i, j) that 1 is put in matrix A (U, S), and the meaning that wherein A (i, j) puts 1 is user I secure item j is highly desirable and is configured without;
Business module puts 1 by network recommendation to corresponding user by what business module recorded;
Business module is sent to management control module by signal is completed.
Step 500, integral device running situation is recorded, and carries out operation next time for integral device and prepare
Management control module receives the signal of business module, and for the information of statistical service module, and transmission timer is read Take signal-obtaining timer;
Timer signal is read in timer module response, and current time T is sent into management control module by network;
The time T read recorded local system and counted by management module;
Management control module passes through network transmission timer reset signal;
Timer module receives reset signal, and timer is reset.
It should be understood that the present embodiment is only illustrative of the invention and is not intended to limit the scope of the invention.In addition, it is to be understood that After having read the content of the invention lectured, those skilled in the art can make various changes or modifications to the present invention, these etc. Valency form equally falls within the application appended claims limited range.

Claims (6)

1. a kind of user network security configuration recommends method, it is characterized in that, including user's group, business module, data processing module, Timer module and management control module;
Comprise the following steps:
(1-1) business module is by " the user security item usage log " of timer periodic collection user's group, and it is whole to carry out data Reason;
The data that (1-2) data processing module puts business module in order carry out analysis calculating, obtain matrix of consequence;
The result of acquisition and predetermined threshold value are carried out com-parison and analysis by (1-3) data processing module, and final result matrix is transmitted into industry Business module;
(1-4) business module is recommended and reminded to user according to the content of matrix of consequence;
(1-5) records to integral device running situation, and carries out operation next time for integral device and prepare.
2. user network security configuration according to claim 1 recommends method, it is characterized in that, step (1-1) includes as follows Step:
Timer configuration is passed to timer, management control module by administrator configurations management control module, management control module Threshold value F configurations will be recommended to pass to business module, iterations N is decomposed dimension K, step rate α and by management control module Practise speed λ and pass to data processing module, management control module sends signal, opening timing device to timer module;
When timer reaches preset time, timer module sends timeout signal, and business module starts perform prediction business work( Energy;
User security configuration information is read business module sheet by business module by reading configuration file, using network transmission Ground;
Business module is local to business module using network transmission by reading " user security item usage log ";
Business module is extracted the log information got, and secure item call number in daily record is arranged, obtained whole The data of reason;
Business module using user's group U as row, the secure item S of each user's group as row, establish user-project matrix R (U, S);
The data of arrangement are inserted matrix R (U, S) by business module;
Matrix R (U, S) is used as data source by network delivery to data processing module by business module;
Data processing module establishes matrix P (U, K) and matrix Q (K, S) according to matrix R (U, S) and K.
3. user network security configuration according to claim 2 recommends method, it is characterized in that, step (1-2) includes as follows Step:
(3-1) data processing module carries out random initializtion using Random () function pair P (U, K) and Q (K, S);
(3-2) data processing module reads matrix R (U, S) each single item R (i, j), utilizes formula Calculate user i secure item j current iteration error e (i, j);
(3-3) data processing module is iterated using e (i, j) to P (U, K) and Q (K, S), i.e., for each single item P (i, k) and Q (k, j), make P (i, k) increase α (e (i, k) × Q (k, j)-λ (P (i, k))), Q (k, j) α (e (i, k) × P (i, k)-λ (Q are increased (k, j)));
(3-4) data processing module uses
Observe the mistake of each iteration The result of difference adjustment, is drawn and is recorded to e (step) change curve using Matlab;
(3-5) is not converged as P (U, K) and Q (K, S), return to step (3-2);Otherwise, it is transferred to step (3-6);
(3-6) data processing module predicted by calculating R ' (U, S)=P (U, K) × Q (K, S) after matrix R ' (U, S);
(3-7) data processing module establishes new matrix A (U, S), and is 0 by matrix initialisation;
(3-8) data processing module compares matrix R ' (U, S) and original matrix R (U, S), for each single item R in two matrixes (i, j) and R ' (i, j), e (i, j) is calculated using formula e (i, j)=R ' (i, j)-R (i, j).
4. user network security configuration according to claim 2 recommends method, it is characterized in that, step (1-3) includes as follows Step:
Data processing module by each single item e (i, j) compared with F, for e (i, j) > F, by position corresponding to matrix A (U, S) Put A (i, j) and put 1;
Data processing module is by A (U, S) by network delivery to business module;
Business module is parsed to the matrix A (U, S) received.
5. user network security configuration according to claim 1 recommends method, it is characterized in that, step (1-4) includes as follows Step:
Business module is recorded the item A (i, j) that 1 is put in matrix A (U, S), and the meaning that wherein A (i, j) puts 1 is user i's Secure item j is highly desirable and is configured without;
Business module puts 1 by network recommendation to corresponding user by what business module recorded:
Business module is sent to management control module by signal is completed.
6. user network security configuration according to claim 1 recommends method, it is characterized in that, step (1-5) includes as follows Step:
Management control module receives the signal of business module, and for the information of statistical service module, and transmission timer reads letter Number reading timer;
Timer signal is read in timer module response, and current time T is sent into management control module by network;
The time T read recorded local system and counted by management module;
Management control module passes through network transmission timer reset signal;
Timer module receives reset signal, and timer is reset.
CN201710838371.0A 2017-09-15 2017-09-15 User network security configuration recommended method Active CN107623688B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710838371.0A CN107623688B (en) 2017-09-15 2017-09-15 User network security configuration recommended method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710838371.0A CN107623688B (en) 2017-09-15 2017-09-15 User network security configuration recommended method

Publications (2)

Publication Number Publication Date
CN107623688A true CN107623688A (en) 2018-01-23
CN107623688B CN107623688B (en) 2019-11-19

Family

ID=61090084

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710838371.0A Active CN107623688B (en) 2017-09-15 2017-09-15 User network security configuration recommended method

Country Status (1)

Country Link
CN (1) CN107623688B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110106817A1 (en) * 2009-10-30 2011-05-05 Rong Pan Methods and systems for determining unknowns in collaborative filtering
CN103020163A (en) * 2012-11-26 2013-04-03 南京大学 Node-similarity-based network community division method in network
CN105183727A (en) * 2014-05-29 2015-12-23 上海研深信息科技有限公司 Method and system for recommending book
CN105550240A (en) * 2015-11-30 2016-05-04 浪潮通用软件有限公司 Recommendation method and recommendation device
CN106157156A (en) * 2016-07-29 2016-11-23 电子科技大学 A kind of cooperation recommending system based on communities of users

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110106817A1 (en) * 2009-10-30 2011-05-05 Rong Pan Methods and systems for determining unknowns in collaborative filtering
CN103020163A (en) * 2012-11-26 2013-04-03 南京大学 Node-similarity-based network community division method in network
CN105183727A (en) * 2014-05-29 2015-12-23 上海研深信息科技有限公司 Method and system for recommending book
CN105550240A (en) * 2015-11-30 2016-05-04 浪潮通用软件有限公司 Recommendation method and recommendation device
CN106157156A (en) * 2016-07-29 2016-11-23 电子科技大学 A kind of cooperation recommending system based on communities of users

Also Published As

Publication number Publication date
CN107623688B (en) 2019-11-19

Similar Documents

Publication Publication Date Title
CN102624705B (en) A kind of intelligent image verification method and system
EP4020349A1 (en) Risk control method, computer device, and readable storage medium
CN107733851A (en) DNS tunnels Trojan detecting method based on communication behavior analysis
CN108428141A (en) A kind of foodstuff traceability information management system based on ERP system Yu block chain
CN112468347B (en) Security management method and device for cloud platform, electronic equipment and storage medium
Tseng et al. Fraudetector: A graph-mining-based framework for fraudulent phone call detection
CN106888194A (en) Intelligent grid IT assets security monitoring systems based on distributed scheduling
CN103617279A (en) Method for achieving microblog information spreading influence assessment model on basis of Pagerank method
CN104580222A (en) DDoS attack distributed detection and response system and method based on information entropy
CN103338451B (en) Distributed malicious node detection method in a kind of wireless sensor network
CN106162584A (en) Identify the method for refuse messages, client, cloud server and system
Li et al. Modeling and performance analysis of information diffusion under information overload in Facebook‐like social networks
TWI698102B (en) Threat detection system for mobile communication system, and global device and local device thereof
CN111652732A (en) Bit currency abnormal transaction entity identification method based on transaction graph matching
CN105871585A (en) Terminal association method and device
CN109284075A (en) A kind of measures and procedures for the examination and approval of print request, storage medium and server
CN107016272A (en) A kind of high anti-information of security performance loses telecommunications transaction login system
CN105933316A (en) Network security level determination method and device
CN114663104A (en) PBFT based on block chain product supply chain tracing
CN107040532B (en) Data evaluation device using verification code for verification
CN109561100A (en) Method and system based on the distributed duplexing energized network attacking and defending with artificial intelligence
Jin et al. Byzantine-robust and efficient federated learning for the internet of things
CN107623688A (en) User network security configuration recommends method
Kesidis An introduction to communication network analysis
CN110569357A (en) method and device for constructing mail classification model, terminal equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 310000 Rooms 103-27, Building 19, No. 1399, Liangmu Road, Cangqian Street, Yuhang District, Hangzhou, Zhejiang

Patentee after: Hangzhou Meichuang Technology Co.,Ltd.

Address before: 12 / F, building 7, Tianxing International Center, 508 Fengtan Road, Gongshu District, Hangzhou City, Zhejiang Province 310011

Patentee before: HANGZHOU MEICHUANG TECHNOLOGY CO.,LTD.