CN109617887A - Information processing method, device and storage medium - Google Patents

Information processing method, device and storage medium Download PDF

Info

Publication number
CN109617887A
CN109617887A CN201811573833.1A CN201811573833A CN109617887A CN 109617887 A CN109617887 A CN 109617887A CN 201811573833 A CN201811573833 A CN 201811573833A CN 109617887 A CN109617887 A CN 109617887A
Authority
CN
China
Prior art keywords
node
normal
abnormal nodes
topological diagram
influence power
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811573833.1A
Other languages
Chinese (zh)
Other versions
CN109617887B (en
Inventor
王浩然
周效军
任化强
宋国栋
刘长龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Migu Cultural Technology Co Ltd
Original Assignee
Migu Cultural Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Migu Cultural Technology Co Ltd filed Critical Migu Cultural Technology Co Ltd
Priority to CN201811573833.1A priority Critical patent/CN109617887B/en
Publication of CN109617887A publication Critical patent/CN109617887A/en
Application granted granted Critical
Publication of CN109617887B publication Critical patent/CN109617887B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The embodiment of the invention discloses an information processing method, an information processing device and a storage medium, wherein the method comprises the following steps: when at least one abnormal node is determined, determining at least one target node topological graph containing a first abnormal node from at least one node topological graph; determining the influence of the first abnormal node on at least one normal node in the at least one target node topological graph based on the influence of adjacent nodes in the at least one target node topological graph; determining the probability that the at least one normal node is an abnormal node based on the influence of the first abnormal node on the at least one normal node in the at least one target node topological graph. Therefore, potential abnormal nodes in the network can be predetermined, potential safety hazards can be prevented in advance, and the network safety protection force is improved.

Description

A kind of information processing method, device and storage medium
Technical field
The present invention relates to Internet technology more particularly to a kind of information processing methods, device and storage medium.
Background technique
It is directed to the discovery of abnormal nodes at present, is the operation behavior by analyzing user, for example, operating frequency, operation are set The information such as standby, operation place determine whether user is abnormal nodes.
However the abnormal nodes that the prior art provides determine scheme, abnormal nodes higher for operating frequency can accurately be known Not, but need artificial setpoint frequency threshold value as the standard for judging abnormal nodes.It and is all operation behavior according to user itself The judgement for carrying out risk, potential abnormal nodes can not be identified according to existing abnormal nodes, can only be held in abnormal operation Abnormality processing is carried out after row, not can be carried out advance preventing.
Summary of the invention
In order to solve the above technical problems, an embodiment of the present invention is intended to provide a kind of information processing method, device and storages to be situated between Matter can predefine potential abnormal nodes in network, improve network security.
The technical scheme of the present invention is realized as follows:
The embodiment of the invention provides a kind of information processing methods, comprising:
When determining at least one abnormal nodes, determine from least one node topology figure comprising the first abnormal nodes At least one destination node topological diagram;Wherein, first abnormal nodes are any one at least one described abnormal nodes Abnormal nodes contain at least two the influence power of adjacent node and adjacent node in the node topology figure;
Based on the influence power of adjacent node at least one described destination node topological diagram, at least one described target is determined Influence power of first abnormal nodes at least one normal node described in node topology figure;
Based on the first abnormal nodes described at least one described destination node topological diagram at least one normal node Influence power determines that at least one described normal node is the probability of abnormal nodes.
In above scheme, before determining at least one abnormal nodes, the method also includes: it is based at least two nodes The Internet protocol address (Internet Protocol, IP) and operation log, establish at least one node topology figure;Wherein, The operation log is used to record the operation behavior of node.
In above scheme, the IP address and operation log based at least two nodes is established at least one node and is opened up Flutter figure, comprising: be based on the IP address, establish at least one first topological diagram;Wherein, arbitrary neighborhood in first topological diagram Two node IP address having the same;Based on the operation log, obtained at least from least one described first topological diagram One node topology figure.
In above scheme, the operation log includes at least the operation behavior of node;It is described to be based on the operation log, from At least one node topology figure is obtained at least one described first topological diagram, comprising: the operation behavior is based on, described in calculating Influence power at least one first topological diagram between adjacent node;Based on the operation behavior, each node is obtained extremely A few operation label;Wherein, the operation label is used to characterize the classification of nodal operation behavior;Extremely based on each node A few operation label, is divided at least one second topological diagram at least one described first topological diagram;Wherein, each Two topological diagrams correspond to an operation label;Using at least one second topological diagram comprising influence power as at least one described node Topological diagram.
In above scheme, the influence power based on adjacent node at least one described destination node topological diagram is determined Influence power of first abnormal nodes described at least one described destination node topological diagram at least one normal node, comprising: When node is adjacent with first abnormal nodes if normal, first abnormal nodes are directly acquired from destination node topological diagram To the influence power of the normal node;When node and first abnormal nodes are non-conterminous if normal, according to the destination node At least two adjacent nodes between normal node described in topological diagram and first abnormal nodes on each reachable path Influence power, determine first abnormal nodes to the influence power of the normal node.
In above scheme, the normal node according to the destination node topological diagram and first abnormal nodes Between at least two adjacent nodes on each reachable path influence power, determine first abnormal nodes to described normal The influence power of node, comprising: according between normal node described in the destination node topological diagram and first abnormal nodes The influence power of at least two adjacent nodes on each reachable path determines the described first abnormal section on each reachable path Influence power of the point to the normal node;To the on each reachable path in the destination node topological diagram described first abnormal section Point carries out cumulative summation to the influence power of the normal node, obtains influence of first abnormal nodes to the normal node Power.
In above scheme, the first abnormal nodes described in described at least one destination node topological diagram based on described in are at least The influence power of one normal node determines that at least one described normal node is the probability of abnormal nodes, comprising: from it is described at least At least one first object node topology figure comprising the first normal node is determined in one destination node topological diagram;Wherein, institute Stating the first normal node is any one normal node at least one described normal node;Based on it is described at least one first First abnormal nodes described in destination node topological diagram determine the described first normal section to the influence power of first normal node Point is the probability of abnormal nodes.
It is described based on the first abnormal nodes pair described at least one described first object node topology figure in above scheme The influence power of first normal node determines that first normal node is the probability of abnormal nodes, comprising: to each the First abnormal nodes described in one destination node topological diagram carry out cumulative summation to the influence power of first normal node, obtain First normal node is the probability of abnormal nodes.
Additionally provide a kind of information processing unit in the embodiment of the present invention, the information processing unit include: processor and It is configured to the memory for the computer program that storage can be run on a processor, wherein the processor is configured to operation institute When stating computer program, the step of executing any one of aforementioned the method.
A kind of computer readable storage medium is additionally provided in the embodiment of the present invention, is stored thereon with computer program, It is characterized in that, the step of which realizes aforementioned described in any item methods when being executed by processor.
It by adopting the above technical scheme, can be after determining abnormal nodes, according in node topology figure between adjacent node Influence power, determine abnormal nodes to the influence power of normal node associated with it in node topology figure, so that it is determined that normal section Point may be potential abnormal nodes probability.It so, it is possible to predefine potential abnormal nodes in network, prevention is potential in advance Security risk improves network safety prevention power.
Detailed description of the invention
Fig. 1 is the first pass schematic diagram of information processing method in the embodiment of the present invention;
Fig. 2 is the first composed structure schematic diagram of interior joint of embodiment of the present invention topological diagram;
Fig. 3 is the second composed structure schematic diagram of interior joint of embodiment of the present invention topological diagram;
Fig. 4 is the second procedure schematic diagram of information processing method in the embodiment of the present invention;
Fig. 5 is the third composed structure schematic diagram of interior joint of embodiment of the present invention topological diagram;
Fig. 6 is the third flow diagram of information processing method in the embodiment of the present invention;
Fig. 7 is the composed structure schematic diagram of information processing unit in the embodiment of the present invention.
Specific embodiment
The characteristics of in order to more fully hereinafter understand the embodiment of the present invention and technology contents, with reference to the accompanying drawing to this hair The realization of bright embodiment is described in detail, appended attached drawing purposes of discussion only for reference, is not used to limit the embodiment of the present invention.
Embodiment one
As shown in Figure 1, information processing method includes:
Step 101: when determining at least one abnormal nodes, being determined from least one node topology figure different comprising first At least one destination node topological diagram of Chang Jiedian;Wherein, the first abnormal nodes are any one at least one abnormal nodes Abnormal nodes contain at least two the influence power of adjacent node and adjacent node in node topology figure;
Step 102: the influence power based on adjacent node at least one destination node topological diagram determines at least one target Influence power of first abnormal nodes at least one normal node in node topology figure;
Step 103: based on the first abnormal nodes at least one destination node topological diagram at least one normal node Influence power determines that at least one normal node is the probability of abnormal nodes.
Here, the executing subject of step 101 to step 103 can be the processor in information processing unit.
In practical application, this method before step 101 further include: IP address and operation day based at least two nodes Will establishes at least one node topology figure;Wherein, operation log is used to record the operation behavior of node.Here, IP address can be with It is the public ip address for the distribution of different nodes, operation behavior refers to various data manipulations of user's using terminal to network system And service condition, such as: downloading, is made comments, e-payment etc. at browsing webpage.
Node topology figure is established according to the IP address of node, the influence of adjacent node is determined according to the operation log of node Power.In practical application, adjacent node is set by the node with identical IP address, the operation log between adjacent node Similarity is higher, and the interactional probability between the node of two, surface is bigger.The similarity of operation log can be understood as holding The ratio of row same operation, for example, access same web site, browsing same page etc..
Specifically, IP address and operation log based at least two nodes, establish at least one node topology figure, packet It includes: based on IP address, establishing at least one first topological diagram;Wherein, two nodes of arbitrary neighborhood have phase in the first topological diagram Same IP address;Based on operation log, at least one node topology figure is obtained from least one first topological diagram.
In practical application, the operation log includes at least the operation behavior of node.Correspondingly, it is based on operation log, from At least one node topology figure is obtained at least one first topological diagram, comprising: be based on the operation behavior, calculating is described at least Influence power in one the first topological diagram between adjacent node;Based on the operation behavior, at least the one of each node is obtained A operation label;Wherein, the operation label is used to characterize the classification of nodal operation behavior;At least one based on each node At least one described first topological diagram is divided at least one second topological diagram by a operation label;Wherein, each second is opened up Flutter the corresponding operation label of figure;Using at least one second topological diagram comprising influence power as at least one described node topology Figure.
As shown in Fig. 2, the first topological diagram includes: this 10 nodes of node a, b, c, d, e, f, g, h, i, j, adjacent node it Between IP address having the same, i.e., IP address having the same between a and b, a and e, a and j do not have phase between different nodes Same IP address does not have identical IP address, according to the operation of a that is, between a and g, a and f, a and i, a and h, a and b, a and c The operation log of log and d, f, j determine the influence power between adjacent node.It is connected in influence power such as figure between adjacent node Shown in the top or right of arrow.
In practical application, the influence power that other side is mutually given between adjacent node can be identical, as shown in Figure 2.Adjacent segments The influence power that other side is mutually given between point can not also be identical, for example, node a is 0.2, d pairs of node to the influence power of node d The influence power of node a is 0.1.
After the completion of the first topological diagram is established, marked according at least one the corresponding operation of the operation behavior flag node of node Label, according to the operation label of node by the node division with same operation label in the same topological diagram, with different behaviour Make the node division of label in different topological diagrams, as shown in figure 3, node a and other nodes do not have identical operation Label, then node a is 0 to the influence power of other nodes, then by the connection edge contract of node a and surroundings nodes, therefore, according to First topological diagram of script is divided into three the second topological diagrams by the operation label of node, and the second topological diagram includes the first topological diagram At least partly node.It specifically includes: the second topological diagram being made of node c, d, e, f, g, second be individually composed by node a Topological diagram, the second topological diagram being made of node b, h, i, j.
Using at least one second topological diagram comprising influence power as at least one node topology figure, according to abnormal nodes from It is determined at least one node topology figure.Destination node topological diagram is by node b, h, i, j group if being abnormal nodes if node b At the second topological diagram determine node b to the influence power of node h, i, j according to the influence power between node.
Here, it is only exemplary and illustrates the acquisition methods of node topology figure, in practical applications, node can be with Comprising many operation labels, and the granularity of division for operating label may be set according to actual conditions.Each label corresponding one A second topological diagram determines abnormal nodes to the second topological diagram according to corresponding one or more second topological diagrams of abnormal nodes The influence of middle normal node.
It should be noted that normal node therein can just be had an impact when abnormal nodes belong to some topological diagram, When abnormal nodes are not belonging to some topological diagram, just any one node therein will not be had an impact.
In practical application, the determination method of abnormal nodes is according to existing detection means, when the operation row for detecting node When being abnormal, determine that the node is abnormal nodes, to judge that other are normal using the above method that the embodiment of the present invention provides The impacted probability of node.
It by adopting the above technical scheme, can be after determining abnormal nodes, according in node topology figure between adjacent node Influence power, determine abnormal nodes to the influence power of normal node associated with it in node topology figure, so that it is determined that normal section Point may be potential abnormal nodes probability.It so, it is possible to predefine potential abnormal nodes in network, prevention is potential in advance Security risk improves network safety prevention power.
Embodiment two
In order to more embody the purpose of the present invention, on the basis of the above embodiment of the present invention, further lifted Example explanation, as shown in figure 4, information processing method specifically includes:
Step 401: when determining at least one abnormal nodes, being determined from least one node topology figure different comprising first At least one destination node topological diagram of Chang Jiedian;
Step 402: when node is adjacent with the first abnormal nodes if normal, directly acquiring first from destination node topological diagram Influence power of the abnormal nodes to the normal node;Node and when non-conterminous the first abnormal nodes if normal, according to destination node The influence power of at least two adjacent nodes in topological diagram between normal node and the first abnormal nodes on each reachable path, Determine the first abnormal nodes to the influence power of normal node;
Step 403: based on the first abnormal nodes at least one destination node topological diagram at least one normal node Influence power determines that at least one normal node is the probability of abnormal nodes.
Here, the executing subject of step 401 to step 403 can be the processor in information processing unit.First is abnormal Node is any one abnormal nodes at least one abnormal nodes, contains at least two adjacent node and phase in node topology figure The influence power of neighbors.
In practical application, this method before step 401 further include: IP address and operation day based at least two nodes Will establishes at least one node topology figure;Wherein, operation log is used to record the operation behavior of node.Therefore, in operation log Including at least the operation behavior of node.
Specifically, IP address and operation log based at least two nodes, establish at least one node topology figure, packet It includes: based on IP address, establishing at least one first topological diagram;Wherein, two nodes of arbitrary neighborhood have phase in the first topological diagram Same IP address;Based on operation behavior, the influence power at least one first topological diagram between adjacent node is calculated;Based on operation Behavior obtains at least one operation label of each node;Further, based on operation label, at least one first is opened up It flutters figure and is divided at least one second topological diagram;Wherein, the corresponding operation label of each second topological diagram;It will be comprising influencing At least one second topological diagram of power is as at least one node topology figure.
When establishing node topology figure, the used IP address of unit interval interior nodes can be first determined, and will use The node for crossing identical IP address is determined as the node with incidence relation, i.e., is adjacent node in topological diagram;Then, according to list The operation log of position period interior nodes, such as watch content, make comments, to determine the influence power between adjacent node, from And it generates using user as the first topological diagram of node.
Illustratively, determine that the calculation formula of influence power Pi between adjacent node can be with are as follows:
Pi=(1+mi/M+ni/N) * 1/d
Wherein, Pi be destination node to i-th of node to the influence power of adjacent node;Di is the degree of destination node, degree Number is specifically used for the quantity that characterization destination node has adjacent node;Mi is that i-th of adjacent node is identical as destination node viewing The quantity of content;M is the total quantity that all nodes watch content under identical IP address;Ni is i-th of adjacent node and target section Point delivers the quantity of identical comment;N is the total quantity that all nodes are made comments under identical IP address.
It should be noted that exemplary only two provided kind behaviour of above-mentioned viewing content, this two information of making comments Make behavior, specific operation behavior can flexibly be set according to actual needs.
Further, it is based on operation behavior, obtains at least one operation label of each node;Wherein, label is operated For characterizing the classification of nodal operation behavior.Specifically, parsing operation behavior;By the operation behavior and preset operation after parsing Tag library is matched, and determines at least one operation label of operation behavior.
Here, operation label is that the operation behavior of user is classified, and can be the keyword in operation behavior information, It is used to indicate the key messages such as operation object, class of operation.Such as: 1 music application 1 of Video Applications etc.;Further Video Applications 1 TV play, film, amusement, sport etc. can also be corresponded to, music application 2 can also correspond to pop music, rock music, allusion Music etc..At least one the operation label being had according to each node, the first topological diagram is divided into different operation mark Second topological diagram of label, node are located in corresponding second topological diagram according to an operation label.
It is specifically included in step 402: when node is adjacent with the first abnormal nodes if normal, in addition to direct reachable path also Including at least one indirect reachable path;According to the influence power between adjacent normal node and the first abnormal nodes, Yi Jizheng The influence power of at least two adjacent nodes between Chang Jiedian and the first abnormal nodes at least one indirect reachable path determines Influence power of first abnormal nodes to normal node.
Node and when non-conterminous the first abnormal nodes if normal, it is different according to normal node in destination node topological diagram and first The influence power of at least two adjacent nodes between Chang Jiedian on each reachable path, determines first on each reachable path Influence power of the abnormal nodes to normal node;To the first abnormal nodes on each reachable path in destination node topological diagram to just The influence power of Chang Jiedian carries out cumulative summation, obtains the first abnormal nodes to the influence power of normal node.
Illustratively, node and when non-conterminous the first abnormal nodes if normal, is normally saved according in destination node topological diagram The influence power of at least two adjacent nodes between point and the first abnormal nodes on each reachable path determines the first abnormal section Influence power of the point to normal node.As shown in figure 5, the reachable path between node a and node f includes acf, adf, reachable path The upper node a of acf is P to the influence power of node fi ac*Pi cf, node a is P to the influence power of node f on reachable path adfi ad* Pi df, then influence power P of i-th of destination node topological diagram interior joint a to node fi af=Pi ac*Pi cf+Pi ad*Pi df
When node is adjacent with the first abnormal nodes if normal, the first abnormal nodes are directly acquired from destination node topological diagram To the influence power of normal node.As shown in figure 5, node a is P to the influence power of node bi ac, Pi acIt can be from target topological diagram It directly obtains, node a is P to the influence power of node ei e=Pi eae+Pi ab*Pi be+Pi ac*Pi ce
Further, according to the first abnormal nodes in each destination node topological diagram to the influence power of normal node, meter The first abnormal nodes are calculated to total influence power of normal node, total influence power is used to characterize the probability that normal node is abnormal nodes.
By adopting the above technical scheme, after excavating abnormal nodes, the operation label according to belonging to abnormal nodes is obtained each Corresponding node topology figure under label is operated, each operation label abnormal nodes is then calculated to the influence power of normal node, incites somebody to action Influence power under all operation labels is added, and obtains these abnormal nodes to total influence power of normal node, so that it is determined that normally Node is the probability of abnormal nodes.
Embodiment three
In order to more embody the purpose of the present invention, on the basis of the above embodiment of the present invention, further lifted Example explanation, as shown in fig. 6, information processing method specifically includes:
Step 601: when determining at least one abnormal nodes, being determined from least one node topology figure different comprising first At least one destination node topological diagram of Chang Jiedian;
Step 602: the influence power based on adjacent node at least one destination node topological diagram determines at least one target Influence power of first abnormal nodes at least one normal node in node topology figure;
Step 603: from least one destination node topological diagram determine comprising the first normal node at least one first Destination node topological diagram;Wherein, the first normal node is any one normal node at least one normal node;
Step 604: based on the first abnormal nodes at least one first object node topology figure to the first normal node Influence power determines that the first normal node is the probability of abnormal nodes.
Here, the executing subject of step 601 to step 604 can be the processor in information processing unit.First is abnormal Node is any one abnormal nodes at least one abnormal nodes, contains at least two adjacent node and phase in node topology figure The influence power of neighbors.
The influence power of adjacent node and adjacent node, destination node are contained at least two in practical application, in destination node Classify according to the operation label of node, the corresponding operation label of each destination node topology.First abnormal nodes position It further include at least one normal node in destination node topological diagram at least one destination node topological diagram.
It is specifically included in step 602: according to the influence power between adjacent node, determining the first abnormal nodes to all normal The influence power of node.
It should be noted that the influence power between adjacent node can have directionality.For example, node a and node b is phase When neighbors, node a is P to the influence power of node bab, node b is P to the influence power of node aba, PabWith PbaIt is equal or not Deng.
Here, the first abnormal nodes and the first normal node are contained in first object node topology figure, calculates each The first abnormal nodes are to the influence power of the first normal node in destination node topological diagram, by all first object node topology figures In the first abnormal nodes cumulative summation is carried out to the influence power of the first normal node, obtain the first abnormal nodes to the first normal section Total influence power of point, total influence power are the probability that the first normal node is abnormal nodes.
Illustratively, as shown in figure 5, if node a is abnormal nodes, influence power of the node a to node c Wherein, k is the quantity for operating label, i.e. node a is the sum of influence power under k operation label to total influence power of node c.
In practical application, after determining abnormal nodes, determine that the exception is saved according to the node topology figure pre-established Influence power of the point to other users.Then, abnormal nodes are determined from no abnormal node according to the influence power determined The biggish node of probability, and high level risk management and control is executed to these nodes.It follows that by adopting the above technical scheme can be with In the case where node is not carried out abnormal operation behavior, the risk that node executes abnormal operation behavior is predefined and prevents, So as to effectively solve the problems, such as that potential abnormal nodes can not be determined in advance in the prior art.
Example IV
Based on the same inventive concept, the embodiment of the invention also provides a kind of information processing units.Fig. 7 is that the present invention is implemented The composed structure schematic diagram of information processing unit in example, as shown in fig. 7, the information processing unit 70 includes: processor 701 and matches It is set to the memory 702 for the computer program that storage can be run on processor 701,
Processor 701 is for executing the program stored in memory 702, to perform the steps of
When determining at least one abnormal nodes, determine from least one node topology figure comprising the first abnormal nodes At least one destination node topological diagram;Wherein, the first abnormal nodes are any one abnormal nodes at least one abnormal nodes, The influence power of adjacent node and adjacent node is contained at least two in node topology figure;
Based on the influence power of adjacent node at least one destination node topological diagram, at least one destination node topology is determined Influence power of first abnormal nodes at least one normal node in figure;
Based on the first abnormal nodes at least one destination node topological diagram to the influence power of at least one normal node, really At least one fixed normal node is the probability of abnormal nodes.
In some embodiments, processor 701 is also used to execute the program stored in memory 702, to realize following step Rapid: IP address and operation log based at least two nodes establish at least one node topology figure;Wherein, operation log is used In the operation behavior of record node.
In some embodiments, processor 701 is also used to execute the program stored in memory 702, to realize following step It is rapid: to be based on IP address, establish at least one first topological diagram;Wherein, two nodes of arbitrary neighborhood have phase in the first topological diagram Same IP address;Based on operation log, at least one node topology figure is obtained from least one first topological diagram.
In some embodiments, the operation log includes at least the operation behavior of node;
Processor 701 is specifically used for executing the program stored in memory 702, is based on the behaviour to perform the steps of Make behavior, calculates the influence power at least one described first topological diagram between adjacent node;Based on the operation behavior, obtain At least one operation label of each node;Wherein, the operation label is used to characterize the classification of nodal operation behavior;It is based on At least one described first topological diagram is divided at least one second topology by least one operation label of each node Figure;Wherein, the corresponding operation label of each second topological diagram;Using at least one second topological diagram comprising influence power as At least one described node topology figure.
In some embodiments, processor 701 is specifically used for executing the program stored in memory 702, following to realize Step: when node is adjacent with the first abnormal nodes if normal, the described first abnormal section is directly acquired from destination node topological diagram Influence power of the point to the normal node;Node and when non-conterminous the first abnormal nodes if normal, according to destination node topological diagram The influence power of at least two adjacent nodes between middle normal node and the first abnormal nodes on each reachable path determines Influence power of one abnormal nodes to normal node.
In some embodiments, processor 701 is specifically used for executing the program stored in memory 702, following to realize Step: according in destination node topological diagram between normal node and the first abnormal nodes on each reachable path at least two The influence power of adjacent node determines that the first abnormal nodes are to the influence power of normal node on each reachable path;To target section The first abnormal nodes carry out cumulative summation to the influence power of normal node on each reachable path in point topological diagram, obtain first Influence power of the abnormal nodes to normal node.
In some embodiments, processor 701 is specifically used for executing the program stored in memory 702, following to realize Step: at least one first object node topology comprising the first normal node is determined from least one destination node topological diagram Figure;Wherein, the first normal node is any one normal node at least one normal node;Based at least one the first mesh It marks the first abnormal nodes in node topology figure and the first normal node, which is abnormal nodes, to be determined to the influence power of the first normal node Probability.
In some embodiments, processor 701 is specifically used for executing the program stored in memory 702, following to realize Step: cumulative ask is carried out to the influence power of the first normal node to the first abnormal nodes in each first object node topology figure With, obtain the first normal node be abnormal nodes probability.
In practical applications, above-mentioned memory can be volatile memory (volatile memory), such as deposit at random Access to memory (RAM, Random-Access Memory);Or nonvolatile memory (non-volatile memory), example Such as read-only memory (ROM, Read-Only Memory), flash memory (flash memory), hard disk (HDD, Hard Disk Drive) or solid state hard disk (SSD, Solid-State Drive);Or the combination of the memory of mentioned kind, and to Processor provides instruction and data.
Above-mentioned processor can be application-specific IC (ASIC, Application Specific Integrated Circuit), digital signal processing device (DSPD, Digital Signal Processing Device), programmable logic dress Set (PLD, Programmable Logic Device), field programmable gate array (Field-Programmable Gate Array, FPGA), controller, at least one of microcontroller, microprocessor.It is to be appreciated that being used for different equipment In realize the electronic device of above-mentioned processor function can also be it is other, the embodiment of the present invention is not especially limited.
In the exemplary embodiment, the embodiment of the present application also provides a kind of computer readable storage medium, for example including The memory 702 of computer program, above-mentioned computer program can be executed by processor 701, to complete aforementioned method steps.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, the shape of hardware embodiment, software implementation or embodiment combining software and hardware aspects can be used in the present invention Formula.Moreover, the present invention, which can be used, can use storage in the computer that one or more wherein includes computer usable program code The form for the computer program product implemented on medium (including but not limited to magnetic disk storage and optical memory etc.).
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Schematic diagram and/or block diagram describe.It should be understood that can be realized by computer program instructions in flow diagram and/or block diagram Each flow and/or block and process and/or box in flow diagram and/or block diagram combination.It can provide this A little computer program instructions are to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices Processor to generate a machine so that the finger executed by the processor of computer or other programmable data processing devices It enables generating and refer to for realizing in flow diagram one process or multiple processes and/or block diagrams one box or multiple boxes The device of fixed function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, The manufacture of device is enabled, which realizes in one side of flow diagram one process or multiple processes and/or block diagrams The function of being specified in frame or multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one process of flow diagram or multiple processes and/or box The step of function of being specified in figure one box or multiple boxes.
More than, only presently preferred embodiments of the present invention is not intended to limit the scope of the present invention.

Claims (10)

1. a kind of information processing method, which is characterized in that the described method includes:
When determining at least one abnormal nodes, determined comprising the first abnormal nodes at least from least one node topology figure One destination node topological diagram;Wherein, first abnormal nodes are any one exception at least one described abnormal nodes Node contains at least two the influence power of adjacent node and adjacent node in the node topology figure;
Based on the influence power of adjacent node at least one described destination node topological diagram, at least one described destination node is determined Influence power of first abnormal nodes at least one normal node described in topological diagram;
Based on influence of first abnormal nodes at least one normal node described at least one described destination node topological diagram Power determines that at least one described normal node is the probability of abnormal nodes.
2. the method according to claim 1, wherein before determining at least one abnormal nodes, the method Further include:
IP address and operation log based at least two nodes establish at least one node topology figure;Wherein, the operation day Will is used to record the operation behavior of node.
3. according to the method described in claim 2, it is characterized in that, the IP address based at least two nodes and operation day Will establishes at least one node topology figure, comprising:
Based on the IP address, at least one first topological diagram is established;Wherein, arbitrary neighborhood two sections in first topological diagram Point IP address having the same;
Based on the operation log, at least one node topology figure is obtained from least one described first topological diagram.
4. according to the method described in claim 3, it is characterized in that, the operation log includes at least the operation behavior of node;
It is described to be based on the operation log, at least one node topology figure is obtained from least one described first topological diagram, is wrapped It includes:
Based on the operation behavior, the influence power at least one described first topological diagram between adjacent node is calculated;
Based on the operation behavior, at least one operation label of each node is obtained;Wherein, the operation label is used for table Levy the classification of nodal operation behavior;
At least one operation label based on each node, by least one described first topological diagram be divided at least one the Two topological diagrams;Wherein, the corresponding operation label of each second topological diagram;
Using at least one second topological diagram comprising influence power as at least one described node topology figure.
5. the method according to claim 1, wherein described based at least one described destination node topological diagram The influence power of adjacent node determines the first abnormal nodes described at least one described destination node topological diagram at least one just The influence power of Chang Jiedian, comprising:
When node is adjacent with first abnormal nodes if normal, it is abnormal that described first is directly acquired from destination node topological diagram Influence power of the node to the normal node;
When node and first abnormal nodes are non-conterminous if normal, according to normal node described in the destination node topological diagram The influence power of at least two adjacent nodes between first abnormal nodes on each reachable path, determines described first Influence power of the abnormal nodes to the normal node.
6. according to the method described in claim 5, it is characterized in that, described normal according to the destination node topological diagram The influence power of at least two adjacent nodes between node and first abnormal nodes on each reachable path, determine described in Influence power of first abnormal nodes to the normal node, comprising:
According to each reachable path between normal node described in the destination node topological diagram and first abnormal nodes On at least two adjacent nodes influence power, determine that first abnormal nodes are to the normal section on each reachable path The influence power of point;
To first abnormal nodes on each reachable path in the destination node topological diagram to the shadow of the normal node It rings power and carries out cumulative summation, obtain first abnormal nodes to the influence power of the normal node.
7. the method according to claim 1, wherein described based at least one described destination node topological diagram First abnormal nodes determine that at least one described normal node is abnormal nodes to the influence power of at least one normal node Probability, comprising:
At least one first object node comprising the first normal node is determined from least one described destination node topological diagram Topological diagram;Wherein, first normal node is any one normal node at least one described normal node;
Based on the first abnormal nodes described at least one described first object node topology figure to first normal node Influence power determines that first normal node is the probability of abnormal nodes.
8. the method according to the description of claim 7 is characterized in that described based at least one described first object node topology First abnormal nodes described in figure determine that first normal node is abnormal nodes to the influence power of first normal node Probability, comprising:
To the first abnormal nodes described in each first object node topology figure to the influence power of first normal node into The cumulative summation of row, obtains the probability that first normal node is abnormal nodes.
9. a kind of information processing unit, the information processing unit include: processor and be configured to storage can be on a processor The memory of the computer program of operation,
Wherein, when the processor is configured to run the computer program, perform claim requires any one of 1 to 8 the method The step of.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt The step of claim 1 to 8 described in any item methods are realized when processor executes.
CN201811573833.1A 2018-12-21 2018-12-21 Information processing method, device and storage medium Active CN109617887B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811573833.1A CN109617887B (en) 2018-12-21 2018-12-21 Information processing method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811573833.1A CN109617887B (en) 2018-12-21 2018-12-21 Information processing method, device and storage medium

Publications (2)

Publication Number Publication Date
CN109617887A true CN109617887A (en) 2019-04-12
CN109617887B CN109617887B (en) 2021-06-15

Family

ID=66010328

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811573833.1A Active CN109617887B (en) 2018-12-21 2018-12-21 Information processing method, device and storage medium

Country Status (1)

Country Link
CN (1) CN109617887B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110120893A (en) * 2019-05-13 2019-08-13 恒安嘉新(北京)科技股份公司 A kind of method and device positioning network system security problem
CN111343161A (en) * 2020-02-14 2020-06-26 平安科技(深圳)有限公司 Abnormal information processing node analysis method, abnormal information processing node analysis device, abnormal information processing node analysis medium and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106355506A (en) * 2016-08-15 2017-01-25 中南大学 Method for selecting the initial node with maximum influence in online social network
CN106411904A (en) * 2016-10-10 2017-02-15 华侨大学 Network risk control method based on microstate prediction
CN106713354A (en) * 2017-01-23 2017-05-24 全球能源互联网研究院 Method for evaluating vulnerability node of electric cyber-physical system based on undetectable information attack pre-warning technology
CN107679716A (en) * 2017-09-19 2018-02-09 西南交通大学 Consider the risk assessment of interconnected network cascading failure and the alarm method of communication fragile degree
CN108768949A (en) * 2018-04-28 2018-11-06 广东电网有限责任公司 Random geometry data exception localization method based on markov random file theory
EP3400678A1 (en) * 2016-01-08 2018-11-14 Telefonaktiebolaget LM Ericsson (PUBL) Graph construction for computed spring multicast

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3400678A1 (en) * 2016-01-08 2018-11-14 Telefonaktiebolaget LM Ericsson (PUBL) Graph construction for computed spring multicast
CN106355506A (en) * 2016-08-15 2017-01-25 中南大学 Method for selecting the initial node with maximum influence in online social network
CN106411904A (en) * 2016-10-10 2017-02-15 华侨大学 Network risk control method based on microstate prediction
CN106713354A (en) * 2017-01-23 2017-05-24 全球能源互联网研究院 Method for evaluating vulnerability node of electric cyber-physical system based on undetectable information attack pre-warning technology
CN107679716A (en) * 2017-09-19 2018-02-09 西南交通大学 Consider the risk assessment of interconnected network cascading failure and the alarm method of communication fragile degree
CN108768949A (en) * 2018-04-28 2018-11-06 广东电网有限责任公司 Random geometry data exception localization method based on markov random file theory

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王浩然: "社交网络中基于竞争的影响力最大化研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110120893A (en) * 2019-05-13 2019-08-13 恒安嘉新(北京)科技股份公司 A kind of method and device positioning network system security problem
CN110120893B (en) * 2019-05-13 2022-12-13 恒安嘉新(北京)科技股份公司 Method and device for positioning network system security problem
CN111343161A (en) * 2020-02-14 2020-06-26 平安科技(深圳)有限公司 Abnormal information processing node analysis method, abnormal information processing node analysis device, abnormal information processing node analysis medium and electronic equipment

Also Published As

Publication number Publication date
CN109617887B (en) 2021-06-15

Similar Documents

Publication Publication Date Title
JP7441582B2 (en) Methods, devices, computer-readable storage media and programs for detecting data breaches
US11710131B2 (en) Method and apparatus of identifying a transaction risk
US11223625B2 (en) System and method for detecting malicious device by using a behavior analysis
US20220014556A1 (en) Cybersecurity profiling and rating using active and passive external reconnaissance
US11218510B2 (en) Advanced cybersecurity threat mitigation using software supply chain analysis
US10594714B2 (en) User and entity behavioral analysis using an advanced cyber decision platform
EP3700147B1 (en) System and method for classifying network traffic
US10936717B1 (en) Monitoring containers running on container host devices for detection of anomalies in current container behavior
US10055582B1 (en) Automated detection and remediation of ransomware attacks involving a storage device of a computer network
CN110383278A (en) The system and method for calculating event for detecting malice
US20210360032A1 (en) Cybersecurity risk analysis and anomaly detection using active and passive external reconnaissance
US20180219919A1 (en) Rating organization cybersecurity using active and passive external reconnaissance
US10135862B1 (en) Testing security incident response through automated injection of known indicators of compromise
US20160019395A1 (en) Adapting decoy data present in a network
US20210281609A1 (en) Rating organization cybersecurity using probe-based network reconnaissance techniques
US10255434B2 (en) Detecting software attacks on processes in computing devices
US10628587B2 (en) Identifying and halting unknown ransomware
US10579797B2 (en) Program integrity monitoring and contingency management system and method
US10979446B1 (en) Automated vulnerability chaining
WO2019136850A1 (en) Risk behavior recognition method and system, and storage medium and device
CN112769775B (en) Threat information association analysis method, system, equipment and computer medium
JP5739034B1 (en) Attack detection system, attack detection device, attack detection method, and attack detection program
CN111770047A (en) Abnormal group detection method, device and equipment
US10614215B2 (en) Malware collusion detection
CN109617887A (en) Information processing method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant