CN109344042A - Recognition methods, device, equipment and the medium of abnormal operation behavior - Google Patents

Recognition methods, device, equipment and the medium of abnormal operation behavior Download PDF

Info

Publication number
CN109344042A
CN109344042A CN201810961289.1A CN201810961289A CN109344042A CN 109344042 A CN109344042 A CN 109344042A CN 201810961289 A CN201810961289 A CN 201810961289A CN 109344042 A CN109344042 A CN 109344042A
Authority
CN
China
Prior art keywords
operation behavior
preference
cloud
predicted
abnormal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810961289.1A
Other languages
Chinese (zh)
Other versions
CN109344042B (en
Inventor
梁露露
常文娟
宋岩蔚
李玉志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhongce Anhua Technology Co Ltd
Original Assignee
Beijing Zhongce Anhua Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhongce Anhua Technology Co Ltd filed Critical Beijing Zhongce Anhua Technology Co Ltd
Priority to CN201810961289.1A priority Critical patent/CN109344042B/en
Publication of CN109344042A publication Critical patent/CN109344042A/en
Application granted granted Critical
Publication of CN109344042B publication Critical patent/CN109344042B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions

Abstract

The invention discloses the recognition methods of abnormal operation behavior, device, equipment and media.This method comprises: obtaining historical operation behavior set according to the user behaviors log of multiple cloud operators;According to the user behaviors log of the first cloud operator, preference operation behavior set is obtained;Calculate the similarity of every kind of operation behavior in the every kind of operation behavior and preference operation behavior set in historical operation behavior set;Predicted operation behavior set is generated according to similarity;According to predicted operation behavior set, identify whether practical operation behavior of the first cloud operator in each preset time period of the second predetermined period is abnormal operation behavior.According to the technical solution of the present invention, the abnormal behaviour of cloud operator can be identified, in time so as to full-scope safeguards user's right.

Description

Recognition methods, device, equipment and the medium of abnormal operation behavior
Technical field
The present invention relates to cloud computing security fields more particularly to a kind of recognition methods of abnormal operation behavior, device, equipment And computer-readable medium.
Background technique
Cloud computing, which refers to, is managed collectively by virtualization technology and dispatches the resources such as calculating, storage, network, software, uses The services such as basic resource, platform capabilities, software application are supplied to user by the Internet model.In brief, cloud computing is exactly to use The management to data is realized by cloud computing platform by data and business migration to cloud platform in family.
Obviously, the substantive characteristics of cloud computing mode is data ownership and administrative power separation.Therefore, it is used under cloud computing mode Family loses direct control for oneself data and operation system on cloud, and cloud management person objectively has steathily Peep, steal the ability of user data and computing resource.
For the malicious act of cloud management person, traditional security strategy is difficult to take precautions against, and can not determine current cloud operator It whether is legal cloud operator, therefore can not full-scope safeguards user's right.
Summary of the invention
The embodiment of the invention provides a kind of recognition methods of abnormal operation behavior, device, equipment and computer-readable Jie Matter can identify the abnormal behaviour of cloud operator, in time so as to full-scope safeguards user's right.
One side according to an embodiment of the present invention provides a kind of recognition methods of abnormal operation behavior, this method comprises:
According to the user behaviors log of multiple cloud operators, historical operation behavior set, the historical operation behavior set are obtained It is made of the multiple cloud operator in the various operation behaviors of the first predetermined period;
According to the user behaviors log of the first cloud operator, preference operation behavior set, the preference operation behavior set are obtained By the first cloud operator, the various operation behaviors of preference are constituted in the preset time period of first predetermined period;
Calculate every kind of operation behavior in the historical operation behavior set with it is every in the preference operation behavior set The similarity of kind operation behavior;
Generate predicted operation behavior set according to the similarity, the predicted operation behavior set by predict described the Various operation behaviors of the one cloud operator in the preset time period of the second predetermined period are constituted;
According to the predicted operation behavior set, identify the first cloud operator in each of described second predetermined period Whether the practical operation behavior in the preset time period is abnormal operation behavior.
According to another aspect of an embodiment of the present invention, a kind of identification device of abnormal operation behavior is provided, comprising:
First obtains module, for the user behaviors log according to multiple cloud operators, obtains historical operation behavior set, described Historical operation behavior set is made of the multiple cloud operator in the various operation behaviors of the first predetermined period;
Second obtains module, for the user behaviors log according to the first cloud operator, obtains preference operation behavior set, described Preference operation behavior set by the first cloud operator in the preset time period of first predetermined period preference it is various Operation behavior is constituted;
Computing module is gone for calculating every kind of operation behavior in the historical operation behavior set and preference operation For the similarity of every kind of operation behavior in set;
Generation module, for generating predicted operation behavior set according to the similarity;Wherein, the predicted operation behavior Various operation behavior structures of the set by the first cloud operator for predicting in the preset time period of the second predetermined period At;
Identification module, for identifying the first cloud operator described second according to the predicted operation behavior set Whether the practical operation behavior in each of predetermined period preset time period is abnormal operation behavior.
It is according to an embodiment of the present invention in another aspect, provide a kind of identification equipment of abnormal operation behavior, the equipment packet It includes: processor and the memory for being stored with computer program instructions;
The processor realizes abnormal operation behavior as described in relation to the first aspect when executing the computer program instructions Recognition methods.
It is according to an embodiment of the present invention in another aspect, provide a kind of computer readable storage medium, it is described computer-readable It is stored with computer program instructions on storage medium, first aspect institute is realized when the computer program instructions are executed by processor The recognition methods for the abnormal operation behavior stated
Recognition methods, device, equipment and the medium of abnormal operation behavior according to embodiments of the present invention, pass through current cloud The operation behavior of operator and the operation behavior of historical record compare, it can be determined that currently the operation behavior of cloud operator is It is no normal.It can identify the abnormal behaviour of cloud operator, in time in this way so as to full-scope safeguards user's right.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, will make below to required in the embodiment of the present invention Attached drawing is briefly described, for those of ordinary skill in the art, without creative efforts, also Other drawings may be obtained according to these drawings without any creative labor.
Fig. 1 shows the flow diagram of the recognition methods of abnormal operation behavior in the embodiment of the present invention;
Fig. 2 shows the detail flowcharts of the recognition methods of the abnormal operation behavior of some exemplary embodiments;
Fig. 3 show the embodiment of the present invention identification practical operation behavior whether be abnormal operation behavior schematic diagram.
Fig. 4 shows the structural schematic diagram of the identification device of abnormal operation behavior in the embodiment of the present invention.
Fig. 5 shows the hardware structural diagram of the identification equipment of abnormal operation behavior in the embodiment of the present invention.
Specific embodiment
The feature and exemplary embodiment of various aspects of the invention is described more fully below, in order to make mesh of the invention , technical solution and advantage be more clearly understood, with reference to the accompanying drawings and embodiments, the present invention is further retouched in detail It states.It should be understood that specific embodiment described herein is only configured to explain the present invention, it is not configured as limiting the present invention. To those skilled in the art, the present invention can be real in the case where not needing some details in these details It applies.Below the description of embodiment is used for the purpose of better understanding the present invention to provide by showing example of the invention.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence " including ... ", it is not excluded that including There is also other identical elements in the process, method, article or equipment of the element.
The malicious operator of cloud platform or Network Intrusion person are likely to meeting to the hidden of user in embodiments of the present invention Private threatens.It is dangerous in order to avoid occurring, the credible evaluation and test system of cloud platform is designed in existing cloud platform greatly, existing cloud is flat Evaluation and test system that platform is credible includes trusted third party (TTP) gateway.The TTP gateway by logic connect, physics simultaneously The mode of connection is deployed in the front end of tested cloud platform, and the privileged operation of user and cloud operator need to be accessed by TTP gateway Cloud platform.TTP gateway is divided by function as " behavioural analysis of cloud platform privilege and audit " part and " data flow is visual Change, monitor and desensitize " part.
" behavioural analysis of cloud platform privilege and audit " acquires cloud operator for continuing, in real time and grasps to the management of cloud platform It notes down, and the classification mechanism based on cloud operator operation carries out early warning to risky operation and unauthorized operation.
Being somebody's turn to do " behavioural analysis of cloud platform privilege and audit " includes: analysis module and Audit Module, the two modules are mainly Evaluated and tested for two class data, one kind is the behavioral data of collected current cloud operator, it is another kind of be cloud platform The historical operation behavioral data being stored with.
The recognition methods of the embodiment of the present invention is mainly applied to " behavioural analysis of cloud platform privilege and audit ".
In order to better understand the present invention, below in conjunction with attached drawing, abnormal behaviour according to an embodiment of the present invention is described in detail Make the recognition methods of behavior, it should be noted that these embodiments are not for limiting the scope of the present disclosure.
Fig. 1 is the flow chart for showing the recognition methods of abnormal operation behavior according to an embodiment of the present invention.As shown in Figure 1, Method 100 in the embodiment of the present invention the following steps are included:
Step S110 obtains historical operation behavior set, the historical operation row according to the user behaviors log of multiple cloud operators It is made of multiple cloud operators in the various operation behaviors of the first predetermined period for set.
In this step, operation behavior may include: operating function, operation corresponding period, action type and operation Frequency etc..According to the user behaviors log of multiple cloud operators, historical operation behavior set is obtained.Specifically for example: obtaining A, B and C The user behaviors log in a certain fixed time period of three cloud operators, the user behaviors log of these three clouds operator is analyzed Processing, will treated user behaviors log as historical operation behavior set.
In one embodiment, such as: the operation behavior of cloud operator A [starts, open Cloud Server];Cloud operator B Operation behavior [is deleted, delete content M, the area B];Operation behavior [duplication, the area reproducting content N, B] of cloud operator C etc..
In addition, each cloud operator may be there are many operation behavior in one month user behaviors log.Specifically for example: cloud operation There are three types of operation behaviors in 8:00-9:00 (period) by member A:
Operation behavior 1[starts, and opens Cloud Server];Operation behavior 2[is deleted, and deletes content M, the area B, the area C];Operation row For 3[duplication, the area reproducting content N, B, the area C].
Finally, the operation behavior of tri- cloud operators of A, B and C is constituted historical operation behavior set.
Step S120 obtains preference operation behavior set, preference operation behavior according to the user behaviors log of the first cloud operator By the first cloud operator, the various operation behaviors of preference are constituted set in the preset time period of the first predetermined period.
In this step, by the first cloud operator in the preset time period of the first predetermined period preference various operation rows To constitute preference operation behavior set.Specifically, in one embodiment for example: user behaviors log of the cloud operator A in one month. And include in one month user behaviors log: cloud operator A is in 8:00-9:00 period preference (i.e. frequency is higher) a variety of behaviour Make behavior.Such as: the first operation behavior [starting, 10 times];Second of operation behavior [duplication, 8 times].
Step S130, calculate historical operation behavior set in every kind of operation behavior with it is every in preference operation behavior set The similarity of kind operation behavior.
Step S140, according to similarity generate predicted operation behavior set, predicted operation behavior set by predict first Various operation behaviors of the cloud operator in the preset time period of the second predetermined period are constituted.
In this step, such as: the operation within this period of 8:00-9:00 daily in one month of cloud operator A Behavior: operation behavior [start, open Cloud Server, the area A, the area B, 10 times] or operation behavior [duplication, the area reproducting content N, B, The area C, 8 times].
Step S150, according to predicted operation behavior set, the first cloud operator of identification is pre- in each of the second predetermined period If whether the practical operation behavior in the period is abnormal operation behavior.
In this step, such as: the behaviour executed within this period of 8:00-9:00 daily in cloud operator A one month It is predicted operation behavior as behavior is [duplication, the area reproducting content N, B, the area C, 8 times], and the actual operation behavior of cloud operator A It is that the area A executes 20 duplications operation, then it is assumed that cloud operator A is abnormal operation within this period of 8:00-9:00.
The recognition methods of abnormal operation behavior through the embodiment of the present invention, by the preference operation behavior of cloud operator with go through History operation behavior set carries out similarity calculation, according to the ranking results of similarity, predicts cloud operator in the second default week Various operation behaviors in the preset time period of phase determine then according to predicted operation behavior set in the second predetermined period Whether the practical operation behavior in preset time period is normal operation behavior, can identify the exception of cloud operator in time in this way Behavior, so as to full-scope safeguards user's right.
Fig. 2 is to show the detail flowchart of the recognition methods of abnormal operation behavior of some exemplary embodiments, Fig. 2 with Fig. 1 identical or equivalent step uses identical label.
As shown in Fig. 2, in one embodiment, step S120 can specifically include:
S121, according to the user behaviors log of the first cloud operator, the first cloud operator of statistics is in the default of the first predetermined period The execution frequency of every kind of operation behavior in period.
In this step, such as: statistics cloud operator A daily 8:00-9:00 period preference (i.e. frequency in one month It is higher) two kinds of operation behaviors: the first operation behavior [deleting, 20 times];Second of operation behavior [duplication, 10 times].
S122 will execute operation behavior of the frequency greater than the first preset value, as the first cloud operator in the first default week The operation behavior of preference in the preset time period of phase obtains preference operation behavior set.
In this step, such as: by cloud operator A the first of 8:00-9:00 period preference daily in one month Kind operation behavior [is deleted, 20 times].
It is greater than due to 20 times, so being used as cloud operator A first for [deletion] operation behavior for 15 times of the first preset value The operation behavior of preference in the preset time period of predetermined period.So analogize and obtains preference operation behavior set.
By obtaining the operation behavior of cloud operator preference in the preset time period of the first predetermined period, knowledge can be improved The probability of other abnormal operation behavior, improves the accuracy of identification.
In one embodiment, step S130 is in order to calculate the every kind of operation behavior and preference in historical operation behavior set The similarity of every kind of operation behavior in operation behavior set is summed by the Similarity-Weighted to characteristic item, calculates history behaviour Make the similarity of every kind of operation behavior in the every kind of operation behavior and preference operation behavior set in behavior set.
Specifically, calculating formula of similarity are as follows:
Sim(ci,xi)=∑KλkSim(cik,xjk) (1)
In formula (1), ciIndicate cloud operator, xjIndicate operation behavior, cikIndicate cloud operator in the spy of k-th of aspect Sign, xjkIndicate operation behavior in the feature of k-th of aspect, Sim (ci,xi) indicate operation behavior ciAnd xjIn k-th of characteristic aspect Similarity, λkIndicate weight.
The every kind of operation behavior and preference operation behavior set in historical operation behavior set are calculated by above-mentioned formula (1) In every kind of operation behavior similarity, can be improved in this way it is subsequent identification abnormal operation behavior accuracy.
In another embodiment, step S140 generates predicted operation behavior set according to similarity, mainly by following Step:
Step S141 screens every kind of operation behavior and every kind of behaviour in preference operation behavior set in historical operation behavior set The similarity for making behavior is greater than the operation behavior of the second preset value.
In this step, Sim (c in above-mentioned formula (1) is filtered outi,xi) value be greater than the second preset value operation behavior, Subsequent processing can have been simplified significantly in this way, while having also improved the accuracy of subsequent identification abnormal operation behavior.
Step S142, the operation behavior that will be filtered out, as the first cloud operator the second predetermined period preset time Predicted operation behavior in section.
In this step, such as: the operation behavior filtered out is cloud operator A in one month when daily 8:00-9:00 Between the operation behavior of section preference be [deletion], then prediction cloud operator A 8:00-9:00 period daily in one month following Operation behavior be [deletion].
Step S143 is based on predicted operation behavior, generates predicted operation behavior set.
In embodiments of the present invention, every kind of operation behavior and preference operation behavior collection in historical operation behavior set are calculated The similarity of every kind of operation behavior in conjunction is predicted by being ranked up according to the similarity being calculated to operation behavior Operation behavior set, then the behaviour in cloud operator following a period of time can be accurately judged that out according to predicted operation behavior set Make whether behavior is abnormal operation behavior, can identify the abnormal behaviour of cloud operator, in time in this way so as to protect comprehensively Hinder user's right.
Fig. 3 show the embodiment of the present invention identification practical operation behavior whether be abnormal operation behavior schematic diagram, Fig. 3 Identical or equivalent step uses identical label with Fig. 1.
As shown in figure 3, in one embodiment, step S150 is according to predicted operation behavior set, identification the first cloud operation Whether practical operation behavior of the member in each preset time period of the second predetermined period is abnormal operation behavior.Of the invention real Apply in example is illustrated by two kinds of situations.
The first 301, when practical operation row of the first cloud operator in some preset time period of the second predetermined period It is then abnormal operation behavior by practical operation Activity recognition when not to be the operation behavior in predicted operation behavior set.
Second 302, when practical operation row of the first cloud operator in some preset time period of the second predetermined period It is then normal operation behavior by practical operation Activity recognition when to be the operation behavior in predicted operation behavior set.
In embodiments of the present invention by judging whether practical operation behavior is operation row in predicted operation behavior set For that can identify the abnormal behaviour of cloud operator, in time in this way so as to full-scope safeguards user's right.
In one embodiment, the above-mentioned historical operation behavior set being mentioned to, preference operation behavior set and prediction behaviour The every kind of operation behavior made in behavior set is characterized by least one characteristic item.
In this embodiment, it will be understood that each operation behavior is indicated using feature vector, each feature to Amount includes multiple characteristic items.In addition, characteristic item is mainly action type, operating function and the execution of operation in this embodiment Position.Such as: opening, duplication, deletion, the area A etc..
The identification device of the abnormal operation behavior of the embodiment of the present invention is discussed in detail below with reference to Fig. 4.Fig. 4 shows basis Another embodiment of the present invention provides abnormal operation behavior identification device structural schematic diagram.As shown in figure 4, abnormal operation row For identification device 400 include:
First obtains module 410, for the user behaviors log according to multiple cloud operators, obtains historical operation behavior set, Historical operation behavior set is made of multiple cloud operators in the various operation behaviors of the first predetermined period.
Second obtains module 420, for the user behaviors log according to the first cloud operator, obtains preference operation behavior set, Preference operation behavior set by the first cloud operator preference in the preset time period of the first predetermined period various operation behaviors It constitutes.
Computing module 430, for calculating every kind of operation behavior in historical operation behavior set and preference operation behavior collection The similarity of every kind of operation behavior in conjunction.
Generation module 440, for generating predicted operation behavior set according to similarity;Wherein, predicted operation behavior set It is made of various operation behaviors of the first cloud operator predicted in the preset time period of the second predetermined period.
Identification module 450, for according to the predicted operation behavior set, identifying the first cloud operator described the Whether the practical operation behavior in each of the two predetermined periods preset time period is abnormal operation behavior.
In one embodiment, second module 420 is obtained, can specifically include:
Statistic unit 421, for the user behaviors log according to the first cloud operator, the first cloud operator of statistics is default first The execution frequency of every kind of operation behavior in the preset time period in period.
Preference unit 422 is obtained, the operation behavior for being greater than the first preset value for that will execute frequency is operated as the first cloud The operation behavior of member's preference in the preset time period of the first predetermined period, obtains preference operation behavior set.
In one embodiment, computing module 430 are calculated specifically for being summed by the Similarity-Weighted to characteristic item The similarity of every kind of operation behavior in every kind of operation behavior and preference operation behavior set in historical operation behavior set.
In one embodiment, generation module 440 can specifically include:
Screening unit 441, for screening every kind of operation behavior and preference operation behavior set in historical operation behavior set In every kind of operation behavior similarity be greater than the second preset value operation behavior.
Predicting unit 442, the operation behavior for will filter out, as the first cloud operator in the pre- of the second predetermined period If the predicted operation behavior in the period.
Generation unit 443 generates predicted operation behavior set for being based on predicted operation behavior.
In one embodiment, identification module 450 specifically can be used for when the first cloud operator is in the second predetermined period When practical operation behavior in some preset time period is not the operation behavior in predicted operation behavior set, then by practical operation Activity recognition is the abnormal operation behavior;
Alternatively,
For being pre- when practical operation behavior of the first cloud operator in some preset time period of the second predetermined period It is then normal operation behavior by practical operation Activity recognition when surveying the operation behavior in operation behavior set.
In one embodiment, in historical operation behavior set, preference operation behavior set and predicted operation behavior set Every kind of operation behavior by least one characteristic item characterize.
In one embodiment, characteristic item comprises at least one of the following: action type, operating function and the execution position of operation It sets.
The other details of the identification device of abnormal operation behavior according to an embodiment of the present invention combine Fig. 1 description with more than The recognition methods of abnormal operation behavior according to an embodiment of the present invention is similar, and details are not described herein.
The identification device of the abnormal operation behavior provided through the embodiment of the present invention can identify operator in time Abnormal behaviour, so as to full-scope safeguards user's right.
The recognition methods of the abnormal operation behavior according to an embodiment of the present invention described in conjunction with Fig. 1 to Fig. 4 and device can be with It is realized by the identification equipment of abnormal operation behavior.Fig. 5 is to show to be set according to the identification of the abnormal operation behavior of inventive embodiments Standby 500 schematic diagram of hardware configuration.
As shown in figure 5, the identification equipment 500 of the abnormal operation behavior in the present embodiment connects including input equipment 501, input Mouth 502, central processing unit 503, memory 504, output interface 505 and output equipment 506.Wherein, input interface 502, in Central processor 503, memory 504 and output interface 505 are connected with each other by bus 510, and input equipment 501 and output are set Standby 506 are connect by input interface 502 and output interface 505 with bus 510 respectively, and then are set with the identification of abnormal operation behavior Standby 500 other assemblies connect.
Specifically, input equipment 501 is received from external input information, and will input information by input interface 502 It is transmitted to central processing unit 503;Central processing unit 503 is based on the computer executable instructions stored in memory 504 to input Information is handled to generate output information, and output information is temporarily or permanently stored in memory 504, is then passed through Output information is transmitted to output equipment 506 by output interface 505;Output information is output to abnormal operation row by output equipment 506 For identification equipment 500 outside for users to use.
That is, the identification equipment of abnormal operation behavior shown in fig. 5 also may be implemented as including: to be stored with calculating The memory of machine executable instruction;And processor, the processor may be implemented to combine when executing computer executable instructions The recognition methods of the abnormal operation behavior of Fig. 1 to Fig. 4 description and device.
In one embodiment, the identification equipment 500 of abnormal operation behavior shown in fig. 5 includes: memory 504, is used for Store program;Processor 503, the program for being stored in run memory, to execute abnormal operation behavior of the embodiment of the present invention Recognition methods.
The identification equipment of abnormal operation behavior provided in an embodiment of the present invention can identify the exception of cloud operator in time Behavior, so as to full-scope safeguards user's right.
The embodiment of the present invention also provides a kind of computer readable storage medium, is stored on the computer readable storage medium Computer program instructions;The computer program instructions realize abnormal operation row provided in an embodiment of the present invention when being executed by processor For recognition methods.
It should be clear that the invention is not limited to specific configuration described above and shown in figure and processing. For brevity, it is omitted here the detailed description to known method.In the above-described embodiments, several tools have been described and illustrated The step of body, is as example.But method process of the invention is not limited to described and illustrated specific steps, this field Technical staff can be variously modified, modification and addition after understanding spirit of the invention, or suitable between changing the step Sequence.
Functional block shown in structures described above block diagram can be implemented as hardware, software, firmware or their group It closes.When realizing in hardware, it may, for example, be electronic circuit, specific integrated circuit (ASIC), firmware appropriate, insert Part, function card etc..When being realized with software mode, element of the invention is used to execute program or the generation of required task Code section.Perhaps code segment can store in machine readable media program or the data-signal by carrying in carrier wave is passing Defeated medium or communication links are sent." machine readable media " may include any medium for capableing of storage or transmission information. The example of machine readable media includes electronic circuit, semiconductor memory devices, ROM, flash memory, erasable ROM (EROM), soft Disk, CD-ROM, CD, hard disk, fiber medium, radio frequency (RF) link, etc..Code segment can be via such as internet, inline The computer network of net etc. is downloaded.
It should also be noted that, the exemplary embodiment referred in the present invention, is retouched based on a series of step or device State certain methods or system.But the present invention is not limited to the sequence of above-mentioned steps, that is to say, that can be according in embodiment The sequence referred to executes step, may also be distinct from that the sequence in embodiment or several steps are performed simultaneously.
The above description is merely a specific embodiment, it is apparent to those skilled in the art that, For convenience of description and succinctly, the system, module of foregoing description and the specific work process of unit can refer to preceding method Corresponding process in embodiment, details are not described herein.It should be understood that scope of protection of the present invention is not limited thereto, it is any to be familiar with Those skilled in the art in the technical scope disclosed by the present invention, can readily occur in various equivalent modifications or substitutions, These modifications or substitutions should be covered by the protection scope of the present invention.

Claims (10)

1. a kind of recognition methods of abnormal operation behavior characterized by comprising
According to the user behaviors log of multiple cloud operators, historical operation behavior set is obtained, the historical operation behavior set is by institute The various operation behaviors that multiple cloud operators are stated in the first predetermined period are constituted;
According to the user behaviors log of the first cloud operator, preference operation behavior set is obtained, the preference operation behavior set is by institute The various operation behaviors for stating the first cloud operator preference in the preset time period of first predetermined period are constituted;
Calculate every kind of behaviour in the every kind of operation behavior and the preference operation behavior set in the historical operation behavior set Make the similarity of behavior;
Predicted operation behavior set is generated according to the similarity, the predicted operation behavior set is by first cloud predicted Various operation behaviors of the operator in the preset time period of the second predetermined period are constituted;
According to the predicted operation behavior set, identify that the first cloud operator is described in each of described second predetermined period Whether the practical operation behavior in preset time period is abnormal operation behavior.
2. the recognition methods of abnormal operation behavior according to claim 1, which is characterized in that the first cloud of foundation operator User behaviors log, obtain preference operation behavior set, comprising:
According to the user behaviors log of the first cloud operator, the first cloud operator is counted in the institute of first predetermined period State the execution frequency of every kind of operation behavior in preset time period;
The execution frequency is greater than to the operation behavior of the first preset value, it is default described first as the first cloud operator The operation behavior of preference in the preset time period in period obtains preference operation behavior set.
3. the recognition methods of abnormal operation behavior according to claim 2, which is characterized in that described to calculate the historical operation The similarity of every kind of operation behavior in every kind of operation behavior and the preference operation behavior set in behavior set, comprising:
By the Similarity-Weighted summation to the characteristic item, every kind of operation behavior in the historical operation behavior set is calculated With the similarity of every kind of operation behavior in the preference operation behavior set.
4. the recognition methods of -3 any abnormal operation behaviors according to claim 1, which is characterized in that described according to the phase Predicted operation behavior set is generated like degree, comprising:
Every kind of operation behavior in the historical operation behavior set is screened to go with every kind of operation in the preference operation behavior set For similarity be greater than the second preset value operation behavior;
The operation behavior that will be filtered out, as the first cloud operator second predetermined period the preset time period Interior predicted operation behavior;
Based on the predicted operation behavior, the predicted operation behavior set is generated.
5. the recognition methods of -3 any abnormal operation behaviors according to claim 1, which is characterized in that described according to described pre- Operation behavior set is surveyed, identifies the first cloud operator in each of second predetermined period preset time period Whether practical operation behavior is abnormal operation behavior, comprising:
When practical operation behavior of the first cloud operator in some described preset time period of second predetermined period It is then the abnormal operation by the practical operation Activity recognition when not being the operation behavior in the predicted operation behavior set Behavior;
Alternatively,
When practical operation behavior of the first cloud operator in some described preset time period of second predetermined period It is then normal operation behavior by the practical operation Activity recognition when being the operation behavior in the predicted operation behavior set.
6. the recognition methods of -3 any abnormal operation behaviors according to claim 1, which is characterized in that the historical operation row It is every kind of operation behavior in set, the preference operation behavior set and the predicted operation behavior set by least one Characteristic item characterization.
7. the recognition methods of abnormal operation behavior according to claim 6, which is characterized in that the characteristic item include with down toward Few one kind: action type, operating function and the execution position of operation.
8. a kind of identification device of abnormal operation behavior, which is characterized in that described device includes:
First obtains module, for the user behaviors log according to multiple cloud operators, obtains historical operation behavior set, the history Operation behavior set is made of the multiple cloud operator in the various operation behaviors of the first predetermined period;
Second obtains module, for the user behaviors log according to the first cloud operator, obtains preference operation behavior set, the preference Operation behavior set by the first cloud operator preference in the preset time period of first predetermined period various operations Behavior is constituted;
Computing module, for calculating every kind of operation behavior in the historical operation behavior set and the preference operation behavior collection The similarity of every kind of operation behavior in conjunction;
Generation module, for generating predicted operation behavior set according to the similarity;Wherein, the predicted operation behavior set It is made of various operation behaviors of the first cloud operator predicted in the preset time period of the second predetermined period;
Identification module, for identifying that the first cloud operator is default described second according to the predicted operation behavior set Whether the practical operation behavior in each of period preset time period is abnormal operation behavior.
9. a kind of identification equipment of abnormal operation behavior, which is characterized in that the equipment includes: processor and is stored with calculating The memory of machine program instruction;
The processor realizes the abnormal operation as described in claim 1-7 any one when executing the computer program instructions The recognition methods of behavior.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program instruction realizes the exception as described in claim 1-7 any one when the computer program instructions are executed by processor The recognition methods of operation behavior.
CN201810961289.1A 2018-08-22 2018-08-22 Abnormal operation behavior identification method, device, equipment and medium Active CN109344042B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810961289.1A CN109344042B (en) 2018-08-22 2018-08-22 Abnormal operation behavior identification method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810961289.1A CN109344042B (en) 2018-08-22 2018-08-22 Abnormal operation behavior identification method, device, equipment and medium

Publications (2)

Publication Number Publication Date
CN109344042A true CN109344042A (en) 2019-02-15
CN109344042B CN109344042B (en) 2022-02-18

Family

ID=65291633

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810961289.1A Active CN109344042B (en) 2018-08-22 2018-08-22 Abnormal operation behavior identification method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN109344042B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111342994A (en) * 2020-02-03 2020-06-26 杭州迪普科技股份有限公司 Network management system and method
CN112286775A (en) * 2020-10-30 2021-01-29 深圳前海微众银行股份有限公司 Method, equipment and storage medium for detecting fatigue state
WO2021098327A1 (en) * 2019-11-22 2021-05-27 支付宝(杭州)信息技术有限公司 Private data protection-based method and device for abnormal collection behavior recognition
CN113449558A (en) * 2020-03-26 2021-09-28 上海依图网络科技有限公司 Method and device for monitoring abnormal behaviors of personnel

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102963298A (en) * 2012-09-29 2013-03-13 重庆长安汽车股份有限公司 Abnormal behavior monitoring method based on sight detection
CN104616092A (en) * 2014-12-16 2015-05-13 国家电网公司 Distributed log analysis based distributed mode handling method
US20150205692A1 (en) * 2014-01-23 2015-07-23 Concurix Corporation Behavior clustering analysis and alerting system for computer applications
CN106199421A (en) * 2016-06-27 2016-12-07 北京协同创新研究院 A kind of method for early warning based on the big data of industry and system
CN107330128A (en) * 2017-07-24 2017-11-07 上海众人网络安全技术有限公司 Certification abnormality judgment method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102963298A (en) * 2012-09-29 2013-03-13 重庆长安汽车股份有限公司 Abnormal behavior monitoring method based on sight detection
US20150205692A1 (en) * 2014-01-23 2015-07-23 Concurix Corporation Behavior clustering analysis and alerting system for computer applications
CN104616092A (en) * 2014-12-16 2015-05-13 国家电网公司 Distributed log analysis based distributed mode handling method
CN106199421A (en) * 2016-06-27 2016-12-07 北京协同创新研究院 A kind of method for early warning based on the big data of industry and system
CN107330128A (en) * 2017-07-24 2017-11-07 上海众人网络安全技术有限公司 Certification abnormality judgment method and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021098327A1 (en) * 2019-11-22 2021-05-27 支付宝(杭州)信息技术有限公司 Private data protection-based method and device for abnormal collection behavior recognition
CN111342994A (en) * 2020-02-03 2020-06-26 杭州迪普科技股份有限公司 Network management system and method
CN113449558A (en) * 2020-03-26 2021-09-28 上海依图网络科技有限公司 Method and device for monitoring abnormal behaviors of personnel
CN112286775A (en) * 2020-10-30 2021-01-29 深圳前海微众银行股份有限公司 Method, equipment and storage medium for detecting fatigue state
CN112286775B (en) * 2020-10-30 2023-01-24 深圳前海微众银行股份有限公司 Method, equipment and storage medium for detecting fatigue state

Also Published As

Publication number Publication date
CN109344042B (en) 2022-02-18

Similar Documents

Publication Publication Date Title
EP3528463B1 (en) An artificial intelligence cyber security analyst
Milajerdi et al. Holmes: real-time apt detection through correlation of suspicious information flows
US11012472B2 (en) Security rule generation based on cognitive and industry analysis
EP3292471B1 (en) Method and device for managing security in a computer network
US9998484B1 (en) Classifying potentially malicious and benign software modules through similarity analysis
Noor et al. A machine learning framework for investigating data breaches based on semantic analysis of adversary’s attack patterns in threat intelligence repositories
EP2610776B1 (en) Automated behavioural and static analysis using an instrumented sandbox and machine learning classification for mobile security
US11347867B2 (en) Methods and apparatuses to evaluate cyber security risk by establishing a probability of a cyber-attack being successful
CN109344042A (en) Recognition methods, device, equipment and the medium of abnormal operation behavior
Kumar et al. A robust intelligent zero-day cyber-attack detection technique
Khosravi et al. Alerts correlation and causal analysis for APT based cyber attack detection
US20230336581A1 (en) Intelligent prioritization of assessment and remediation of common vulnerabilities and exposures for network nodes
WO2023283357A1 (en) Intelligent prioritization of assessment and remediation of common vulnerabilities and exposures for network nodes
RU2610395C1 (en) Method of computer security distributed events investigation
Kannan et al. A novel cloud intrusion detection system using feature selection and classification
Machado et al. A hybrid artificial immune and mobile agent intrusion detection based model for computer network operations
CN113225331A (en) Method, system and device for detecting host intrusion safety based on graph neural network
Mukherjee et al. Evading {Provenance-Based}{ML} Detectors with Adversarial System Actions
Safarzadeh et al. A novel and comprehensive evaluation methodology for SIEM
Kassem Intelligent system using machine learning techniques for security assessment and cyber intrusion detection
CN115632884A (en) Network security situation perception method and system based on event analysis
Wagner et al. Quantitative analysis of the mission impact for host-level cyber defensive mitigations.
Ogundokun et al. Cyber intrusion detection system based on machine learning classification approaches
Malek et al. GUI-based user behavior intrusion detection
Chapman Intruder detection through pattern matching and provenance driven data recovery

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant