CN108304308A - User behavior monitoring method, device, computer equipment and storage medium - Google Patents

User behavior monitoring method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN108304308A
CN108304308A CN201810122815.5A CN201810122815A CN108304308A CN 108304308 A CN108304308 A CN 108304308A CN 201810122815 A CN201810122815 A CN 201810122815A CN 108304308 A CN108304308 A CN 108304308A
Authority
CN
China
Prior art keywords
operation behavior
information
risk
leakage
behavior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810122815.5A
Other languages
Chinese (zh)
Inventor
赵乐
施元
丁杰
丁一杰
董鹏
潘逸伦
周露荣
刘国辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Puhui Enterprise Management Co Ltd
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN201810122815.5A priority Critical patent/CN108304308A/en
Publication of CN108304308A publication Critical patent/CN108304308A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • Mathematical Physics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

This application involves a kind of user behavior monitoring method, system, computer equipment and storage mediums.This method includes:Obtain the operation behavior daily record that multiple service terminals generate respectively in the monitoring period;Operation behavior daily record is parsed, multiple user identifiers and corresponding operation behavior data are obtained;Preset Analysis model of network behaviors is obtained, is analysis model by operation behavior data input columns, the corresponding leakage of information value-at-risk of multiple user identifiers is calculated;When existence information risk of leakage value is more than threshold value, leakage of information early warning is generated, information leakage early warning is sent to monitor terminal.Information security can be improved using this method.

Description

User behavior monitoring method, device, computer equipment and storage medium
Technical field
This application involves field of computer technology, are set more particularly to a kind of user behavior monitoring method, device, computer Standby and storage medium.
Background technology
As scope of the enterprise expands, the information security of sensitive information is most important for enterprise development.Sensitive information includes Individual privacy information, business operation information, financial information, personnel information or IT O&M information etc..The sensitive information of enterprise is usual Distribution is stored in multiple corresponding operation systems.Sensitive information leakage can lead to property loss, network service crashes, enterprise's sound Reputation is impaired to wait harmful effects.Enterprise's sensitive information leakage in order to prevent, it will usually using the measures such as Intranet limitation or IP limitations come Restricting user access, but undoubtedly this mode can only reduce the risk that enterprise external personnel steal sensitive information, but be difficult to take precautions against Internal staff directly obtains sensitive information from operation system.Due to lack to internal staff operation system operation row For monitoring technology so that the safety of sensitive information reduces.
Invention content
Based on this, it is necessary in view of the above technical problems, provide it is a kind of can to internal staff operation system operation Behavior is monitored, and then the user behavior monitoring method, device, computer equipment and the storage that improve sensitive information safety are situated between Matter.
A kind of user behavior monitoring method, the method includes:Multiple service terminals are obtained to generate respectively in the monitoring period Operation behavior daily record;The operation behavior daily record is parsed, multiple user identifiers and corresponding operation behavior number are obtained According to;Preset Analysis model of network behaviors is obtained, the operation behavior data are inputted into the Analysis model of network behaviors, are calculated multiple The corresponding leakage of information value-at-risk of user identifier;When being more than threshold value there are described information risk of leakage value, information is generated Early warning is leaked, described information leakage early warning is sent to monitor terminal.
The operation behavior day for obtaining multiple service terminals and being generated respectively in the monitoring period in one of the embodiments, The step of will includes:In the free time of database, extracts multiple service terminals and generated based on preset bury in the monitoring period Operation behavior daily record.
In one of the embodiments, multiple operation systems have been run on the service terminal;To the operation behavior day Will is parsed, and the step of obtaining multiple user identifiers corresponding operation behavior data includes:To the operation behavior daily record into Row parsing, obtains multiple operation behavior fields;The operation behavior field includes operation system mark, user identifier and operation row For mark;By the obtained multiple operation behavior field records of parsing to the first tables of data;Based on first tables of data, to each User multiple operation systems carry out different type operation behavior practical operation number count, by statistical result record to Second tables of data;Second tables of data has recorded the corresponding operation behavior data of multiple user identifiers.
The pretreated operation behavior data include corresponding with each user identifier in one of the embodiments, Operation behavior mark and practical operation number;It is described that the corresponding leakage of information value-at-risk of multiple user identifiers is calculated The step of include:Determine that each operation behavior identifies corresponding routine operation number using the Analysis model of network behaviors;It counts respectively Calculate the difference of the practical operation number and corresponding routine operation number of corresponding each operation behavior mark of each user identifier; Corresponding information leakage value-at-risk is identified according to the mathematic interpolation relative users.
The Analysis model of network behaviors includes multiple operation behavior marks and corresponding behaviour in one of the embodiments, Make time intervals;Determine that the step of each operation behavior identifies corresponding routine operation number is wrapped using the Analysis model of network behaviors It includes:According to the number of operations area belonging to the practical operation number difference of corresponding each operation behavior mark of multiple user identifiers Between, count each operation behavior mark the corresponding user identifier of different operation time intervals quantity;To corresponding use It is screened in mark quantity most number of operations section in family;According to the end value in the number of operations section that screening obtains, phase is determined Operation behavior is answered to identify corresponding routine operation number.
Operation behavior data further include department's mark in one of the embodiments,;It is mutually applied according to the mathematic interpolation Family identifies corresponding information leakage value-at-risk:Obtain multiple departments identify corresponding operation behavior mark and adjust because Son;Corresponding difference is identified using Dynamic gene to relative users mark different operation behavior to be adjusted;After adjustment Mathematic interpolation relative users identify corresponding information leakage value-at-risk.
The method further includes in one of the embodiments,:When described information risk of leakage value is more than threshold value, to phase Answer user identifier addition risk operations label;Count quantity and the association in time of the corresponding risk operations label of the user identifier Degree;According to the quantity and association in time degree of risk operations label, it is corresponding to business end to reduce the user identifier The operating right at end.
A kind of user behavior monitoring device, described device include:Data acquisition module exists for obtaining multiple service terminals The operation behavior daily record that the monitoring period generates respectively;Data resolution module is obtained for being parsed to the operation behavior daily record To multiple user identifiers and corresponding operation behavior data;Behavioural analysis module will for obtaining preset Analysis model of network behaviors The operation behavior data input the Analysis model of network behaviors, and the corresponding leakage of information wind of multiple user identifiers is calculated Danger value;Behavior warning module will for when being more than threshold value there are described information risk of leakage value, generating leakage of information early warning Described information leakage early warning is sent to monitor terminal.
A kind of computer equipment, memory and processor, the memory are stored with computer program;The processor is held Following steps are realized when the row computer program:Obtain the operation behavior day that multiple service terminals generate respectively in the monitoring period Will;The operation behavior daily record is parsed, multiple user identifiers and corresponding operation behavior data are obtained;It obtains preset The operation behavior data are inputted the Analysis model of network behaviors by Analysis model of network behaviors, and multiple user identifier difference are calculated Corresponding leakage of information value-at-risk;When being more than threshold value there are described information risk of leakage value, leakage of information early warning is generated, by institute It states information leakage early warning and is sent to monitor terminal.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor Following steps are realized when row:Obtain the operation behavior daily record that multiple service terminals generate respectively in the monitoring period;To the operation User behaviors log is parsed, and multiple user identifiers and corresponding operation behavior data are obtained;Preset Analysis model of network behaviors is obtained, The operation behavior data are inputted into the Analysis model of network behaviors, the corresponding leakage of information of multiple user identifiers is calculated Value-at-risk;When being more than threshold value there are described information risk of leakage value, leakage of information early warning is generated, described information is revealed into early warning It is sent to monitor terminal.
Above-mentioned user behavior monitoring method, device, computer equipment and storage medium are based on industry in the monitoring period to user The operation behavior daily record of business terminal extracts, and can obtain corresponding operation behavior data;The input of operation behavior data is pre- If Analysis model of network behaviors, the corresponding leakage of information value-at-risk of multiple user identifiers can be calculated;By by information Risk of leakage value and threshold comparison can detect whether that existence information risk of leakage value is more than threshold value;When existence information leaks wind When danger value is more than threshold value, generating leakage of information early warning can prompt to monitor by the way that information leakage early warning is sent to monitor terminal Terminal takes information leakage preventing measure in time, so as to improve information security.
Description of the drawings
Fig. 1 is the application scenario diagram of user behavior monitoring method in one embodiment;
Fig. 2 is the flow diagram of user behavior monitoring method in one embodiment;
Fig. 3 is the structure diagram of user behavior monitoring device in one embodiment;
Fig. 4 is the internal structure chart of one embodiment Computer equipment.
Specific implementation mode
It is with reference to the accompanying drawings and embodiments, right in order to make the object, technical solution and advantage of the application be more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
User behavior monitoring method provided by the present application, can be applied in application environment as shown in Figure 1.Wherein, industry Business terminal 102 is communicated by network with server 104.Monitor terminal 106 is communicated by network with server 104. Wherein, service terminal 102 can be, but not limited to be various personal computers, laptop, intelligence respectively with monitor terminal 106 Mobile phone, tablet computer and portable wearable device, server 104 can be with independent servers or with multiple server groups At server cluster realize.One or more operation systems have been run on service terminal 102.Operation system refers in enterprise Portion for manage the one of which such as individual privacy information, business operation information, financial information, personnel information, IT O&M information or The system of a variety of sensitive informations.Business procedure, which is pre-set, to be buried a little, is acquired for the operation behavior data to user.With Family can handle different business in service terminal 102 by different business systems.Operation system a little exists to user based on preset bury The operation behavior data of monitoring period are acquired.Server 104 extracts user in service terminal 102 and is based on different business systems Operation behavior data, the corresponding operation behavior data of the multiple user identifiers got are pre-processed.Server 104 will Pretreated operation behavior data belong to preset Analysis model of network behaviors, can be calculated using Analysis model of network behaviors each The corresponding information leakage value-at-risk of user identifier.Server 104 detects whether that existence information disclosure risk value is more than threshold value, if depositing Information leakage early warning is being generated using the information leakage value-at-risk more than threshold value, information leakage early warning is sent to monitor terminal 106.Monitor terminal 106 can take information leakage preventing measure in time according to information leakage early warning, improve information security.
In one embodiment, as shown in Fig. 2, providing a kind of user behavior monitoring method, it is applied to Fig. 1 in this way In server for illustrate, include the following steps:
Step 202, the operation behavior daily record that multiple service terminals generate respectively in the monitoring period is obtained.
User can handle different business in service terminal by different business systems.Operation behavior daily record refers to passing through prison The action event that control user acts on service terminal is formed by daily record.Wherein, action event may include power-on operation and pass The regular jobs events such as machine operation can also include being directed under register, information inquiry operation and the information of operation system Carry the sensitive operations events such as operation.The monitoring period can be freely arranged according to actual demand, such as legal working time morning 8:00 To at night 9:00 etc..User identifier is used for the operation object of positioning operation event, can be the login account or industry of operation system At least one of the IP address (Internet Protocol Address, Internet protocol address) for terminal of being engaged in.Server is pressed Extract the operation behavior daily record of relative users respectively in multiple service terminals according to preset time frequency.
Step 204, operation behavior daily record is parsed, obtains multiple user identifiers and corresponding operation behavior data.
Server parses the multiple operation behavior daily records extracted respectively, obtains the corresponding behaviour of multiple user identifiers Make behavioral data.Server pre-processes operation behavior data, is joined with obtaining the utilizable input of Analysis model of network behaviors Number.Specifically, operation behavior data include multiple operation behavior fields, according to multiple operation behavior fields to each user more The practical operation number that a operation system carries out different type operation behavior is counted, and place is standardized to statistical result Reason, the statistical result after standardization is pretreated operation behavior data.
In one embodiment, operation behavior daily record is parsed, obtains the corresponding operation behavior of multiple user identifiers The step of data includes:Operation behavior daily record is parsed, multiple operation behavior fields are obtained;Operation behavior field includes industry System banner, user identifier and the operation behavior of being engaged in identify;By the obtained multiple operation behavior field records of parsing to the first data Table;Based on the first tables of data, the practical operation number of different type operation behavior is carried out in multiple operation systems to each user It is counted, statistical result is recorded to the second tables of data;Second tables of data has recorded the corresponding operation row of multiple user identifiers For data.
The preset parsing data packet of server by utilizing parses operation behavior daily record, obtains corresponding multiple operation rows For field.Parsing data packet can be the included JSON parsing packets of JAVA.Operation behavior field includes operation system mark, user Mark and operation behavior mark.Operation system mark refers to the mark for the operation system that action event occurs, such as operation system Title, number etc..Operation behavior mark is used for one action event of unique identification, including action event title and corresponding event Description.Wherein, event description can be the relevant information of corresponding operating event, such as the corresponding login result of register, inquiry The information such as the corresponding querying condition of operation, the corresponding file name of down operation.It is readily appreciated that, event description can also include other Information, such as operating time.Server is by the obtained multiple operation behavior field records of parsing to the first tables of data.First data Each row of data corresponds to the corresponding data of once-through operation event of a user in table.First tables of data is as shown in Table 1:
Table one:
According to the first tables of data, server carries out each user in multiple operation systems the reality of different type operation behavior Border number of operations is counted, and statistical result is recorded to the second tables of data.Data in second tables of data are after pre-processing Operation behavior data.Each row of data is the corresponding operation behavior data of a user identifier in second tables of data.Second number The practical operation number for each action event that a user carries out in monitoring period is had recorded according to table.In other words, the second data The operation system that table no longer occurs action event distinguishes, and is only distinguished to the different operation event of different user.The Two tables of data are as shown in Table 2:
Table two:
First tables of data may each be server with the second tables of data and be stored in advance in database, can also be interim life At.First tables of data may each be one with the second tables of data, can also be multiple.In other words, it can be shared with multiple users Same tables of data can also be that multiple users are respectively provided with corresponding tables of data, be not restricted to this.
In another embodiment, statistical result is being recorded to the second tables of data.Statistical result is standardized Processing.Specifically, each field in preset the second tables of data of standardized algorithm pair of server by utilizing carries out at 01 standardization Reason, i.e., the number converted field value between 0 to 1.Preset standardized algorithm can be Min-Max Standardization Act (extreme values Standardization), Z-score Standardization Acts or Decimal scalling (decimal calibration standardization) etc..Standardization can carry High data analysis precision can also reduce calculation amount when server analyzes operation behavior, to reduce server money The occupancy in source.
Step 206, preset Analysis model of network behaviors is obtained, is analysis model by operation behavior data input columns, calculates To the corresponding leakage of information value-at-risk of multiple user identifiers.
Analysis model of network behaviors has been prestored in server.Analysis model of network behaviors can be server by utilizing great amount of samples behaviour It counts according to this and corresponding tag along sort, a kind of general Spark-MLlib Analysis model of network behaviors (machine learning model) is instructed It gets.Sample operations data include sample operations behavior mark and corresponding a variety of number of operations differences.Number of operations Difference is a kind of difference of the practical operation number and routine operation number of operating time.Different number of operations differences corresponds to not Same tag along sort.Tag along sort can be number of operations section, such as [7,10] etc..
Server by utilizing Analysis model of network behaviors determines that each operation behavior identifies corresponding routine operation number.Server point The practical operation number of corresponding each operation behavior mark of each user identifier and corresponding routine operation number are not calculated Difference obtains corresponding information leakage Risk interval according to the inquiry.Server obtains preset each operation behavior mark pair The weight answered.The corresponding information leakage wind of each user identifier is calculated according to weight and the information leakage Risk interval got Danger value.
Step 208, when existence information risk of leakage value is more than threshold value, leakage of information early warning is generated, information leakage is pre- Police is sent to monitor terminal.
Monitoring server is more than threshold value with the presence or absence of the corresponding information leakage value-at-risk of user identifier.When existence information leaks When value-at-risk is more than threshold value, server generates information according to the information leakage value-at-risk and corresponding user identifier that are more than threshold value and lets out Leak early warning.Leakage of information early warning there are many embodiment, one of which embodiment be server according to each user identifier with And corresponding information leakage value-at-risk generates user behavior and monitors report, it will be more than the letter of threshold value in user behavior monitors report It ceases disclosure risk value and corresponding user identifier carries out distinguishing mark.Information leakage early warning is sent to monitor terminal by server, Even if to prompt monitor terminal to take information leakage preventing measure, such as reducing operating right of the relative users to operation system.Prison Control terminal is the preassigned terminal with supervision authority.It is readily appreciated that, monitor terminal may include user terminal, with direct Relative users are prompted.
In the present embodiment, operation behavior daily record of the user based on service terminal is extracted in the monitoring period, can be obtained Take corresponding operation behavior data;Operation behavior data are inputted into preset Analysis model of network behaviors, multiple use can be calculated Family identifies corresponding leakage of information value-at-risk;By that by leakage of information value-at-risk and threshold comparison, can detect whether to deposit It is more than threshold value in leakage of information value-at-risk;When existence information risk of leakage value is more than threshold value, leakage of information early warning is generated, is passed through Information leakage early warning is sent to monitor terminal, monitor terminal can be prompted to take information leakage preventing measure in time, so as to Improve information security.
In one embodiment, multiple service terminals are obtained the step of monitoring the operation behavior daily record that the period generates respectively Including:In the free time of database, extracts multiple service terminals and bury the operation behavior generated based on preset in the monitoring period Daily record.
User is monitored in the operation behavior of operation system in order to realize, in the corresponding business of user that needs monitor Each operation system in terminal is preset to bury a little.When user monitor the period operation system is operated when, operation system base It is recorded in the preset operation behavior buried a little to user, generates corresponding operation behavior daily record.Service terminal is by different business The operation behavior daily record that system generates is stored.
Server extracts the operation behavior daily record of relative users in multiple service terminals respectively.In order to fully alleviate clothes The pressure that database resource consumes in business device, server carry out the extraction of operation behavior daily record in the free time of database.Tool Body, server runs monitoring script, and shape is executed to the batch processing task in database in preset time period by monitoring script Condition and resource consumption situation are monitored, and obtain execution time and the resource consumption time of the batch processing task in preset period of time. Preset period of time can be the period of entire non-working time or the period of part non-working time.For example, to user's row For the evening 8 in one month before being monitored:00~morning 5:00 period etc..Server will within a preset period of time The resource consumption time is counted, and the resource consumption time is compared with the execution time of multiple batch processing tasks, is filtered out It can avoid the resource consumption time that multiple batch processing tasks execute the time.It can be consumed when being executed due to batch processing task more Database resource, therefore the resource consumption time that multiple batch processing tasks execute the time is avoided, it can be as the free time of database Time.Since the free time of database is that within a preset period of time, preset time period can be the time of non-working time Section, thus the free time of the database obtained through the above way can be considered as database performance optimal free time.Clothes Business device is parsed to extracting multiple operation behavior daily records, obtains the corresponding operation behavior data of each user identifier.
In the present embodiment, operation behavior daily record is extracted in the free time of database, it is possible to reduce to server The occupancy of resource.
In one embodiment, pretreated operation behavior data include operation behavior mark corresponding with each user identifier Know and practical operation number;The step of multiple user identifiers corresponding leakage of information value-at-risk is calculated include:It utilizes Analysis model of network behaviors determines that each operation behavior identifies corresponding routine operation number;It is corresponding to calculate separately each user identifier The difference of the practical operation number and corresponding routine operation number of each operation behavior mark, according to mathematic interpolation relative users Identify corresponding information leakage value-at-risk.
Server by utilizing Analysis model of network behaviors, according to the corresponding practical operation number of multiple user identifiers, screening is every Kind operation behavior identifies corresponding routine operation number.Routine operation number refers to the relatively reasonable generation time of corresponding operating event Number.It further includes the practical operation that multiple user identifiers correspond to each operation behavior mark respectively to parse obtained operation behavior data Number.Server calculate separately the practical operation number of each user identifier corresponding each operation behavior mark with it is corresponding normal Advise the difference of number of operations.For example, in above-mentioned table two, it is assumed that the corresponding routine of action event mark " inquiry Client handset number " Number of operations is 20 times, and the corresponding practical operation number of user identifier " user A " is 10 times, then corresponding difference is 10.It is easy Understand, when difference is negative, indicates that the number that the user carries out corresponding operating behavior is more than routine operation number, existence information Disclosure risk, corresponding operating event may be information leakage risk case.It is worth noting that, when difference is negative, indicate The number that the user carries out corresponding operating behavior is less than routine operation number, and Information Risk is not present, then server is by the difference It is set as 0.
Server to each user identifier, accordingly sum by the corresponding difference of multiple operation behaviors marks, by summed result Information leakage value-at-risk as relative users mark.In another embodiment, server calculate each difference with it is corresponding The ratio of routine operation number, to each user identifier, accordingly the corresponding ratio of multiple operation behaviors marks is summed, and will be asked The information leakage value-at-risk identified as relative users with result.For example, in the above-described embodiments, corresponding ratio is (20- 10)/20=0.5.
In yet another embodiment, Analysis model of network behaviors includes that multiple operation behaviors identify corresponding weight. Different operation event causes the possibility of information leakage different.Weight can be server to be caused according to different operation event The possibility setting of information leakage.For example, inquiry operation leads to the possibility bigger of information leakage with respect to register, download The opposite inquiry operation of operation leads to the possibility bigger of information leakage, then can be by register, inquiry operation and down operation Operation behavior identify corresponding weight and be sequentially increased.Such as the corresponding weights of operation behavior mark " registering service system 1 " The factor can be 0.8, and the corresponding weight of operation behavior mark " downloading employee's address list " can be 1.2, operation behavior mark It can be 1 etc. to know " inquiry Client handset number " corresponding weight.Corresponding weight is identified according to each operation behavior, Server calculates each user identifier, and accordingly a variety of operation behaviors identify the product of corresponding ratio and the corresponding weight value factor, to every The corresponding multiple products of a user identifier are summed, using summed result as the corresponding information leakage risk of the user identifier Value.
For example, as shown in above-mentioned table two, it is assumed that user A has carried out above-mentioned 4 kinds of action events, corresponding behaviour in the monitoring period Make behavior mark and is followed successively by " failure of registering service system 1 ", " downloading employee's address list ", " inquiry Client handset number " and " inquiry Client's QQ number ", corresponding practical operation number are 2 times, 7 times, 22 times and 16 times, corresponding routine operation number is respectively 2 times, 8 times, 20 times and 13 times, then corresponding ratio is followed successively by 0,0, (22-20)/20, (16-13)/12, corresponding weight point Not Wei 0.8,1.2,1,1, then " user A " corresponding information leakage value-at-risk can be 0*0.8+0/8*1.2+1/10*1+1/4*1 =0.35.Corresponding weight is respectively set based on different operation behavior marks, fully considers that different operation event causes The different possibilities of information leakage, for example, whether reflection download event may cause the standard of information leakage to be more prone to down Content is carried, whether reflection query event may cause the standard of information leakage to be more prone to inquiry times;It more adapts to practical Applicable cases, so as to improve the accuracy calculated to information leakage risk.
In the present embodiment, the routine operation of corresponding operating behavior is dynamically determined according to the practical operation number of multiple users Number, relatively traditional setting routine operation number are fixed value, are dynamically determined routine operation number and make routine operation number more Add and tally with the actual situation, to improve the accuracy of monitored results.
In one embodiment, Analysis model of network behaviors includes multiple operation behavior marks and corresponding number of operations area Between;Determine that the step of each operation behavior identifies corresponding routine operation number includes using Analysis model of network behaviors:According to multiple Number of operations section belonging to the practical operation number difference of corresponding each operation behavior mark of user identifier, counts each behaviour Make behavior mark the corresponding user identifier of different operation time intervals quantity;The behaviour most to corresponding user identifier quantity It is screened as time intervals;According to the end value in the number of operations section that screening obtains, determine that corresponding operating behavior mark corresponds to Routine operation number.
Server by utilizing Analysis model of network behaviors clusters multiple user identifiers from different dimensions.Specifically, behavior point Analysis model includes multiple operation behavior marks and corresponding multiple number of operations sections, and such as " inquiry Client handset number " is right The number of operations section answered can be [1,6], [7,10], [11,15] etc..Server according to multiple user identifiers it is corresponding each Number of operations section belonging to the practical operation number difference of operation behavior mark carries out multiple user identifiers from different dimensions Group divides, and obtains each operation behavior and identifies corresponding catergories of user group.Include one or more use per class user group Family identifies.For example, the user identifier by the practical operation number for inquiring Client handset number no more than 6 times is classified as one kind, will be more than 6 Secondary but no more than 10 times user identifiers are classified as one kind, so analogize.
Server statistics correspond to the quantity of user identifier per class user group, and each behaviour is calculated according to the quantity of user identifier Make the corresponding accounting of the corresponding catergories of user group of behavior mark.The highest a kind of user group of screening server accounting corresponds to Number of operations section.For example, 20% user belongs to section [1,6], 60% user to the inquiry times of Client handset number Section [7,10] etc. is belonged to the inquiry times of Client handset number, then the number of operations section screened is [7,10].
The end value in the number of operations section that server is obtained according to screening determines that corresponding operating behavior identifies corresponding routine Number of operations.Specifically, server can be with one between one of selection operation time intervals end value or two end values A numerical value is as routine operation number.For example, server can calculate multiple practical operations time positioned at the number of operations section Several average value, using the average value as routine operation number.Server can also be according to the operation of preset rules random screening One numerical value of time intervals is as routine operation number.
In the present embodiment, preset multiple operation behaviors identify corresponding number of operations section, according to user identifier number Measure the routine operation number that most number of operations sections is dynamically determined corresponding operating behavior, relatively traditional setting routine operation Number is fixed value, is dynamically determined routine operation number and routine operation number is made to be more in line with actual conditions, to improve prison Control the accuracy of result.
In one embodiment, operation behavior data further include department's mark;According to mathematic interpolation relative users mark pair The step of information leakage value-at-risk answered includes:Obtain multiple departments identify corresponding operation behavior mark and adjust because Son;Using Dynamic gene, corresponding difference is identified to relative users mark different operation behavior and is adjusted;After adjustment Mathematic interpolation relative users identify corresponding information leakage value-at-risk.
The users of different departments business to be treated is different, operation system action event frequent operation degree not Together, there are the users of a department carries out the operation to the practical operation number of certain operation behavior far more than other department users The practical operation number situation of behavior, that is, there is the department, there are certain rational high frequencies of operation behaviors.
In order to improve the accuracy calculated to information leakage risk, the business nature of server combination user affiliated function, Calculate the leakage of information value-at-risk of the user.Specifically, the operation behavior data that server is extracted in service terminal further include The corresponding department's mark of user identifier.Server in advance marks the department of each existing above-mentioned rational high frequencies of operation behavior Know and corresponding Dynamic gene is set.In other words, server is preset a variety of department's marks and corresponding operation behavior mark and is adjusted Integral divisor, the Dynamic gene as department's mark " market department " is based on operation behavior mark " inquiry Client handset number " can be 60%.It is readily appreciated that, a department is more for a kind of reasonable operation number of operation behavior, and corresponding Dynamic gene is smaller. When corresponding Dynamic gene is not arranged in department's mark, it is defaulted as 100%.After above-mentioned difference is calculated in server, inspection The corresponding operating behavior surveyed with the presence or absence of user identifier affiliated function mark identifies corresponding Dynamic gene.If in the presence of service The Dynamic gene is multiplied by device with difference, to be adjusted to difference, using product as the difference after adjustment.Server is according to upper It states mode and identifies corresponding information leakage value-at-risk according to the mathematic interpolation relative users after adjustment.
In the present embodiment, the leakage of information value-at-risk of the user is calculated in conjunction with the business nature of user affiliated function, fully Consider the business otherness between different departments, avoids certain high-frequency but rational operation behavior being determined as information leakage wind Danger operation, adapts to practical situations, can improve the accuracy calculated to information leakage risk.
In one embodiment, this method further includes:When leakage of information value-at-risk is more than threshold value, relative users are identified Add risk operations label;Counting user identifies the quantity and association in time degree of corresponding risk operations label;It is grasped according to risk The quantity and association in time degree marked reduce the corresponding operating right to service terminal of user identifier.
Server is not only monitored user in the operation behavior of single monitoring period, also to user in multiple monitoring The operation behavior of section is analyzed.Specifically, each if monitoring period leakage of information value-at-risk is more than threshold value, server is corresponding User identifier adds risk operations label.Carry out risk operations label it is newly-increased when, server is to user identifier when default The quantity for increasing risk operations label in section newly is counted.Preset period of time includes multiple monitoring periods, can according to demand freely Setting, such as 1 month.Server obtains the label time of multiple risk operations labels, calculates the association in time of multiple label times Degree.Multiple label times are closer, and corresponding association in time degree is higher;On the contrary, multiple label times more disperse, the corresponding time The degree of association is lower.
Server preset kinds of risks operation marker number and association in time degree combination and each combination it is corresponding Permission adjustable strategies.Whether the quantity for the risk operations label that server comparison statistics obtains is more than preset value.Preset value refers to The upper limit value that occurrence risk operates in preset period of time, such as 5 times.If the quantity of risk operations label is more than preset value, according to system The quantity and association in time degree for counting obtained risk operations label, obtain corresponding permission adjustable strategies, and plan is adjusted according to permission It is decreased slightly as low relative users and identifies the corresponding operating right to service terminal.
In the present embodiment, not only user is monitored in the operation behavior of single monitoring period, also to user multiple The operation behavior of monitoring period is analyzed, and whether there is according to the operation behavior comprehensive descision relative users of multiple monitoring periods Information leakage trend further determines whether the operating right for needing to reduce relative users mark, improves the accurate of monitored results Property.It is more than threshold value not only according to leakage of information value-at-risk occurs and when judging that relative users whether there is information leakage trend The number of situation is more than the time interval of threshold condition herein in connection with multiple leakage of information value-at-risks, adapts to practical situations, into One step improves the accuracy of monitored results.
It should be understood that although each step in the flow chart of Fig. 2 is shown successively according to the instruction of arrow, this A little steps are not that the inevitable sequence indicated according to arrow executes successively.Unless expressly state otherwise herein, these steps It executes there is no the limitation of stringent sequence, these steps can execute in other order.Moreover, at least part in Fig. 2 Step may include that either these sub-steps of multiple stages or stage are executed in synchronization to multiple sub-steps It completes, but can execute at different times, the execution sequence in these sub-steps or stage is also not necessarily to be carried out successively, But it can either the sub-step of other steps or at least part in stage execute in turn or alternately with other steps.
In one embodiment, as shown in figure 3, providing a kind of user behavior monitoring device, including:Data acquisition module 302, data resolution module 304, behavioural analysis module 306 and behavior warning module 308, wherein:Data acquisition module 302 is used In the operation behavior daily record that the multiple service terminals of acquisition generate respectively in the monitoring period.
Data resolution module 304 obtains multiple user identifiers and corresponding behaviour for being parsed to operation behavior daily record Make behavioral data.
Operation behavior data input columns are analysis for obtaining preset Analysis model of network behaviors by behavioural analysis module 306 The corresponding leakage of information value-at-risk of multiple user identifiers is calculated in model.
Behavior warning module 308, for when existence information risk of leakage value is more than threshold value, generating leakage of information early warning, Information leakage early warning is sent to monitor terminal.
In one embodiment, data resolution module 304 is additionally operable to the free time in database, and it is whole to extract multiple business It holds and buries the operation behavior daily record generated based on preset in the monitoring period.
In one embodiment, multiple operation systems have been run on service terminal;Data resolution module 304 is additionally operable to behaviour It is parsed as user behaviors log, obtains multiple operation behavior fields;Operation behavior field includes operation system mark, user identifier It is identified with operation behavior;By the obtained multiple operation behavior field records of parsing to the first tables of data;It is right based on the first tables of data The practical operation number that each user carries out different type operation behavior in multiple operation systems counts, and statistical result is remembered It records to the second tables of data;Second tables of data has recorded the corresponding operation behavior data of multiple user identifiers.
Pretreated operation behavior data include operation row corresponding with each user identifier in one of the embodiments, For mark and practical operation number;Behavioural analysis module 306 is additionally operable to determine each operation behavior mark using Analysis model of network behaviors Know corresponding routine operation number;Calculate separately the practical operation number of corresponding each operation behavior mark of each user identifier With the difference of corresponding routine operation number;Corresponding information leakage value-at-risk is identified according to mathematic interpolation relative users.
Analysis model of network behaviors includes multiple operation behavior marks and corresponding operation time in one of the embodiments, Number interval;Behavioural analysis module 306 is additionally operable to the practical operation according to corresponding each operation behavior mark of multiple user identifiers Number of operations section belonging to number difference counts each operation behavior mark in the corresponding user's mark of different operation time intervals The quantity of knowledge;It screens in the number of operations sections most to corresponding user identifier quantity;The operation time obtained according to screening The end value of number interval determines that corresponding operating behavior identifies corresponding routine operation number.
Operation behavior data further include department's mark in one of the embodiments,;Behavioural analysis module 306 is additionally operable to obtain Multiple departments are taken to identify corresponding operation behavior mark and Dynamic gene;Using Dynamic gene, not to relative users mark Biconditional operation behavior identifies corresponding difference and is adjusted;Corresponding information is identified according to the mathematic interpolation relative users after adjustment to let out Reveal value-at-risk.
The device further includes permission adjustment module 310 in one of the embodiments, for surpassing when leakage of information value-at-risk When crossing threshold value, addition risk operations label is identified to relative users;Counting user identifies the quantity of corresponding risk operations label With association in time degree;According to the quantity and association in time degree of risk operations label, it is corresponding to service terminal to reduce user identifier Operating right.
Specific about user behavior monitoring device limits the limit that may refer to above for user behavior monitoring method Fixed, details are not described herein.Modules in above-mentioned user behavior monitoring device can fully or partially through software, hardware and its It combines to realize.Above-mentioned each module can be embedded in or in the form of hardware independently of in the processor in computer equipment, can also It is stored in a software form in the memory in computer equipment, in order to which processor calls the above modules of execution corresponding Operation.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 4.The computer equipment include the processor connected by system bus, memory, network interface and Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The database of machine equipment is used for Analysis model of network behaviors and the corresponding operation behavior data of multiple user identifiers.The computer equipment Network interface be used to communicate by network connection with external terminal.To realize one when the computer program is executed by processor Kind user behavior monitoring method.
It will be understood by those skilled in the art that structure shown in Fig. 4, is only tied with the relevant part of application scheme The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment May include either combining certain components than more or fewer components as shown in the figure or being arranged with different components.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with Computer program, the processor realize following steps when executing computer program:Multiple service terminals are obtained in the monitoring period point The operation behavior daily record not generated;Operation behavior daily record is parsed, multiple user identifiers and corresponding operation behavior are obtained Data;Preset Analysis model of network behaviors is obtained, is analysis model by operation behavior data input columns, multiple user's marks are calculated Know corresponding leakage of information value-at-risk;When existence information risk of leakage value is more than threshold value, leakage of information early warning is generated, it will Information leakage early warning is sent to monitor terminal.
In one embodiment, following steps are also realized when processor executes computer program:In the free time of database Between, it extracts multiple service terminals and buries the operation behavior daily record generated based on preset in the monitoring period.
In one embodiment, multiple operation systems have been run on service terminal;Processor is gone back when executing computer program Realize following steps:Operation behavior daily record is parsed, multiple operation behavior fields are obtained;Operation behavior field includes business System banner, user identifier and operation behavior mark;By the obtained multiple operation behavior field records of parsing to the first tables of data; Based on the first tables of data, the practical operation number for carrying out different type operation behavior in multiple operation systems to each user carries out Statistics, statistical result is recorded to the second tables of data;Second tables of data has recorded the corresponding operation behavior number of multiple user identifiers According to.
In one embodiment, pretreated operation behavior data include operation behavior mark corresponding with each user identifier Know and practical operation number;Processor also realizes following steps when executing computer program:It is determined using Analysis model of network behaviors every A operation behavior identifies corresponding routine operation number;Calculate separately corresponding each operation behavior mark of each user identifier The difference of practical operation number and corresponding routine operation number;Corresponding information leakage is identified according to mathematic interpolation relative users Value-at-risk.
In one embodiment, Analysis model of network behaviors includes multiple operation behavior marks and corresponding number of operations area Between;Processor also realizes following steps when executing computer program:According to each corresponding operation behavior mark of multiple user identifiers Number of operations section belonging to the practical operation number difference of knowledge counts each operation behavior mark in different operation time intervals The quantity of corresponding user identifier;It screens in the number of operations sections most to corresponding user identifier quantity;According to screening The end value in obtained number of operations section determines that corresponding operating behavior identifies corresponding routine operation number.
In one embodiment, operation behavior data further include department's mark;Processor goes back reality when executing computer program Existing following steps:It obtains multiple departments and identifies corresponding operation behavior mark and Dynamic gene;Using Dynamic gene, to phase It answers user identifier different operation behavior to identify corresponding difference to be adjusted;According to the mathematic interpolation relative users mark after adjustment Corresponding information leakage value-at-risk.
In one embodiment, following steps are also realized when processor executes computer program:When leakage of information value-at-risk When more than threshold value, addition risk operations label is identified to relative users;Counting user identifies the number of corresponding risk operations label Amount and association in time degree;According to the quantity and association in time degree of risk operations label, it is corresponding to business end to reduce user identifier The operating right at end.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program realizes following steps when being executed by processor:Obtain the operation behavior that multiple service terminals generate respectively in the monitoring period Daily record;Operation behavior daily record is parsed, multiple user identifiers and corresponding operation behavior data are obtained;Obtain preset row For analysis model, it is analysis model by operation behavior data input columns, the corresponding information of multiple user identifiers is calculated Risk of leakage value;When existence information risk of leakage value is more than threshold value, leakage of information early warning is generated, information leakage early warning is sent To monitor terminal.
In one embodiment, following steps are also realized when computer program is executed by processor:In the free time of database Time extracts multiple service terminals and buries the operation behavior daily record generated based on preset in the monitoring period.
In one embodiment, multiple operation systems have been run on service terminal;When computer program is executed by processor Also realize following steps:Operation behavior daily record is parsed, multiple operation behavior fields are obtained;Operation behavior field includes industry System banner, user identifier and the operation behavior of being engaged in identify;By the obtained multiple operation behavior field records of parsing to the first data Table;Based on the first tables of data, the practical operation number of different type operation behavior is carried out in multiple operation systems to each user It is counted, statistical result is recorded to the second tables of data;Second tables of data has recorded the corresponding operation row of multiple user identifiers For data.
In one embodiment, pretreated operation behavior data include operation behavior mark corresponding with each user identifier Know and practical operation number;Following steps are also realized when computer program is executed by processor:It is determined using Analysis model of network behaviors Each operation behavior identifies corresponding routine operation number;Calculate separately corresponding each operation behavior mark of each user identifier Practical operation number and corresponding routine operation number difference;Corresponding information is identified according to mathematic interpolation relative users to let out Reveal value-at-risk.
In one embodiment, Analysis model of network behaviors includes multiple operation behavior marks and corresponding number of operations area Between;Following steps are also realized when computer program is executed by processor:According to each corresponding operation behavior of multiple user identifiers Number of operations section belonging to the practical operation number difference of mark counts each operation behavior mark in different operation number area Between corresponding user identifier quantity;It screens in the number of operations sections most to corresponding user identifier quantity;According to sieve The end value for selecting obtained number of operations section determines that corresponding operating behavior identifies corresponding routine operation number.
In one embodiment, operation behavior data further include that department's mark computer program goes back reality when being executed by processor Existing following steps:It obtains multiple departments and identifies corresponding operation behavior mark and Dynamic gene;Using Dynamic gene, to phase It answers user identifier different operation behavior to identify corresponding difference to be adjusted;According to the mathematic interpolation relative users mark after adjustment Corresponding information leakage value-at-risk.
In one embodiment, following steps are also realized when computer program is executed by processor:When leakage of information risk When value is more than threshold value, addition risk operations label is identified to relative users;Counting user identifies corresponding risk operations label Quantity and association in time degree;According to the quantity and association in time degree of risk operations label, it is corresponding to business to reduce user identifier The operating right of terminal.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with Instruct relevant hardware to complete by computer program, computer program can be stored in a non-volatile computer readable It takes in storage medium, the computer program is when being executed, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, this Shen Any reference to memory, storage, database or other media used in each embodiment please provided, may each comprise Non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above example can be combined arbitrarily, to keep description succinct, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield is all considered to be the range of this specification record.
Above example only expresses the several embodiments of the application, the description thereof is more specific and detailed, but can not Therefore it is construed as limiting the scope of the patent.It should be pointed out that for those of ordinary skill in the art, Under the premise of not departing from the application design, various modifications and improvements can be made, these belong to the protection domain of the application. Therefore, the protection domain of the application patent should be determined by the appended claims.

Claims (10)

1. a kind of user behavior monitoring method, the method includes:
Obtain the operation behavior daily record that multiple service terminals generate respectively in the monitoring period;
The operation behavior daily record is parsed, multiple user identifiers and corresponding operation behavior data are obtained;
Preset Analysis model of network behaviors is obtained, the operation behavior data are inputted into the Analysis model of network behaviors, are calculated more The corresponding leakage of information value-at-risk of a user identifier;
When being more than threshold value there are described information risk of leakage value, leakage of information early warning is generated, by described information leakage early warning hair It send to monitor terminal.
2. according to the method described in claim 1, it is characterized in that, the multiple service terminals of acquisition are given birth to respectively in the monitoring period At operation behavior daily record the step of include:
In the free time of database, extracts multiple service terminals and bury the operation behavior day generated based on preset in the monitoring period Will.
3. according to the method described in claim 1, it is characterized in that, having run multiple operation systems on the service terminal;It is right The operation behavior daily record is parsed, and the step of obtaining multiple user identifiers corresponding operation behavior data includes:
The operation behavior daily record is parsed, multiple operation behavior fields are obtained;The operation behavior field includes business System banner, user identifier and operation behavior mark;
By the obtained multiple operation behavior field records of parsing to the first tables of data;
Based on first tables of data, the practical operation of different type operation behavior is carried out in multiple operation systems to each user Number is counted, and statistical result is recorded to the second tables of data;Second tables of data has recorded multiple user identifiers and corresponds to Operation behavior data.
4. according to the method described in claims 1 to 3 any one, which is characterized in that the pretreated operation behavior number According to including operation behavior mark corresponding with each user identifier and practical operation number;It is described that multiple user's marks are calculated The step of knowing corresponding leakage of information value-at-risk include:
Determine that each operation behavior identifies corresponding routine operation number using the Analysis model of network behaviors;
Calculate separately the practical operation number of corresponding each operation behavior mark of each user identifier and corresponding routine operation The difference of number;
Corresponding information leakage value-at-risk is identified according to the mathematic interpolation relative users.
5. according to the method described in claim 4, it is characterized in that, the Analysis model of network behaviors includes multiple operation behavior marks And corresponding number of operations section;Determine that each operation behavior identifies corresponding conventional behaviour using the Analysis model of network behaviors The step of making number include:
According to the number of operations area belonging to the practical operation number difference of corresponding each operation behavior mark of multiple user identifiers Between, count each operation behavior mark the corresponding user identifier of different operation time intervals quantity;
It screens in the number of operations sections most to corresponding user identifier quantity;
According to the end value in the number of operations section that screening obtains, determine that corresponding operating behavior identifies corresponding routine operation number.
6. according to the method described in claim 4, it is characterized in that, the operation behavior data further include department's mark;According to The mathematic interpolation relative users identify the step of corresponding information leakage value-at-risk and include:
It obtains multiple departments and identifies corresponding operation behavior mark and Dynamic gene;
Using the Dynamic gene, corresponding difference is identified to relative users mark different operation behavior and is adjusted;
Corresponding information leakage value-at-risk is identified according to the mathematic interpolation relative users after adjustment.
7. according to the method described in claim 1, it is characterized in that, the method further includes:
When described information risk of leakage value is more than threshold value, addition risk operations label is identified to relative users;
Count the quantity and association in time degree of the corresponding risk operations label of the user identifier;
According to the quantity and association in time degree of risk operations label, it is corresponding to business end to reduce the user identifier The operating right at end.
8. a kind of user behavior monitoring device, described device include:
Data acquisition module, the operation behavior daily record generated respectively in the monitoring period for obtaining multiple service terminals;
Data resolution module obtains multiple user identifiers and corresponding operation for being parsed to the operation behavior daily record Behavioral data;
The operation behavior data are inputted the behavior point by behavioural analysis module for obtaining preset Analysis model of network behaviors Model is analysed, the corresponding leakage of information value-at-risk of multiple user identifiers is calculated;
Behavior warning module, for when being more than threshold value there are described information risk of leakage value, leakage of information early warning being generated, by institute It states information leakage early warning and is sent to monitor terminal.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In when the processor executes the computer program the step of any one of realization claim 1 to 7 the method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claim 1 to 7 is realized when being executed by processor.
CN201810122815.5A 2018-02-07 2018-02-07 User behavior monitoring method, device, computer equipment and storage medium Pending CN108304308A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810122815.5A CN108304308A (en) 2018-02-07 2018-02-07 User behavior monitoring method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810122815.5A CN108304308A (en) 2018-02-07 2018-02-07 User behavior monitoring method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN108304308A true CN108304308A (en) 2018-07-20

Family

ID=62864657

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810122815.5A Pending CN108304308A (en) 2018-02-07 2018-02-07 User behavior monitoring method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN108304308A (en)

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109102392A (en) * 2018-08-15 2018-12-28 吉林亿联银行股份有限公司 A kind of reference inquiry method for prewarning risk and device
CN109166031A (en) * 2018-08-15 2019-01-08 吉林亿联银行股份有限公司 A kind of reference inquiry method for prewarning risk and device
CN109189657A (en) * 2018-08-17 2019-01-11 中国平安人寿保险股份有限公司 A kind of recording method, storage medium and the server of user's operation behavior
CN109255518A (en) * 2018-08-01 2019-01-22 阿里巴巴集团控股有限公司 Data application risk appraisal procedure, device and system
CN109684863A (en) * 2018-09-07 2019-04-26 平安科技(深圳)有限公司 Data leakage prevention method, device, equipment and storage medium
CN109872234A (en) * 2019-01-24 2019-06-11 平安科技(深圳)有限公司 Trading activity monitoring method, device, computer equipment and medium
CN109903045A (en) * 2019-01-24 2019-06-18 平安科技(深圳)有限公司 Action trail monitoring method, device, computer equipment and medium
CN109918899A (en) * 2019-01-23 2019-06-21 平安科技(深圳)有限公司 Server, employee reveal the prediction technique and storage medium of company information
CN109918278A (en) * 2019-01-24 2019-06-21 平安科技(深圳)有限公司 Monitoring method, device and the computer storage medium of the number of operations of custom system
CN109933705A (en) * 2019-03-22 2019-06-25 国家电网有限公司 A kind of big data platform operation management system
CN110046245A (en) * 2018-11-27 2019-07-23 阿里巴巴集团控股有限公司 A kind of data monitoring method and device, a kind of calculating equipment and storage medium
CN110097289A (en) * 2019-05-09 2019-08-06 深圳前海微众银行股份有限公司 Risk monitoring and control method, apparatus, equipment and computer readable storage medium
CN110175083A (en) * 2019-04-16 2019-08-27 平安科技(深圳)有限公司 The monitoring method and device of operating system
CN110175109A (en) * 2019-05-31 2019-08-27 北京北信源软件股份有限公司 A kind of determination method, determining device, equipment and the medium of user type
CN110365698A (en) * 2019-07-29 2019-10-22 杭州数梦工场科技有限公司 Methods of risk assessment and device
CN110417721A (en) * 2019-03-07 2019-11-05 腾讯科技(深圳)有限公司 Safety risk estimating method, device, equipment and computer readable storage medium
CN110445637A (en) * 2019-07-05 2019-11-12 深圳壹账通智能科技有限公司 Event-monitoring method, system, computer equipment and storage medium
CN110493181A (en) * 2019-07-05 2019-11-22 中国平安财产保险股份有限公司 User behavior detection method, device, computer equipment and storage medium
CN110532158A (en) * 2019-09-03 2019-12-03 南方电网科学研究院有限责任公司 Safety evaluation method, device, equipment and the readable storage medium storing program for executing of operation data
CN111008123A (en) * 2019-10-23 2020-04-14 贝壳技术有限公司 Database testing method and device, storage medium and electronic equipment
CN111444534A (en) * 2020-03-12 2020-07-24 中国建设银行股份有限公司 Method, device, equipment and computer readable medium for monitoring user operation
CN111581931A (en) * 2020-04-26 2020-08-25 泰康保险集团股份有限公司 Report generation method and device based on data leakage prevention system
CN111639318A (en) * 2020-05-26 2020-09-08 深圳壹账通智能科技有限公司 Wind control method based on gesture monitoring on mobile terminal and related device
CN112182537A (en) * 2020-09-28 2021-01-05 深圳前海微众银行股份有限公司 Monitoring method, device, server, system and storage medium
CN112434949A (en) * 2020-11-25 2021-03-02 平安普惠企业管理有限公司 Service early warning processing method, device, equipment and medium based on artificial intelligence
CN112580089A (en) * 2019-09-30 2021-03-30 奇安信安全技术(珠海)有限公司 Information leakage early warning method, device and system, storage medium and electronic device
CN112579408A (en) * 2020-10-29 2021-03-30 上海钱拓网络技术有限公司 Classification method of embedded point information
CN112861120A (en) * 2019-11-27 2021-05-28 深信服科技股份有限公司 Identification method, device and storage medium
CN112988772A (en) * 2021-02-08 2021-06-18 平安科技(深圳)有限公司 Behavior data monitoring method, device, equipment and medium
CN113434537A (en) * 2021-06-02 2021-09-24 上海数禾信息科技有限公司 Data processing method and device based on data acquisition
CN113570201A (en) * 2021-06-30 2021-10-29 北京达佳互联信息技术有限公司 Data processing method, device, equipment, storage medium and program product
CN113610535A (en) * 2021-07-29 2021-11-05 浙江惠瀜网络科技有限公司 Risk monitoring method and device suitable for consumption staging business process
CN115174224A (en) * 2022-07-06 2022-10-11 北京神州慧安科技有限公司 Information safety monitoring method and device suitable for industrial control network

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102495942A (en) * 2011-10-26 2012-06-13 深信服网络科技(深圳)有限公司 Assessment method for risks of internal network of organization and system
CN102946319A (en) * 2012-09-29 2013-02-27 焦点科技股份有限公司 System and method for analyzing network user behavior information
CN105989155A (en) * 2015-03-02 2016-10-05 阿里巴巴集团控股有限公司 Method and device for identifying risk behaviors
CN106228388A (en) * 2016-07-14 2016-12-14 乐视控股(北京)有限公司 A kind of member user's behavior monitoring method, device and electronic equipment
CN107409126A (en) * 2015-02-24 2017-11-28 思科技术公司 System and method for protecting enterprise computing environment safety
CN107612882A (en) * 2017-08-03 2018-01-19 北京奇安信科技有限公司 A kind of user behavior recognition method and device based on middle daily record

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102495942A (en) * 2011-10-26 2012-06-13 深信服网络科技(深圳)有限公司 Assessment method for risks of internal network of organization and system
CN102946319A (en) * 2012-09-29 2013-02-27 焦点科技股份有限公司 System and method for analyzing network user behavior information
CN107409126A (en) * 2015-02-24 2017-11-28 思科技术公司 System and method for protecting enterprise computing environment safety
CN105989155A (en) * 2015-03-02 2016-10-05 阿里巴巴集团控股有限公司 Method and device for identifying risk behaviors
CN106228388A (en) * 2016-07-14 2016-12-14 乐视控股(北京)有限公司 A kind of member user's behavior monitoring method, device and electronic equipment
CN107612882A (en) * 2017-08-03 2018-01-19 北京奇安信科技有限公司 A kind of user behavior recognition method and device based on middle daily record

Cited By (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109255518A (en) * 2018-08-01 2019-01-22 阿里巴巴集团控股有限公司 Data application risk appraisal procedure, device and system
CN109166031A (en) * 2018-08-15 2019-01-08 吉林亿联银行股份有限公司 A kind of reference inquiry method for prewarning risk and device
CN109102392A (en) * 2018-08-15 2018-12-28 吉林亿联银行股份有限公司 A kind of reference inquiry method for prewarning risk and device
CN109189657A (en) * 2018-08-17 2019-01-11 中国平安人寿保险股份有限公司 A kind of recording method, storage medium and the server of user's operation behavior
CN109189657B (en) * 2018-08-17 2024-04-02 中国平安人寿保险股份有限公司 Recording method of user operation behaviors, storage medium and server
CN109684863A (en) * 2018-09-07 2019-04-26 平安科技(深圳)有限公司 Data leakage prevention method, device, equipment and storage medium
CN109684863B (en) * 2018-09-07 2024-01-19 平安科技(深圳)有限公司 Data leakage prevention method, device, equipment and storage medium
CN110046245A (en) * 2018-11-27 2019-07-23 阿里巴巴集团控股有限公司 A kind of data monitoring method and device, a kind of calculating equipment and storage medium
CN110046245B (en) * 2018-11-27 2023-11-17 创新先进技术有限公司 Data monitoring method and device, computing equipment and storage medium
CN109918899A (en) * 2019-01-23 2019-06-21 平安科技(深圳)有限公司 Server, employee reveal the prediction technique and storage medium of company information
CN109918278A (en) * 2019-01-24 2019-06-21 平安科技(深圳)有限公司 Monitoring method, device and the computer storage medium of the number of operations of custom system
CN109903045B (en) * 2019-01-24 2024-05-03 平安科技(深圳)有限公司 Behavior track monitoring method, device, computer equipment and medium
CN109903045A (en) * 2019-01-24 2019-06-18 平安科技(深圳)有限公司 Action trail monitoring method, device, computer equipment and medium
CN109872234A (en) * 2019-01-24 2019-06-11 平安科技(深圳)有限公司 Trading activity monitoring method, device, computer equipment and medium
CN109918278B (en) * 2019-01-24 2022-03-11 平安科技(深圳)有限公司 Method and device for monitoring operation times of user system and computer storage medium
CN110417721B (en) * 2019-03-07 2021-10-26 腾讯科技(深圳)有限公司 Security risk assessment method, device, equipment and computer readable storage medium
CN110417721A (en) * 2019-03-07 2019-11-05 腾讯科技(深圳)有限公司 Safety risk estimating method, device, equipment and computer readable storage medium
CN109933705A (en) * 2019-03-22 2019-06-25 国家电网有限公司 A kind of big data platform operation management system
CN110175083A (en) * 2019-04-16 2019-08-27 平安科技(深圳)有限公司 The monitoring method and device of operating system
CN110097289A (en) * 2019-05-09 2019-08-06 深圳前海微众银行股份有限公司 Risk monitoring and control method, apparatus, equipment and computer readable storage medium
CN110175109A (en) * 2019-05-31 2019-08-27 北京北信源软件股份有限公司 A kind of determination method, determining device, equipment and the medium of user type
CN110493181A (en) * 2019-07-05 2019-11-22 中国平安财产保险股份有限公司 User behavior detection method, device, computer equipment and storage medium
CN110445637A (en) * 2019-07-05 2019-11-12 深圳壹账通智能科技有限公司 Event-monitoring method, system, computer equipment and storage medium
CN110445637B (en) * 2019-07-05 2022-08-09 深圳壹账通智能科技有限公司 Event monitoring method, system, computer device and storage medium
CN110365698A (en) * 2019-07-29 2019-10-22 杭州数梦工场科技有限公司 Methods of risk assessment and device
CN110532158B (en) * 2019-09-03 2024-01-19 南方电网科学研究院有限责任公司 Safety evaluation method, device and equipment for operation data and readable storage medium
CN110532158A (en) * 2019-09-03 2019-12-03 南方电网科学研究院有限责任公司 Safety evaluation method, device, equipment and the readable storage medium storing program for executing of operation data
CN112580089A (en) * 2019-09-30 2021-03-30 奇安信安全技术(珠海)有限公司 Information leakage early warning method, device and system, storage medium and electronic device
CN111008123A (en) * 2019-10-23 2020-04-14 贝壳技术有限公司 Database testing method and device, storage medium and electronic equipment
CN111008123B (en) * 2019-10-23 2023-10-24 贝壳技术有限公司 Database testing method and device, storage medium and electronic equipment
CN112861120A (en) * 2019-11-27 2021-05-28 深信服科技股份有限公司 Identification method, device and storage medium
CN111444534A (en) * 2020-03-12 2020-07-24 中国建设银行股份有限公司 Method, device, equipment and computer readable medium for monitoring user operation
CN111581931A (en) * 2020-04-26 2020-08-25 泰康保险集团股份有限公司 Report generation method and device based on data leakage prevention system
CN111581931B (en) * 2020-04-26 2023-08-11 泰康保险集团股份有限公司 Report generation method and device based on data leakage prevention system
CN111639318A (en) * 2020-05-26 2020-09-08 深圳壹账通智能科技有限公司 Wind control method based on gesture monitoring on mobile terminal and related device
CN112182537A (en) * 2020-09-28 2021-01-05 深圳前海微众银行股份有限公司 Monitoring method, device, server, system and storage medium
CN112579408A (en) * 2020-10-29 2021-03-30 上海钱拓网络技术有限公司 Classification method of embedded point information
CN112434949A (en) * 2020-11-25 2021-03-02 平安普惠企业管理有限公司 Service early warning processing method, device, equipment and medium based on artificial intelligence
CN112988772B (en) * 2021-02-08 2023-07-21 平安科技(深圳)有限公司 Behavior data monitoring method, device, equipment and medium
CN112988772A (en) * 2021-02-08 2021-06-18 平安科技(深圳)有限公司 Behavior data monitoring method, device, equipment and medium
CN113434537A (en) * 2021-06-02 2021-09-24 上海数禾信息科技有限公司 Data processing method and device based on data acquisition
CN113570201A (en) * 2021-06-30 2021-10-29 北京达佳互联信息技术有限公司 Data processing method, device, equipment, storage medium and program product
CN113610535A (en) * 2021-07-29 2021-11-05 浙江惠瀜网络科技有限公司 Risk monitoring method and device suitable for consumption staging business process
CN115174224A (en) * 2022-07-06 2022-10-11 北京神州慧安科技有限公司 Information safety monitoring method and device suitable for industrial control network
CN115174224B (en) * 2022-07-06 2024-02-23 北京神州慧安科技有限公司 Information security monitoring method and device suitable for industrial control network

Similar Documents

Publication Publication Date Title
CN108304308A (en) User behavior monitoring method, device, computer equipment and storage medium
US11853290B2 (en) Anomaly detection
US11188619B2 (en) Single click delta analysis
US10380002B1 (en) User interface for specifying data stream processing language programs for analyzing instrumented software
US20180248902A1 (en) Malicious activity detection on a computer network and network metadata normalisation
US10353799B2 (en) Testing and improving performance of mobile application portfolios
US20190028557A1 (en) Predictive human behavioral analysis of psychometric features on a computer network
CN108304704A (en) Authority control method, device, computer equipment and storage medium
CN109284269A (en) Abnormal log analysis method, device, storage medium and server
US20180246797A1 (en) Identifying and monitoring normal user and user group interactions
CN107622084A (en) Blog management method, system and computer-readable recording medium
CN111581054A (en) ELK-based log point-burying service analysis and alarm system and method
US11042525B2 (en) Extracting and labeling custom information from log messages
CN108509313A (en) A kind of business monitoring method, platform and storage medium
CN112527600A (en) Monitoring log processing method, device, equipment and storage medium
CN109684863A (en) Data leakage prevention method, device, equipment and storage medium
US7310592B2 (en) Method and apparatus to group sets of computers into classes for statistical analysis
Lavazza et al. An empirical study on the factors affecting software development productivity
US11030024B2 (en) Assigning a severity level to a computing service using tenant telemetry data
CN110113208A (en) Alarm information processing method, device, equipment and computer readable storage medium
US20140156339A1 (en) Operational risk and control analysis of an organization
CN114637685A (en) Performance test method, device, equipment and medium of application program in bank system
Vogel et al. Security Compliance Monitoring–The next Evolution of Information Security Management?!
US11743274B2 (en) Systems and methods for fraud management
CN111177537B (en) Data exchange processing method, device, equipment and medium based on parallel processing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180720

RJ01 Rejection of invention patent application after publication