CN109359686A - A kind of user's portrait method and system based on Campus Network Traffic - Google Patents

A kind of user's portrait method and system based on Campus Network Traffic Download PDF

Info

Publication number
CN109359686A
CN109359686A CN201811217041.0A CN201811217041A CN109359686A CN 109359686 A CN109359686 A CN 109359686A CN 201811217041 A CN201811217041 A CN 201811217041A CN 109359686 A CN109359686 A CN 109359686A
Authority
CN
China
Prior art keywords
data
user
network
portrait
campus
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811217041.0A
Other languages
Chinese (zh)
Inventor
李卫
张晛磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN201811217041.0A priority Critical patent/CN109359686A/en
Publication of CN109359686A publication Critical patent/CN109359686A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • G06F18/2411Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on the proximity to a decision surface, e.g. support vector machines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • G06F18/2415Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on parametric or probabilistic models, e.g. based on likelihood ratio or false acceptance rate versus a false rejection rate
    • G06F18/24155Bayesian classification

Abstract

User's portrait method and system based on Campus Network Traffic that the invention proposes a kind of, acquire the data on flows in campus network, data are cleaned and are pre-processed, classifier is established using machine learning algorithm, training and Optimum Classification device, analyze the integrality of network in data set, user's portrait is carried out to the user in campus network using trained classifier, user's portrait result visualization is presented to administrator, improve the stability of network, administrator is facilitated to carry out the monitoring and maintenance of network, timely investigation and response can be carried out to the Cyberthreat or abnormal user of burst.

Description

A kind of user's portrait method and system based on Campus Network Traffic
Technical field
It is the invention belongs to data analysis and the crossing domain of Internet technology, in particular to a kind of based on Campus Network Traffic User's portrait method and system.
Background technique
With the development of internet, the data generated in network are more and more, and Feature Engineering and machine learning algorithm go out It is existing, so that analysis data become increasingly to facilitate, in addition, also more and more valuable by analyzing the result that data obtain.
User's portrait is actually a kind of application of Feature Engineering, and the data that the purpose is to be generated by analysis user are dug The value information that pick is wherein hidden, analysis and the characteristic behavior for summarizing user.The key point for constructing user's portrait is to utilize storage It arranged, excavated and is analyzed in the user data of the magnanimity of lane database, then by training pattern, user behavior is carried out Classification, labels " " to user, to reach the method for user's portrait.
Currently used user's portrait method is according to user demographic characteristics, network access behavior, Social behaviors and to disappear The information such as expense behavior and the user model of a labeling taken out.
But traditional method, there are still some shortcomings, firstly, being authenticity guarantee's problem of data, in many methods Data source will lead to data source confusion in multiple channel in this way, the problems such as data format disunity, information source is inaccurate, To influence the result of analysis.Secondly, there are isolated problems for the data source of Part Methods, due between operator or application Closure, many methods are difficult to obtain all data of user, so that analysis can not be in user's whole network scope of activities It carries out, so that user's portrait can not be carried out accurately.In addition the base also extremely important, traditional to the selected method of data classification All cannot accurately it be classified to data well in the method for statistics and single machine learning classification method.
Summary of the invention
The method and system in view of the above problems, user that the present invention provides a kind of based on Campus Network Traffic draws a portrait, solve Above-mentioned problems faced.The present invention be on the basis of campus network service, by acquisition, the network row of user in Integration of Campus Network For data, a variety of machine learning methods are then used, establish and train user's portrait model for Campus Network Traffic.And by picture As result visualization is presented to network administrator, facilitates network administrator quickly to check network state, find Cyberthreat in time And it makes a response.
To achieve the above object, The technical solution adopted by the invention is as follows:
First by traffic capture tool, acquire flow on the server of campus network, the access data including user and Behavioral data, such as access time, access frequency, access address, access link etc.;Then by collected data carry out cleaning and Pretreatment, selection can most reflect the feature of network state and user behavior;It is selected in the data pre-processed some with generation The data of table carry out handmarking, generate training sample, training sample is put into Bayes classifier and SVM classifier, Machine learning model is established, and is trained and optimizes.Then other data are trained and are divided using trained model Class generates user's portrait according to result, the result visualization that user draws a portrait is presented to administrator, and indicate whether in a network There are security risks.
The method specifically, a kind of user based on Campus Network Traffic of the present invention draws a portrait, comprising the following steps:
1) data acquisition phase: by the data on flows in acquisition Campus Network Server, collected data are carried out clear It washes and pre-processes;
2) modelling phase: analyzing and handles data, the feature of selection energy accurate description network state and user behavior, in conjunction with Correlation machine learning algorithm generates model, and model is trained and is optimized;
3) data are drawn a portrait the stage: overall operation state and user data are analyzed respectively using trained model, Network state and user behavior characteristics are described from multiple directions;
4) application and analysis phase: analyzing the result that data are drawn a portrait, and analysis result visualization is presented To network administrator, facilitate administrator that can preferably manage network, monitor network state, while can be to there is abnormal behaviour User carries out analysis and checks and make a response.
As a further improvement of the present invention, in step 1), the data on flows includes rising for the user in campus network Begin access time point, access duration time, access target, the size for accessing data volume and access content.
As a further improvement of the present invention, in step 2), when handling data, representative data are chosen first Handmarking is carried out, training sample is generated, later using the data training classifier marked, while using multiple classifiers pair Different types of data set is classified respectively, until classifier generates preferable classifying quality, then by trained model It is saved in disk.
As a further improvement of the present invention, in step 3), many-sided description network state includes when describing this Network flow total amount, network access total degree and the network generated in section accesses peak value;The user behavior characteristics include using Network address, network access time, network access frequency, network access link, network access content and the network access quantity at family.
As a further improvement of the present invention, in step 3), what is be substantially carried out is for each use in campus network data Family carries out user's portrait, the data on flows of user and website visiting historical data is put into respectively trained classifier, Analysis obtains the behavioural characteristic of each user, and stamps corresponding label and classification is marked, and each user can be according to classification Result stamp multiple labels.
As a further improvement of the present invention, the result that the data are drawn a portrait includes user behavior label, user Network behavior feature and the potential security threat of user.
A kind of user's portrait system based on Campus Network Traffic, comprising:
Data acquisition module is acquired data, cleans and pre- for acquiring the data on flows in Campus Network Server Processing;
Modeling module finds the feature that can most describe network and user behavior, in conjunction with phase for analyzing simultaneously preprocessed data The learning algorithm that shuts down generates model, and model is trained and is optimized;
Data portrait module, for being analyzed respectively using trained model entirety and user data, from multiple sides To description network state and user behavior characteristics;
Using and analysis module, for analyzing the result that data are drawn a portrait, and by analysis result visualization be in Network administrator is now given, facilitates administrator that can preferably manage network, monitors network, while can analyze abnormal user It checks and makes a response.
As a further improvement of the present invention, the data acquisition module includes:
Campus network data processing unit: different types of in campus network for that will be acquired during capturing data on flows Data;
Data storage unit:, will be collected a variety of for data to be stored and accessed using Hadoop Distributed Architecture Data distribution formula is stored in Hadoop cluster, is checked and is called at any time using Hbase, in combination with other in Hadoop ecology Software coordinates cooperation manage data jointly.
As a further improvement of the present invention, the data acquisition module includes:
Preprocessed data unit converts partial data format for removing to useless field is analyzed;
Training pattern unit generates classifier, and preliminary artificial mark is carried out to flow for using machine learning algorithm Note, then using the data training marked and Optimized model.
As a further improvement of the present invention, data portrait module includes:
Overall data analytical unit, for carrying out whole analysis to the network data under current state;
User's portrait and labeling unit are generated for carrying out labeling to user using trained model and data User's portrait.
Compared with prior art, the present invention has the advantages that
Method of the invention mainly accesses the base that the flow that internet generates is drawn a portrait as analysis using the user in campus network The portrait of network state and campus network users is depicted to come by data processing, machine learning algorithm, data visualization for plinth. Its data source is in Campus Network Server, so that data are true and reliable, and contains the various nets of user in campus network comprehensively The data of network behavior are drawn a portrait so as to obtain complete user from many aspects by analysis;In addition, passing through visualization side Method, so that the user of analysis draws a portrait, result is more comprehensively intuitive, and administrator is facilitated to check and make decisions at any time.
System of the invention is realized by data acquisition module, modeling module, data portrait module, application and analysis module Data Layer, process layer are connected with the hardware of presentation layer, eventually by the data on flows in acquisition campus network, are carried out to data clear It washes and pre-processes, establish classifier, training and Optimum Classification device using machine learning algorithm, analyze the entirety of network in data set State carries out user's portrait to the user in campus network using trained classifier, and user's portrait result visualization is presented To administrator, the stability of network is improved, administrator is facilitated to carry out the monitoring and maintenance of network, it can be to the Cyberthreat of burst Or abnormal user carries out timely investigation and response.
Detailed description of the invention
Fig. 1 is the system framework figure of building user portrait method in the present invention;
Fig. 2 is the flow chart of foundation and training user's portrait model in the present invention;
Fig. 3 is the flow chart of Bayes classifier training and classification used in user's portrait in the present invention;
Fig. 4 is user's Figure Characteristics and label schematic diagram in the present invention.
Specific embodiment
Below by drawings and examples, technical scheme of the present invention will be described in further detail.
The present invention provides a kind of user's portrait method, system based on Campus Network Traffic, passes through building data on flows analysis system System collects the flow of user in campus network, a model is generated and trained in conjunction with a variety of machine learning algorithms, and use the model The method for constructing multi-analysis user portrait, analysis obtain the network behavior feature of user in campus network, network state, With the presence or absence of potential Cyberthreat, the data validity of existing user's portrait method and the disadvantage of isolated problem are overcome End provides the decision basis based on analysis user's portrait, system framework reference for the status monitoring of campus network, user management Fig. 1.
Data Layer is acquired for data: by the data on flows in acquisition Campus Network Server, data is acquired, Cleaning and pretreatment;Data on flows includes the starting access time point of the user in campus network, access duration time, access data The size and access content of amount.Comprising:
1) campus network acquires data cell: different types of in campus network for acquiring during capturing data on flows Flow, downloading flow, game flow etc. is broadcast live in data, including network flow data, such as video flow;Website visitation data, such as Portal website, entertainment sites, shopping website, Educational website, social network sites etc..
2) data storage unit: storing using Hadoop Distributed Architecture and access data, by collected a variety of numbers It according to distributed storage in Hadoop cluster, checks and calls at any time using Hbase, in combination with other in Hadoop ecology Software coordinates cooperation manages data jointly.
Process layer, for modeling: analyzing and preprocessed data, searching can most describe the feature of network and user behavior, knot It closes correlation machine learning algorithm and generates model, and model is trained and is optimized;It analyzes and preprocessed data includes deleting nothing With field, merges similar features, add new data characteristics.
It is also used to data portrait: network entirety and user data being analyzed respectively using trained model, from multiple Direction describes network state and user behavior characteristics respectively;Various aspects description network state includes describing network flow in the period Total amount, network access total degree and network access peak value.When user behavior characteristics include the network address of user, network access Between, network access frequency, network access link, network access content and network access quantity.
Comprising:
1) preprocessed data unit: removing to useless field is analyzed, carry out conversion unification to partial data format, convenient Next analysis;
2) training pattern unit is manually marked using a variety of machine learning algorithms, and to part exemplary traffic data, Then using the data training classifier marked, model is continuouslyd optimize;
3) the whole analysis based on statistics overall data analytical unit: is carried out to the network data under current state.
4) user's portrait and labeling unit, classify to data using trained model, while utilizing classification knot Fruit carries out labeling to user, generates user's portrait;
Presentation layer, for applying and analyzing: analyzing the result that data are drawn a portrait, and result visualization will be analyzed It is presented to network administrator, facilitates administrator that can preferably manage network, monitors network, while can divide abnormal user Analysis is checked and is made a response.
Using and the analysis phase include that result visualization is presented to network administrator, administrator is learnt at once Current network state, network congestion degree, if there are potential Cyberthreats, and can check according to demand designated user or The portrait result of user group.
User's portrait result includes user behavior label, user network behaviors feature and the potential security threat of user.
The main purpose of present system is as follows:
First, the utility value of campus network data is given full play to, using campus network reliable data source advantage comprehensively, is collected And Campus Network Traffic data are stored, next to carry out user's portrait and analysis using being collected into data.
Second, in campus network user individual and network integrally carry out portrait analysis, the network supervision for after provides Data basis, the analysis and decision after facilitating.
User's portrait method based on Campus Network Traffic that the present invention also provides a kind of, the flow chart of this method refer to Fig. 2, under Mask body illustrates this method, comprising the following steps:
Step S1: acquisition data on flows: the flow of Campus Network Server is collected;
In step sl, when accessing internet in campus network as user, the content and history requested access to can all pass through The server of campus network forwards, therefore permission can be used directly in server in the network administrator for possessing server admin permission The traffic captures tools such as middle deployment tcpdump capture the data generated in network, while ensure that the true of the data captured Property, integrality and real-time.
Meanwhile different types of data in campus network, including network flow will be acquired during capturing data on flows Flow, downloading flow, game flow etc. is broadcast live in data, such as video flow;Website visitation data, such as portal website entertain net It stands, shopping website, Educational website, social network sites etc..Since the data volume of generation is more huge, the storage of common single host is empty Between be unable to satisfy storage demand, therefore data will be stored and accessed using Hadoop Distributed Architecture, will be collected a variety of Data distribution formula is stored in Hadoop cluster, is checked and is called at any time using Hbase, in combination with other in Hadoop ecology Software coordinates cooperation manage data jointly.
Step S2: preprocessed data: cleaning is removed to useless field is analyzed, carries out arrangement system to partial data format One, facilitate next analysis;It analyzes and preprocessed data includes deleting hashed field, merge similar features, add new number According to feature.
Then, the data of storage are being cleared up and are being pre-processed, removing the field or invalid data useless to analysis, Such as TTL, web site requests method, User-Agent etc..Retain to useful field is analyzed, such as user's source IP address, source port, mesh IP address, destination port, the number of the packet of transmission, the number of the packet received, the total flow of inflow, the total flow of outflow, visit The web site url asked, the attributes such as access time.And by the data uniform output format after cleaning, then adds some pairs of analyses and have The field of help can be submitted the website domain name in data in the form of web form such as website visitation data Web crawlers is write to the website Alexa ranking, and using Python+Selenium tool, acquires the temperature of the website of return And websites collection, the analysis statistics after facilitating, and the data of the uniform format after arrangement are newly stored into Hbase distribution number According in library.
Step S3: training pattern generates classifier using machine learning algorithm, and preliminary artificial mark is carried out to flow Note, then using the data training marked and Optimized model;
Since the essence of user's portrait is to characterize, that is, excavate the behavioural characteristic of user, therefore the process that user can be drawn a portrait Regard the process of classification as, classifier is constructed using a variety of machine learning algorithms in the method, according to different network flows Feature is classified using different classifiers.Due to needing to be to solve labeling problem in this method, and unsupervised learning In only analysis data itself, be the aggregation classification carried out according to the physical feature of data, obtained result possibly can not correspond to It is required that purpose feature, therefore in the method select supervised learning algorithm, in the method select supervised learning in Bayesian Classification Arithmetic and support vector machines (SVM).
Wherein the classification process of Bayes classifier is as shown in figure 3, whole flow process can be divided into three phases: preparing data Collection stage, training classifier stage and application class stage.It is the preparation stage first, is selected in the data pre-processed and true Then fixed most representational attributive character selects the apparent data set of some features to carry out handmarking, generates training set; The frequency that each characteristic of division occurs in the sample is calculated, then to every using the training set marked followed by the training stage The conditional probability of one characteristic attribute computation partition, and record result;It is finally the application stage, data on flows to be sorted is put Into the trained classifier of previous step, classify, generates the label of user's classification.In addition, SVM classifier is generally used for solving Certainly two classification problem, and user's portrait in method presented herein is classification problem more than one, it is therefore desirable to use SVM pairs The label and other labels of each classification carry out one time two classification, and the process of svm classifier is similar with Bayes classifier.
When handling data, some representative data are chosen first and carry out handmarking, generate training sample, it Model is continuouslyd optimize using the data training marked afterwards, until classifier has preferable classifying quality.This stage is due to relating to And the classification of the network data arrived is different, the standard and result of classification are also different, be such as related to net flow assorted feature and Network access behavior classification is characterized in different, therefore multiple classifiers may be needed to different during classification Data set is classified, and then trained model is saved in disk, facilitates next use.
Step S4: whole analysis overall data analysis: is carried out to the network data under current state;
In step s 4, what is carried out first is whole network data analysis, is mainly concerned with statistics network overall condition Constant, the beginning and ending time including the data set, total packet number of transmission, uplink total flow and peak value, downlink total flow and peak value, The information such as total number of users in network have a primary statistics and assessment to whole network state, if it find that having abnormal Data are regarded as network and abnormal conditions occur, need to take phase if certain period peak flow is higher by normal level for a long time Answer measure.
Step S5: user's portrait and labeling carry out labeling to user using trained model and data, generate and use Family portrait;
In step s 5, what is be substantially carried out is to carry out user's portrait for each user in campus network data, by user Data on flows and website visiting historical data be put into respectively trained classifier, analysis obtains the behavior of each user Feature, and stamp corresponding label and classification is marked, as shown in figure 4, according to different classification results, in the online period, always One or more labels are stamped in the directions such as used time, flow dosage, preference access, such as label of a certain user are as follows: online period: evening On, morning.Daily online used time 1-5 hours, dosage 5-10GB, preference access: video, information.
Step S6: interpretation of result and application.
Finally, the analysis of overall data is generated phase as a result, summarize and carry out visualization presentation with the portrait of each user The chart answered, is presented to administrator, and administrator is allow to view whole network state, makes administrator to each user or use Family group has and is understood more intuitively, while can be according to the better monitoring network state of these data, when occurring network in network When threat, administrator can quickly be positioned by abnormal user in portrait, to respond and decision, prevent from threatening Further expansion.
To sum up locating, this method collects data on flows and user's access history data in campus network first, generates and instructs Practice sorter model, user's portrait is carried out to user using classifier, and provide visual present as a result, enabling administrator Enough more easily monitoring network states are analyzed using data traffic accurate in campus network by this method, improve school The stability of garden Webweb network has a degree of understanding to every user in network, and being capable of positioning net as early as possible Threat in network.
What said above is merely illustrative of the invention's technical idea, and this does not limit the scope of protection of the present invention, It is all without departing from technical idea proposed by the present invention, any changes made on the basis of the technical scheme each falls within power of the present invention Within the protection scope of sharp claim.

Claims (10)

  1. A kind of method 1. user based on Campus Network Traffic draws a portrait, which comprises the following steps:
    1) data acquisition phase: by acquisition Campus Network Server in data on flows, to collected data carry out cleaning and Pretreatment;
    2) modelling phase: analyzing and handles data, the feature of selection energy accurate description network state and user behavior, in conjunction with correlation Machine learning algorithm generates model, and model is trained and is optimized;
    3) data are drawn a portrait the stage: are analyzed respectively using trained model overall operation state and user data, from more A direction describes network state and user behavior characteristics;
    4) application and analysis phase: analyzing the result that data are drawn a portrait, and analysis result visualization is presented to net Network administrator facilitates administrator that can preferably manage network, monitors network state, while can be to the user for having abnormal behaviour Analysis is carried out to check and make a response.
  2. The method 2. user according to claim 1 based on Campus Network Traffic draws a portrait, which is characterized in that in step 1), institute The data on flows stated includes the starting access time point of the user in campus network, access duration time, access target, access data The size and access content of amount.
  3. The method 3. user according to claim 1 based on Campus Network Traffic draws a portrait, which is characterized in that in step 2), When handling data, representative data are chosen first and carry out handmarking, generate training sample, use has marked later Data train classifier, while being classified respectively using multiple classifiers to different types of data set, until classifier produces Trained classifier, is then saved in disk by raw preferable classifying quality.
  4. The method 4. a kind of user based on Campus Network Traffic according to claim 1 draws a portrait, which is characterized in that step 3) In, many-sided description network state includes the network flow total amount for describing to generate in the period, network access total degree And network accesses peak value;The user behavior characteristics include the network address of user, network access time, network access frequency Rate, network access link, network access content and network access quantity.
  5. The method 5. a kind of user based on Campus Network Traffic according to claim 1 draws a portrait, which is characterized in that step 3) In, what is be substantially carried out is to carry out user's portrait for each user in campus network data, by the data on flows of user and website Access history data is put into respectively trained classifier, and analysis obtains the behavioural characteristic of each user, and stamps correspondence Label classification is marked, each user can stamp multiple labels according to the result of classification.
  6. The method 6. a kind of user based on Campus Network Traffic according to claim 1 draws a portrait, which is characterized in that the number It include user behavior label, user network behaviors feature and the potential security threat of user according to the result that portrait obtains.
  7. The system 7. a kind of user based on Campus Network Traffic draws a portrait characterized by comprising
    Data acquisition module is acquired data, cleaning and pre- place for acquiring the data on flows in Campus Network Server Reason;
    Modeling module, for analyzing and preprocessed data, the feature of network and user behavior can most be described by finding, in conjunction with mutually shutting down Device learning algorithm generates model, and model is trained and is optimized;
    Data portrait module is retouched for being analyzed respectively using trained model entirety and user data from multiple directions State network state and user behavior characteristics;
    Using and analysis module, for analyzing the result that data are drawn a portrait, and by analysis result visualization be presented to Network administrator facilitates administrator that can preferably manage network, monitors network, while can carry out analysis to abnormal user and check And it makes a response.
  8. The system 8. user according to claim 7 based on Campus Network Traffic draws a portrait, which is characterized in that the data are adopted Collecting module includes:
    Campus network data processing unit: for different types of number in campus network will to be acquired during capturing data on flows According to;
    Data storage unit: for data to be stored and accessed using Hadoop Distributed Architecture, by collected a variety of data Distributed storage is checked and is called at any time in Hadoop cluster, using Hbase, in combination with other soft in Hadoop ecology The common management data of part coordination.
  9. The system 9. user according to claim 7 based on Campus Network Traffic draws a portrait, which is characterized in that the data are adopted Collecting module includes:
    Preprocessed data unit converts partial data format for removing to useless field is analyzed;
    Training pattern unit for using machine learning algorithm, generation classifier, and carries out preliminary artificial mark to flow, Then using the data training marked and Optimized model.
  10. The system 10. user according to claim 7 based on Campus Network Traffic draws a portrait, which is characterized in that the data Portrait module include:
    Overall data analytical unit, for carrying out whole analysis to the network data under current state;
    User's portrait and labeling unit generate user for carrying out labeling to user using trained model and data Portrait.
CN201811217041.0A 2018-10-18 2018-10-18 A kind of user's portrait method and system based on Campus Network Traffic Pending CN109359686A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811217041.0A CN109359686A (en) 2018-10-18 2018-10-18 A kind of user's portrait method and system based on Campus Network Traffic

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811217041.0A CN109359686A (en) 2018-10-18 2018-10-18 A kind of user's portrait method and system based on Campus Network Traffic

Publications (1)

Publication Number Publication Date
CN109359686A true CN109359686A (en) 2019-02-19

Family

ID=65345787

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811217041.0A Pending CN109359686A (en) 2018-10-18 2018-10-18 A kind of user's portrait method and system based on Campus Network Traffic

Country Status (1)

Country Link
CN (1) CN109359686A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110213112A (en) * 2019-06-14 2019-09-06 广州志浩信念网络科技有限公司 A kind of user behavior analysis method and system
CN110245296A (en) * 2019-06-14 2019-09-17 浙江华坤道威数据科技有限公司 A kind of PAS user's portrait analysis system and its method based on big data
CN111614614A (en) * 2020-04-14 2020-09-01 瑞数信息技术(上海)有限公司 Safety monitoring method and device applied to Internet of things
CN113965389A (en) * 2021-10-26 2022-01-21 天元大数据信用管理有限公司 Network security management method, equipment and medium based on firewall log
CN115632839A (en) * 2022-10-10 2023-01-20 江苏海洋大学 Smart campus environment network supervision method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104239351A (en) * 2013-06-20 2014-12-24 阿里巴巴集团控股有限公司 User behavior machine learning model training method and device
CN106911806A (en) * 2017-04-26 2017-06-30 努比亚技术有限公司 A kind of method of PUSH message, terminal, server and system
US20170206204A1 (en) * 2016-01-20 2017-07-20 Alibaba Group Holding Limited System, method, and device for generating a geographic area heat map
CN107404398A (en) * 2017-05-31 2017-11-28 中山大学 A kind of networks congestion control judgement system
CN107612938A (en) * 2017-10-27 2018-01-19 朱秋华 A kind of network user's anomaly detection method, device, equipment and storage medium
CN108596738A (en) * 2018-05-08 2018-09-28 新华三信息安全技术有限公司 A kind of user behavior detection method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104239351A (en) * 2013-06-20 2014-12-24 阿里巴巴集团控股有限公司 User behavior machine learning model training method and device
US20170206204A1 (en) * 2016-01-20 2017-07-20 Alibaba Group Holding Limited System, method, and device for generating a geographic area heat map
CN106911806A (en) * 2017-04-26 2017-06-30 努比亚技术有限公司 A kind of method of PUSH message, terminal, server and system
CN107404398A (en) * 2017-05-31 2017-11-28 中山大学 A kind of networks congestion control judgement system
CN107612938A (en) * 2017-10-27 2018-01-19 朱秋华 A kind of network user's anomaly detection method, device, equipment and storage medium
CN108596738A (en) * 2018-05-08 2018-09-28 新华三信息安全技术有限公司 A kind of user behavior detection method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
徐龙章等: "《Python 网络数据爬取及分析从入门到精通 爬取篇》", 30 June 2018, 北京航空航天大学出版社 *
马飒飒等: "《物联网基础技术及应用》", 31 January 2018, 西安电子科技大学出版社 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110213112A (en) * 2019-06-14 2019-09-06 广州志浩信念网络科技有限公司 A kind of user behavior analysis method and system
CN110245296A (en) * 2019-06-14 2019-09-17 浙江华坤道威数据科技有限公司 A kind of PAS user's portrait analysis system and its method based on big data
CN111614614A (en) * 2020-04-14 2020-09-01 瑞数信息技术(上海)有限公司 Safety monitoring method and device applied to Internet of things
CN111614614B (en) * 2020-04-14 2022-08-05 瑞数信息技术(上海)有限公司 Safety monitoring method and device applied to Internet of things
CN113965389A (en) * 2021-10-26 2022-01-21 天元大数据信用管理有限公司 Network security management method, equipment and medium based on firewall log
CN115632839A (en) * 2022-10-10 2023-01-20 江苏海洋大学 Smart campus environment network supervision method and system

Similar Documents

Publication Publication Date Title
CN109359686A (en) A kind of user's portrait method and system based on Campus Network Traffic
US11538064B2 (en) System and method of providing a platform for managing data content campaign on social networks
Liu et al. Monitoring and analyzing big traffic data of a large-scale cellular network with Hadoop
Chae et al. Spatiotemporal social media analytics for abnormal event detection and examination using seasonal-trend decomposition
CN102035698B (en) HTTP tunnel detection method based on decision tree classification algorithm
US20160359880A1 (en) Geo visualization of network flows
CN108595461B (en) Interest exploration method, storage medium, electronic device and system
WO2021082589A1 (en) Content check model training method and apparatus, video content check method and apparatus, computer device, and storage medium
CN105447147B (en) A kind of data processing method and device
CN102724059A (en) Website operation state monitoring and abnormal detection based on MapReduce
CN104488231A (en) Real-time network monitoring and subscriber identification with an on-demand appliance
CN109905696A (en) A kind of recognition methods of the Video service Quality of experience based on encryption data on flows
CN102315974A (en) Stratification characteristic analysis-based method and apparatus thereof for on-line identification for TCP, UDP flows
CN103595576A (en) Interconnection port ICP flow statistical system and method based on content provider identifications
CN103186600A (en) Specific analysis method and device of Internet public sentiment
CN110417729A (en) A kind of service and application class method and system encrypting flow
CN106789242A (en) A kind of identification application intellectual analysis engine based on mobile phone client software behavioral characteristics storehouse
CN112000889A (en) Information gathering and presenting system
Fan et al. An interactive visual analytics approach for network anomaly detection through smart labeling
CN106559498A (en) Air control data collection platform and its collection method
CN114422211B (en) HTTP malicious traffic detection method and device based on graph attention network
US20170272453A1 (en) User interface for displaying network analytics
CN108270637A (en) A kind of Website quality multilayer drills through system and method
CN106372171A (en) Real-time data processing method of monitoring platform
CN106910082A (en) It is a kind of to transfer the method and apparatus that advertisement is pushed

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190219

RJ01 Rejection of invention patent application after publication