CN108509793A - A kind of user's anomaly detection method and device based on User action log data - Google Patents

A kind of user's anomaly detection method and device based on User action log data Download PDF

Info

Publication number
CN108509793A
CN108509793A CN201810306815.0A CN201810306815A CN108509793A CN 108509793 A CN108509793 A CN 108509793A CN 201810306815 A CN201810306815 A CN 201810306815A CN 108509793 A CN108509793 A CN 108509793A
Authority
CN
China
Prior art keywords
user
action log
word
lda
user action
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810306815.0A
Other languages
Chinese (zh)
Inventor
曾毅
彭洪涛
喻波
王志海
董爱华
安鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wondersoft Technology Co Ltd
Original Assignee
Beijing Wondersoft Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wondersoft Technology Co Ltd filed Critical Beijing Wondersoft Technology Co Ltd
Priority to CN201810306815.0A priority Critical patent/CN108509793A/en
Publication of CN108509793A publication Critical patent/CN108509793A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Abstract

The invention discloses a kind of user's anomaly detection methods and device based on User action log data, and this approach includes the following steps:User journal data are acquired, and are normalized;Score value assessment is carried out to new collected User action log by LDA analysis models;When point value of evaluation is less than predetermined score value, determine that freshly harvested User action log is suspicious user user behaviors log;It determines the corresponding user terminal of suspicious user user behaviors log and application software, and generates warning information.Technical solution through the invention can quickly find the abnormal behaviour of user, alarm in time to administrator or user, improve processing and threaten discovery treatment effeciency;It is completed with intimate speed in real time, enhances system audit function and the timeliness of alarm function.

Description

A kind of user's anomaly detection method and device based on User action log data
Technical field
The present invention relates to data security arts, and in particular to a kind of user's abnormal behaviour based on User action log data Detection method.
Background technology
LDA (Latent Dirichlet Allocation) is that a kind of document subject matter generates model, also referred to as one three layers Bayesian probability model, including word, theme and document three-decker.So-called generation model, that is, it is believed that an article Each word be by " with some theme of certain probability selection, and with some word of certain probability selection from this theme Such a process of language " obtains.Document obeys multinomial distribution to theme, and theme to word obeys multinomial distribution.
LDA is a kind of non-supervisory machine learning techniques, can be used for identifying extensive document sets (document Collection the subject information) or in corpus (corpus) hidden.The method that it uses bag of words (bag of words), Each document is considered as a word frequency vector by this method, is believed for ease of the number of modeling to convert text message Breath.
User behavior analysis refers to being counted, being analyzed to related data, therefrom in the case where obtaining master data It was found that the rule of user behavior.
Such as Fig. 1, A-NIDS frames in the prior art include mainly three phases:
1. the stage of parametrization:System will be collected into information and format or pre-process in a predetermined manner.
2. the training stage:Classified according to the performance of normally performed activity feature, then establishes corresponding model.
3. detection-phase:System model training is completed and be can be used, and is compared with obtained data on flows, if it find that partially When difference is more than given threshold values, system will give a warning, and generate examining report.
For the prior art, need to solve following technical problem:
1. acquisition and the normalized of user behavior data.
2. the foundation of the machine learning LDA models based on spark.
3. the alarm of abnormal behaviour result is shown.
Invention content
In order to solve the above technical problems, the present invention provides a kind of user's abnormal behaviours based on User action log data Detection method, which is characterized in that this approach includes the following steps:
1) user journal data are acquired, and are normalized;
2) score value assessment is carried out to new collected User action log by LDA analysis models;
3) when point value of evaluation is less than predetermined score value, determine that freshly harvested User action log is suspicious user behavior day Will;
4) the corresponding user terminal of suspicious user user behaviors log and application software are determined, and generates warning information.
With the method for the invention it is preferred to, in the LDA analysis models, User action log data include following word Language:User ID, user terminal ID, application software coding, operating time, action type are analyzed based on these words according to LDA is established Document, theme needed for mode input calculate the probability of every User action log appearance, and will then according to LDA algorithm Score value of the probability as this User action log.
With the method for the invention it is preferred to, each word occurs in collection of document in the User action log Probability stamps are:It is newly acquired according to the determine the probability The score value of the User action log arrived.
With the method for the invention it is preferred to, before the step 1), LDA is trained by User action log data Analysis model;
Using user journal data as the document of training LDA analysis models, the word formed after user's operation data processing As the word of trained LDA analysis models, theme of the theme as trained LDA analysis models in terms of user's operation type.
With the method for the invention it is preferred to, User action log data are divided into two words;
One of word includes:User ID, user terminal ID, application software type and operating time;
Another word includes:Action type, operation duration, request field reference numeral, response field number.
In order to solve the above technical problems, the present invention provides a kind of user's abnormal behaviours based on User action log data Detection device, which is characterized in that the device includes:
Digital sampling and processing acquires user journal data, and is normalized;
Score value evaluation module carries out score value assessment by LDA analysis models to new collected User action log;
Score value judgment module determines that freshly harvested User action log is suspicious when point value of evaluation is less than predetermined score value User action log;
Alarm module determines the corresponding user terminal of suspicious user user behaviors log and application software, and generates alarm letter Breath.
The apparatus according to the invention, it is preferred that in the LDA analysis models, User action log data include following word Language:User ID, user terminal ID, application software coding, operating time, action type are analyzed based on these words according to LDA is established Document, theme needed for mode input calculate the probability of every User action log appearance, and will then according to LDA algorithm Score value of the probability as this User action log.
The apparatus according to the invention, it is preferred that each word occurs in collection of document in the User action log Probability stamps areIt is newly collected according to the determine the probability User action log score value.
The apparatus according to the invention, it is preferred that the device further includes model training module, passes through User action log data Training LDA analysis models;
Using user journal data as the document of training LDA analysis models, the word formed after user's operation data processing As the word of trained LDA analysis models, theme of the theme as trained LDA analysis models in terms of user's operation type.
The apparatus according to the invention, it is preferred that User action log data are divided into two words;
One of word includes:User ID, user terminal ID, application software type and operating time;
Another word includes:Action type, operation duration, request field reference numeral, response field number.
In order to solve the above technical problems, the present invention provides a kind of computer readable storage medium, which has meter Calculation machine program instruction is realized when executing the computer program instructions such as one of above-mentioned method.
Technical solution using the present invention achieves following technique effect:
1. Function Extension:Machine learning abnormal behaviour analysis method based on User action log can quickly find user Abnormal behaviour, alarm in time to administrator or user, improve processing and threaten and find treatment effeciency.
2. real-time:Machine learning LDA analysis models based on spark make the analysis of data with intimate real-time speed It completes, enhances system audit function and the timeliness of alarm function.
Description of the drawings
Fig. 1 is prior art data analysis flowcharts;
Fig. 2 is the user behavior anomaly flow chart of the present invention.
Specific implementation mode
LDA (Latent Dirichlet Allocation) is that a kind of document subject matter generates model, also referred to as one three layers Bayesian probability model, including word, theme and document three-decker.So-called generation model, that is, it is believed that an article Each word be by " with some theme of certain probability selection, and with some word of certain probability selection from this theme Such a process of language " obtains.Document obeys multinomial distribution to theme, and theme to word obeys multinomial distribution.
LDA is a kind of non-supervisory machine learning techniques, can be used for identifying extensive document sets (document Collection the subject information) or in corpus (corpus) hidden.The method that it uses bag of words (bag of words), Each document is considered as a word frequency vector by this method, is believed for ease of the number of modeling to convert text message Breath.But bag of words method does not account for the sequence between word and word, this simplifies the complex natures of the problem, while being also changing for model Into providing opportunity.The probability distribution that some themes of each documents representative are constituted, and each theme represents Probability distribution that many words are constituted.
LDA generating process
For every document in corpus, LDA defines following generating process (generativeprocess):
1. pair each document extracts a theme from theme distribution;
2. extracting a word from the word distribution corresponding to the above-mentioned theme being pumped to;
3. repeating the above process each word until in traversal document.
One multinomial point of each document in corpus and T (given in advance by the methods of repetition test) a theme Cloth (multinomialdistribution) is corresponding, which is denoted as θ.Each theme and and vocabulary (vocabulary) multinomial distribution of V word in is corresponding, this multinomial distribution is denoted as φ.
LDA overall flows
First define the meaning of some letters:Collection of document D, theme (topic) set T
Each document d regards a word sequence as in D<w1,w2,...,wn>, wi indicates i-th of word, if d has n list Word.(being referred to as wordbag inside LDA, the appearance position of actually each word is on LDA algorithm without influencing)
All various words involved in D form a big collection VOCABULARY (abbreviation VOC), and LDA is with collection of document D As input, it is desirable to two result vectors (set and be polymerized to k topic, include m word altogether in VOC) trained:
To the document d in each D, the probability θ d of different Topic are corresponded to<pt1,...,ptk>, wherein pti indicates d pairs Answer the probability of i-th of topic in T.Computational methods are intuitive, pti=nti/n, and wherein nti indicates i-th corresponding in d The number of the word of topic, n are the sums of all words in d.
To the topict in each T, the probability φ t of various words are generated<pw1,...,pwm>, wherein pwi indicates t lifes At the probability of i-th of word in VOC.Computational methods are equally very intuitive, and pwi=Nwi/N, wherein Nwi expression correspond to topict VOC in i-th of word number, N indicates all total words for corresponding to topict.
The core formula of LDA is as follows:
P (w | d)=p (w | t) * p (t | d)
It intuitively sees this formula, is exactly that can give text by current θ d and φ t using Topic as middle layer There is the probability of word w in shelves d.Wherein p (t | d) it is calculated using θ d, p (w | t) it is calculated using φ t.
In fact, using current θ d and φ t, we can be that a word in a document calculates its correspondence arbitrarily P (w | d) when one Topic, then according to these results come update this word should corresponding topic.Then, if this Update changes the Topic corresponding to this word, will influence θ d and φ t in turn.[2]
LDA learning processes
When LDA algorithm starts, first randomly give θ d and φ t assignment (to all d and t).Then the above process is constantly heavy Multiple, the result finally converged to is exactly the output of LDA.The specifically once learning process of this iteration again:
It, can be with if enabling the corresponding topic of the word for tj 1. for the i-th word wi in specific document ds Above-mentioned formula is rewritten as:
Pj (wi | ds)=p (wi | tj) * p (tj | ds)
2. we can enumerate the topic in T now, all pj (wi | ds), wherein 1~k of j values are obtained.Then may be used To be that i-th of word wi in ds selects a topic according to these probability value results.Simplest idea be take enable pj (wi | Ds) maximum tj (note that it is variable there was only j in this formula), i.e. argmax [j] pj (wi | ds)
3., will be to θ then, if i-th of word wi in ds has selected one and original different topic herein D and φ t have an impact and (one can readily appreciate that according to the calculation formula of the two aforementioned vectors).Their influence It can influence the calculating to p above-mentioned (w | d) in turn again.P's (w | d) is carried out to all w in d all in D It calculates and reselects topic and regard an iteration as.After carrying out n times loop iteration in this way, it is required LDA will to be converged to As a result.
Below in conjunction with the accompanying drawings and specific embodiment the present invention is further illustrated, but protection scope of the present invention is simultaneously It is without being limited thereto.
<User's anomaly detection method>
Referring to such as Fig. 2, steps are as follows for behavioral value:
(1) business diary of each system is acquired by log acquisition module.Collected data are passed through into association Analysis forms the User action log that can describe user behavior.The User action log of generation is normalized.Return Daily record after at one change can describe what which when a user on which station terminal has carried out using (app) by Operation.Treated, and message field includes:
Receive the time of data
Operation duration
Terminal ID number
ID users
Application software encodes
Action type (increases, deletes, looking into, changing)
The length (byte number) of required parameter
The length (byte number) of response results
(2) judge that LDA analysis models whether there is, if it does not exist, then establishing the machine learning LDA (texts based on spark Shelves topic model) analysis model, using the user behavior data of input as input document, by large volume document data to model into Row training, obtains convergent result.Trained model is preserved.If it does, to new collected user behavior number According to analysis marking is carried out, a threshold values is set, when score value is less than threshold values, it is believed that the behavior is suspicious actions.
(3) warning message is generated according to the suspicious actions data of generation, is shown in the warning message Show board of front end page Show, alarm is made to administrator.
Clustering algorithm (LDA):
LDA, which can be used for identifying in extensive document sets (document collection) or corpus (corpus), to dive The subject information of Tibetan.Each document is considered as a word by the method that it uses bag of words (bag of words), this method Frequency vector, to which text message to be converted to the digital information for ease of modeling.But bag of words method do not account for word and word it Between sequence, this simplifies the complex natures of the problem, while also providing opportunity for the improvement of model.Each documents representative one The probability distribution that a little themes are constituted, and each theme represents the probability distribution that many words are constituted.
LDA is considered a following cluster process:
(1) each theme (Topics) corresponds to all kinds of " barycenter ", and each document is considered as one in data set Sample.
(2) theme and document are considered to there are in a vector space, each feature vector in this vector space All it is word frequency (bag of words)
(3) from using unlike being weighed using range formula in traditional clustering method, LDA is using one based on counting The equation of model, and this statistical model discloses how these documents all generate.
It is based on a common-sense and assumes:All texts in collection of document share a certain number of implicit themes.Base In this it is assumed that entire document sets are characterized as the set of implicit theme by it, and every text is represented as these implicit themes Special ratios mixing.The core formula of LDA is as follows:
D represents certain document, and w represents some word, zkThe i-th theme is represented, K theme is shared.Popular understanding is:Text Shelves d belongs to theme z with certain probabilityk, i.e. p (zk| d), and theme zkThe lower prior probability for word w occur be p (w | zk), therefore In theme zkUnder, probability that word w occurs in document be p (w | zk)*p(zk| d), nature ti under all themes document:K occurs The probability of word w adds up, and is exactly the Probability p (w | d) (word frequency) for occurring word w in document d.
LDA is a level Bayesian model, and the parameter of model is also regarded as stochastic variable, so as to introduce control ginseng Several parameters is realized thoroughly " randomization ".The prior distribution of the Dirichlet of LDA models, the multinomial of theme on document d Distribution.Currently, parameter Estimation is the most important tasks of LDA, there are mainly two types of methods:Gibbs samplings (it is computationally intensive, but phase To simple and accurate) and variational Bayesian method (calculation amount is small, and precision degree is weak).
User behavior analysis LDA models are established to include the following steps:
(1) LDA (LATENT DIRICHLET ALLOCATION) document subject matter model brief introduction
LDA is a kind of non-supervisory machine learning techniques, can be used for identifying extensive document sets (document Collection the subject information) or in corpus (corpus) hidden.The method that it uses bag of words (bag of words), Each document is considered as a word frequency vector by this method, is believed for ease of the number of modeling to convert text message Breath.The probability distribution that some themes of each documents representative are constituted, and each theme represents many words The probability distribution constituted.If we will generate a document, the probability that each word inside it occurs is:
(2) document subject matter corresponding with LDA models is defined as follows in the present invention:
Model User action logs
Document UserAction data
The word formed after word UserAction data processings
Theme in terms of topic user behaviors
The essence of LDA model trainings is to obtain the probability-distribution function of a word in a document, then general according to this Rate distribution function generates a word every time.Therefore, significant in order to make the LDA model trainings based on User action log obtain As a result, word segmentation processing must be carried out to the User action log that is collected into because the later data of normalized include very More fields, these data there is no repeatability, the model of convergence meaning can not be directly trained by these data.
(3) word segmentation processing of User action log
It is divided to every User action log to two independent words (word), respectively userid_hardwareid_ appcode_trhour、actionType_duration_resLen_reqLen.The specific establishment rule of word is as follows:
Time of day (time)
Use the trhour fields in data.The corresponding hour numerical value for generating time when operating.
Request Bytes (size of required parameter)
Use the number of the respective bins corresponding to the resLen field respective values in data.As follows [0,512, 1024,2048,4096 ...], unit is byte number, if resLen is equal to 256 bytes, corresponding value is 1;If ResLen is equal to 760 bytes, then corresponding value is 2.
Response Bytes (sizes of response results)
Use the number of the respective bins corresponding to the reqLen field respective values in data.As follows [0,512, 1024,2048,4096 ...], unit is byte number, if resLen is equal to 256 bytes, corresponding value is 1;If ResLen is equal to 760 bytes, then corresponding value is 2.
ActionType (action type)
0 corresponds to increase;1 corresponds to deletion;2 correspond to inquiry;3 correspond to modification.
Duration (operation duration)
The number in section where time of the whole operation from request to response corresponds to, as follows [0,10,20,30,40, 50,60,70 ...], unit is the second, if duration is equal to 10 seconds, corresponding value is 2.
Word generates example
A. a User action log is userid:1200211123456789,hardwareid:000426, duration:20,trhour:10,appcode:100026,resLen:100,reqLen:200, actionType;1.It generates Word be:
I, first words are:“1200211123456789_000426_100026_10”.
II words of second are:“1_1_2_2_4”.
The threat detection system based on User action log of the present invention is applied in the big data analysis system of certain enterprise, The system effectively alarms to abnormal behaviour.
Scheme through the invention, the machine learning abnormal behaviour analysis method based on User action log can quickly be sent out The abnormal behaviour at current family is alarmed to administrator or user in time, is improved processing and is threatened discovery treatment effeciency.Based on spark Machine learning LDA analysis models make the analysis of data with it is intimate in real time speed complete, enhance system audit function and The timeliness of alarm function.
Example of the above example only as protection scheme of the present invention does not limit the specific implementation mode of the present invention It is fixed.

Claims (11)

1. a kind of user's anomaly detection method based on User action log data, which is characterized in that this method include with Lower step:
1) user journal data are acquired, and are normalized;
2) score value assessment is carried out to new collected User action log by LDA analysis models;
3) when point value of evaluation is less than predetermined score value, determine that freshly harvested User action log is suspicious user user behaviors log;
4) the corresponding user terminal of suspicious user user behaviors log and application software are determined, and generates warning information.
2. according to the method described in claim 1, in the LDA analysis models, User action log data include following word: User ID, user terminal ID, application software coding, operating time, action type analyze mould based on these words according to LDA is established Document, theme needed for type input calculate the probability of every User action log appearance, and should then according to LDA algorithm Score value of the probability as this User action log.
3. according to the method described in claim 2, in the User action log each word occur in collection of document it is general Rate is identified as:It is newly collected according to the determine the probability User action log score value.
4. according to the method described in claim 1, before the step 1), LDA points are trained by User action log data Analyse model;
Using user journal data as the document of training LDA analysis models, the word conduct formed after user's operation data processing The word of LDA analysis models is trained, theme of the theme as training LDA analysis models in terms of user's operation type.
5. according to the method described in claim 1, User action log data are divided into two words;
One of word includes:User ID, user terminal ID, application software type and operating time;
Another word includes:Action type, operation duration, request field reference numeral, response field number.
6. a kind of user's unusual checking device based on User action log data, which is characterized in that the device includes:
Digital sampling and processing acquires user journal data, and is normalized;
Score value evaluation module carries out score value assessment by LDA analysis models to new collected User action log;
Score value judgment module determines that freshly harvested User action log is suspicious user when point value of evaluation is less than predetermined score value User behaviors log;
Alarm module determines the corresponding user terminal of suspicious user user behaviors log and application software, and generates warning information.
7. device according to claim 6, in the LDA analysis models, User action log data include following word: User ID, user terminal ID, application software coding, operating time, action type analyze mould based on these words according to LDA is established Document, theme needed for type input calculate the probability of every User action log appearance, and should then according to LDA algorithm Score value of the probability as this User action log.
8. device according to claim 7, each word occurs general in collection of document in the User action log Rate is identified asIt is newly collected according to the determine the probability The score value of User action log.
9. device according to claim 6, which further includes model training module, is instructed by User action log data Practice LDA analysis models;
Using user journal data as the document of training LDA analysis models, the word conduct formed after user's operation data processing The word of LDA analysis models is trained, theme of the theme as training LDA analysis models in terms of user's operation type.
10. User action log data are divided into two words by device according to claim 6;
One of word includes:User ID, user terminal ID, application software type and operating time;
Another word includes:Action type, operation duration, request field reference numeral, response field number.
11. a kind of computer readable storage medium, which has computer program instructions, when the execution computer program When instruction, realize such as one of above-mentioned method.
CN201810306815.0A 2018-04-08 2018-04-08 A kind of user's anomaly detection method and device based on User action log data Pending CN108509793A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810306815.0A CN108509793A (en) 2018-04-08 2018-04-08 A kind of user's anomaly detection method and device based on User action log data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810306815.0A CN108509793A (en) 2018-04-08 2018-04-08 A kind of user's anomaly detection method and device based on User action log data

Publications (1)

Publication Number Publication Date
CN108509793A true CN108509793A (en) 2018-09-07

Family

ID=63381023

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810306815.0A Pending CN108509793A (en) 2018-04-08 2018-04-08 A kind of user's anomaly detection method and device based on User action log data

Country Status (1)

Country Link
CN (1) CN108509793A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109218321A (en) * 2018-09-25 2019-01-15 北京明朝万达科技股份有限公司 A kind of network inbreak detection method and system
CN109325232A (en) * 2018-09-25 2019-02-12 北京明朝万达科技股份有限公司 A kind of user behavior exception analysis method, system and storage medium based on LDA
CN110162445A (en) * 2019-05-23 2019-08-23 中国工商银行股份有限公司 The host health assessment method and device of Intrusion Detection based on host log and performance indicator
CN110378124A (en) * 2019-07-19 2019-10-25 杉树岭网络科技有限公司 A kind of network security threats analysis method and system based on LDA machine learning
CN111368534A (en) * 2018-12-25 2020-07-03 中国移动通信集团浙江有限公司 Application log noise reduction method and device
CN112765003A (en) * 2020-12-31 2021-05-07 北方工业大学 Risk prediction method based on APP behavior log
CN114254716A (en) * 2022-03-02 2022-03-29 浙江鹏信信息科技股份有限公司 High-risk operation identification method and system based on user behavior analysis
CN114721861A (en) * 2022-05-23 2022-07-08 北京必示科技有限公司 Fault positioning method and system based on log differentiation comparison

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1649311A (en) * 2005-03-23 2005-08-03 北京首信科技有限公司 Detecting system and method for user behaviour abnormal based on machine study
CN103853841A (en) * 2014-03-19 2014-06-11 北京邮电大学 Method for analyzing abnormal behavior of user in social networking site
CN104424354A (en) * 2013-08-27 2015-03-18 国际商业机器公司 Detecting Anomalous User Behavior Using Generative Models of User Actions
US20150186901A1 (en) * 2008-06-12 2015-07-02 Tom Miltonberger Fraud detection and analysis
CN106021620A (en) * 2016-07-14 2016-10-12 北京邮电大学 Method for realizing automatic detection for power failure event by utilizing social contact media
CN107798083A (en) * 2017-10-17 2018-03-13 广东广业开元科技有限公司 A kind of information based on big data recommends method, system and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1649311A (en) * 2005-03-23 2005-08-03 北京首信科技有限公司 Detecting system and method for user behaviour abnormal based on machine study
US20150186901A1 (en) * 2008-06-12 2015-07-02 Tom Miltonberger Fraud detection and analysis
CN104424354A (en) * 2013-08-27 2015-03-18 国际商业机器公司 Detecting Anomalous User Behavior Using Generative Models of User Actions
CN103853841A (en) * 2014-03-19 2014-06-11 北京邮电大学 Method for analyzing abnormal behavior of user in social networking site
CN106021620A (en) * 2016-07-14 2016-10-12 北京邮电大学 Method for realizing automatic detection for power failure event by utilizing social contact media
CN107798083A (en) * 2017-10-17 2018-03-13 广东广业开元科技有限公司 A kind of information based on big data recommends method, system and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
韩群: "LDA模型下的APT通信日志特征研究", 《中国优秀硕士学位论文全文数据库》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109218321A (en) * 2018-09-25 2019-01-15 北京明朝万达科技股份有限公司 A kind of network inbreak detection method and system
CN109325232A (en) * 2018-09-25 2019-02-12 北京明朝万达科技股份有限公司 A kind of user behavior exception analysis method, system and storage medium based on LDA
CN111368534A (en) * 2018-12-25 2020-07-03 中国移动通信集团浙江有限公司 Application log noise reduction method and device
CN110162445A (en) * 2019-05-23 2019-08-23 中国工商银行股份有限公司 The host health assessment method and device of Intrusion Detection based on host log and performance indicator
CN110378124A (en) * 2019-07-19 2019-10-25 杉树岭网络科技有限公司 A kind of network security threats analysis method and system based on LDA machine learning
CN112765003A (en) * 2020-12-31 2021-05-07 北方工业大学 Risk prediction method based on APP behavior log
CN112765003B (en) * 2020-12-31 2021-09-14 北方工业大学 Risk prediction method based on APP behavior log
CN114254716A (en) * 2022-03-02 2022-03-29 浙江鹏信信息科技股份有限公司 High-risk operation identification method and system based on user behavior analysis
CN114721861A (en) * 2022-05-23 2022-07-08 北京必示科技有限公司 Fault positioning method and system based on log differentiation comparison

Similar Documents

Publication Publication Date Title
CN108509793A (en) A kind of user&#39;s anomaly detection method and device based on User action log data
Niyaz et al. A deep learning approach for network intrusion detection system
WO2017084586A1 (en) Method , system, and device for inferring malicious code rule based on deep learning method
CN110781317A (en) Method and device for constructing event map and electronic equipment
CN108255805A (en) The analysis of public opinion method and device, storage medium, electronic equipment
CN104077417B (en) People tag in social networks recommends method and system
CN105868108A (en) Instruction-set-irrelevant binary code similarity detection method based on neural network
CN106354818B (en) Social media-based dynamic user attribute extraction method
Olmezogullari et al. Representation of click-stream datasequences for learning user navigational behavior by using embeddings
CN108549658A (en) A kind of deep learning video answering method and system based on the upper attention mechanism of syntactic analysis tree
CN104484343A (en) Topic detection and tracking method for microblog
CN110197389A (en) A kind of user identification method and device
CN109325232A (en) A kind of user behavior exception analysis method, system and storage medium based on LDA
CN114330966A (en) Risk prediction method, device, equipment and readable storage medium
CN108040053A (en) A kind of network security threats analysis method and system based on DNS daily record datas
CN112667979A (en) Password generation method and device, password identification method and device, and electronic device
CN109299286A (en) The Knowledge Discovery Method and system of unstructured data
CN110149280B (en) Network traffic classification method and device
CN105468731A (en) Preprocessing method of text sentiment analysis characteristic verification
CN110674370A (en) Domain name identification method and device, storage medium and electronic equipment
CN108173818A (en) A kind of network security threats analysis method and system based on Proxy daily record datas
CN110309355A (en) Generation method, device, equipment and the storage medium of content tab
CN111723182A (en) Key information extraction method and device for vulnerability text
CN106815199A (en) Protocol type analysis method and device based on machine learning
CN112463964B (en) Text classification and model training method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180907

RJ01 Rejection of invention patent application after publication