CN111898123B - Malicious operation identification method, device, equipment and readable storage medium - Google Patents

Malicious operation identification method, device, equipment and readable storage medium Download PDF

Info

Publication number
CN111898123B
CN111898123B CN202010738573.XA CN202010738573A CN111898123B CN 111898123 B CN111898123 B CN 111898123B CN 202010738573 A CN202010738573 A CN 202010738573A CN 111898123 B CN111898123 B CN 111898123B
Authority
CN
China
Prior art keywords
evaluation value
value
matching
malicious
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010738573.XA
Other languages
Chinese (zh)
Other versions
CN111898123A (en
Inventor
路廷文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Yingxin Computer Technology Co Ltd
Original Assignee
Shandong Yingxin Computer Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Yingxin Computer Technology Co Ltd filed Critical Shandong Yingxin Computer Technology Co Ltd
Priority to CN202010738573.XA priority Critical patent/CN111898123B/en
Publication of CN111898123A publication Critical patent/CN111898123A/en
Application granted granted Critical
Publication of CN111898123B publication Critical patent/CN111898123B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application discloses a malicious operation identification method, a malicious operation identification device, malicious operation identification equipment and a computer readable storage medium, wherein the method comprises the following steps: receiving the operation of a user and determining an operation object of the operation; determining an operation value of an operation object based on a correspondence between the operation object and the operation value established in advance, and calculating an evaluation value of an operation according to the operation value of the operation object; matching the evaluation value of the operation with a pre-established database, and determining a target evaluation value corresponding to the evaluation value of the operation and an operation behavior corresponding to the target evaluation value; and judging whether the operation is malicious operation or not based on the operation behavior, and if so, intercepting the operation. According to the technical scheme, the operation behavior is obtained by obtaining the operation value of the operation object, calculating the evaluation value of the operation and matching the evaluation value of the operation with the database, the malicious operation is identified based on the operation behavior, and the malicious operation is intercepted when being identified, so that the operation safety of the data center is ensured as much as possible.

Description

Malicious operation identification method, device, equipment and readable storage medium
Technical Field
The present application relates to the field of security technologies, and in particular, to a malicious operation identification method, apparatus, device, and computer-readable storage medium.
Background
With the development of cloud computing, data centers of many units are handed to third parties for operation and maintenance, and hackers and trojans have paid great attention and have corresponding countermeasures. However, for the operation of the operation and maintenance personnel, at present, it is impossible to determine whether the operation is a benign operation or a malicious operation, that is, the malicious operation cannot be identified, so the malicious operation cannot be processed in time, and the safe operation of the data center is affected.
In summary, how to identify and process malicious operations in time is a technical problem that needs to be solved urgently by those skilled in the art.
Disclosure of Invention
In view of the above, an object of the present application is to provide a malicious operation identification method, device, apparatus, and computer readable storage medium, for identifying and timely processing a malicious operation.
In order to achieve the above purpose, the present application provides the following technical solutions:
a malicious operation identification method, comprising:
receiving an operation of a user and determining an operation object of the operation;
determining an operation value of an operation object based on a corresponding relation between the operation object and the operation value which is established in advance, and calculating an evaluation value of the operation according to the operation value of the operation object;
matching the evaluation value of the operation with a pre-established database, and determining a target evaluation value corresponding to the evaluation value of the operation and an operation behavior corresponding to the target evaluation value;
and judging whether the operation is malicious operation or not based on the operation behavior, and if so, intercepting the operation.
Preferably, calculating the evaluation value of the operation from the operation value of the operation object includes:
by using
Figure DEST_PATH_IMAGE001
Calculating an evaluation value of the operation
Figure 100002_DEST_PATH_IMAGE002
Wherein,
Figure DEST_PATH_IMAGE003
the operation value corresponding to the account logged in by the user,
Figure 100002_DEST_PATH_IMAGE004
a weight corresponding to an account for which the user is logged in,
Figure DEST_PATH_IMAGE005
in order to operate the operation value of the main body,
Figure 100002_DEST_PATH_IMAGE006
is the weight of the subject of the operation,
Figure DEST_PATH_IMAGE007
in order to operate the operation value of the object,
Figure 100002_DEST_PATH_IMAGE008
is the weight of the operation object,
Figure DEST_PATH_IMAGE009
is the operational value of the operational action,
Figure 100002_DEST_PATH_IMAGE010
is the weight of the action of the operation,
Figure DEST_PATH_IMAGE011
preferably, matching the evaluation value of the operation with a pre-established database, and determining a target evaluation value corresponding to the evaluation value of the operation and an operation behavior corresponding to the target evaluation value, includes:
dividing the evaluation values in the database into a plurality of matching groups;
matching the evaluation value of the operation with each matching group respectively;
and when the evaluation value of the operation is successfully matched with the evaluation value in one of the matching groups, terminating the matching, taking the evaluation value successfully matched as the target evaluation value, and acquiring the operation behavior corresponding to the target evaluation value from the database.
Preferably, the matching the evaluation value of the operation with each of the matching groups respectively includes:
taking the first evaluation value in the matching group as a current evaluation value, and judging whether the evaluation value of the operation is within a matching range determined by the current evaluation value;
if yes, determining that the matching is successful;
if not, the next evaluation value in the matching group is taken as the current evaluation value, and the step of judging whether the evaluation value of the operation is in the matching range determined by the current evaluation value is executed.
Preferably, dividing the evaluation values in the database into a plurality of matching groups includes:
and dividing the evaluation values in the database into odd number matching groups and even number matching groups according to the odd number and the even number.
Preferably, after intercepting the operation, the method further comprises:
and sending a prompt to the user.
A malicious operation identification apparatus comprising:
the receiving module is used for receiving the operation of a user and determining an operation object of the operation;
the first determination module is used for determining the operation value of the operation object based on the corresponding relation between the operation object and the operation value which is established in advance, and calculating the evaluation value of the operation according to the operation value of the operation object;
the second determination module is used for matching the evaluation value of the operation with a pre-established database and determining a target evaluation value corresponding to the evaluation value of the operation and an operation behavior corresponding to the target evaluation value;
and the interception module is used for judging whether the operation is malicious operation or not based on the operation behavior, and if so, intercepting the operation.
Preferably, the first determining module includes:
a computing unit for utilizing
Figure 100002_DEST_PATH_IMAGE012
Calculating an evaluation value of the operation
Figure 919293DEST_PATH_IMAGE002
Wherein, among others,
Figure 102012DEST_PATH_IMAGE003
the operation value corresponding to the account logged in by the user,
Figure DEST_PATH_IMAGE013
a weight corresponding to an account for which the user is logged in,
Figure 100002_DEST_PATH_IMAGE014
to operateThe operational value of the main body is set,
Figure 944066DEST_PATH_IMAGE006
is the weight of the subject of the operation,
Figure DEST_PATH_IMAGE015
in order to operate the operation value of the object,
Figure 100002_DEST_PATH_IMAGE016
is the weight of the operation object,
Figure DEST_PATH_IMAGE017
is the operational value of the operational action,
Figure 230953DEST_PATH_IMAGE010
is the weight of the action of the operation,
Figure 100002_DEST_PATH_IMAGE018
a malicious operation identification apparatus comprising:
a memory for storing a computer program;
a processor for implementing the steps of the malicious operation identification method according to any one of the above claims when executing the computer program.
A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the malicious operation identification method according to any one of the preceding claims.
The application provides a malicious operation identification method, a malicious operation identification device, malicious operation identification equipment and a computer readable storage medium, wherein the method comprises the following steps: receiving the operation of a user and determining an operation object of the operation; determining an operation value of an operation object based on a corresponding relation between the operation object and the operation value established in advance, and calculating an evaluation value of the operation according to the operation value of the operation object; matching the evaluation value of the operation with a pre-established database, and determining a target evaluation value corresponding to the evaluation value of the operation and an operation behavior corresponding to the target evaluation value; and judging whether the operation is malicious operation or not based on the operation behavior, and if so, intercepting the operation.
According to the technical scheme, after the operation of a user is received, the operation value of the operation object in the operation is determined based on the corresponding relation between the operation object and the operation value which is established in advance, the operation evaluation value is calculated according to the operation value of the operation object, the operation behavior corresponding to the target evaluation value and the target evaluation value corresponding to the operation is determined by matching the operation evaluation value with a database which is established in advance, then whether the operation is malicious operation or not is judged based on the determined operation behavior, and the malicious operation is intercepted when the operation is determined, so that the malicious operation is identified, the interception processing is carried out when the malicious operation is identified, and the operation safety of a data center is ensured as much as possible.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a malicious operation identification method according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of a malicious operation identification apparatus according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of a malicious operation identification device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, which shows a flowchart of a malicious operation identification method provided in an embodiment of the present application, a malicious operation identification method provided in an embodiment of the present application may include:
s11: and receiving the operation of the user and determining the operation object of the operation.
When a user operates the data center, the user can operate the data center by logging in an account, and accordingly the data center can receive the operation of the user on the data center and can determine an operation object of the operation.
S12: the operation value of the operation object is determined based on the correspondence relationship between the operation object and the operation value established in advance, and the evaluation value of the operation is calculated from the operation value of the operation object.
Before receiving the operation of the user, the corresponding relationship between the operation object and the operation value may be set in advance through experiments.
After step S11 is completed, the operation value corresponding to the operation object may be determined based on the correspondence relationship between the operation object and the operation value established in advance, and the evaluation value of the operation may be calculated from the operation value of the operation object, for example: txt, namely determining that the normal action evaluation value of the user test on the deletion of the common file test is 100, the normal deletion action evaluation value of the user test on the system file is 110, and the editing malicious action evaluation value of the user administeror on the core file is 120.
S13: and matching the evaluation value of the operation with a pre-established database, and determining a target evaluation value corresponding to the evaluation value of the operation and an operation behavior corresponding to the target evaluation value.
Before receiving the operation of the user, a database including a plurality of evaluation values and corresponding relationships between the evaluation values and the operation behaviors may be established in advance based on experiments or the like. It should be noted that the operation behaviors mentioned herein may be specifically classified into normal class 1, normal class 2, normal class 3, and abnormal class 4 … …, and the evaluation values and their corresponding operation behaviors may be stored in the database in the form of a data table, for example: as shown in table 1, it shows a correspondence table between evaluation values and operation behaviors in the database:
TABLE 1 table of correspondence between evaluation values and operation behaviors in database
Figure DEST_PATH_IMAGE019
In addition, the database mentioned here needs to contain various possible operation behaviors and their corresponding evaluation values in order to improve the accuracy and reliability of operation matching.
After step S12 is performed, the evaluation values of the operations may be matched with a database established in advance to determine a target evaluation value corresponding to the evaluation value of the operation, and an operation behavior corresponding to the target evaluation value.
After determining the target evaluation value corresponding to the evaluation value of the operation and the operation behavior corresponding to the target evaluation value, the operation behavior corresponding to the target evaluation value and the target evaluation value can be returned to the user, so that the user can know the state in time.
S14: judging whether the operation is malicious operation or not based on the operation behavior; if yes, go to step S15;
s15: and intercepting the operation.
After determining the target evaluation value corresponding to the operation and the operation behavior corresponding to the target evaluation value, whether the operation performed by the user is a malicious operation or not can be judged based on the operation behavior, wherein if the operation behavior is a normal class, the operation performed by the user is determined not to be the malicious operation, if the operation behavior is not the normal class, the operation is determined to be the malicious operation, and the identified malicious operation can be intercepted, that is, the malicious operation can be prevented, so that the malicious operation is prevented from affecting the safe operation of the data center.
According to the technical scheme, after the operation of a user is received, the operation value of the operation object in the operation is determined based on the corresponding relation between the operation object and the operation value which is established in advance, the operation evaluation value is determined according to the operation value of the operation object, the operation behavior corresponding to the target evaluation value and the target evaluation value corresponding to the operation is determined by matching the operation evaluation value with a database which is established in advance, then whether the operation is malicious operation or not is judged based on the determined operation behavior, and the malicious operation is intercepted when the operation is determined, so that the malicious operation is identified, the interception processing is carried out when the malicious operation is identified, and the operation safety of a data center is ensured as much as possible.
The malicious operation identification method provided by the embodiment of the application calculates the evaluation value of the operation according to the operation value of the operation object, and may include:
by using
Figure 107643DEST_PATH_IMAGE001
Calculating an evaluation value of the operation
Figure 195684DEST_PATH_IMAGE002
Wherein,
Figure 665980DEST_PATH_IMAGE003
the operation value corresponding to the account logged in by the user,
Figure 130459DEST_PATH_IMAGE013
the weight corresponding to the account the user is logged in,
Figure 100002_DEST_PATH_IMAGE020
in order to operate the operation value of the main body,
Figure 596076DEST_PATH_IMAGE006
in order to manipulate the weight of the subject,
Figure 855019DEST_PATH_IMAGE015
in order to operate the operation value of the object,
Figure DEST_PATH_IMAGE021
in order to manipulate the weight of the object,
Figure 100002_DEST_PATH_IMAGE022
is the operational value of the operational action,
Figure 170200DEST_PATH_IMAGE010
in order to weight the action of the operation,
Figure 235108DEST_PATH_IMAGE018
when calculating the evaluation value of the operation from the operation value of the operation object, a formula may be specifically used
Figure 24073DEST_PATH_IMAGE001
A calculation is performed in which, among other things,
Figure 100002_DEST_PATH_IMAGE023
as an evaluation value for the operation,
Figure 922758DEST_PATH_IMAGE003
the operation value corresponding to the account logged in by the user,
Figure 757859DEST_PATH_IMAGE013
the weight corresponding to the account the user is logged in,
Figure 100002_DEST_PATH_IMAGE024
in order to operate the operation value of the main body,
Figure 501824DEST_PATH_IMAGE006
in order to manipulate the weight of the subject,
Figure 473191DEST_PATH_IMAGE015
in order to operate the operation value of the object,
Figure 73937DEST_PATH_IMAGE006
in order to manipulate the weight of the object,
Figure 271700DEST_PATH_IMAGE022
is the operational value of the operational action,
Figure 179876DEST_PATH_IMAGE010
in order to weight the action of the operation,
Figure 943432DEST_PATH_IMAGE018
Figure 918342DEST_PATH_IMAGE013
Figure 462455DEST_PATH_IMAGE006
Figure 610540DEST_PATH_IMAGE006
and
Figure DEST_PATH_IMAGE025
can be set empirically, for example
Figure DEST_PATH_IMAGE026
It may be a compound of the order of 0.1,
Figure 759762DEST_PATH_IMAGE006
it may be in the range of 0.2,
Figure 171151DEST_PATH_IMAGE006
it may be in the range of 0.3,
Figure 874665DEST_PATH_IMAGE010
these weights may be 0.4, although they may be adjusted.
The malicious operation identification method provided by the embodiment of the application matches the evaluation value of the operation with a pre-established database, and determines a target evaluation value corresponding to the evaluation value of the operation and an operation behavior corresponding to the target evaluation value, and may include:
dividing the evaluation values in the database into a plurality of matching groups;
matching the evaluation value of the operation with each matching group respectively;
when the evaluation value of the operation is successfully matched with the evaluation value in one of the matching groups, the matching is terminated, the successfully matched evaluation value is taken as the target evaluation value, and the operation behavior corresponding to the target evaluation value is obtained from the database.
When the evaluation value of the operation is matched with a pre-established database, and a target evaluation value corresponding to the evaluation value of the operation and an operation behavior corresponding to the target evaluation value are determined, in order to improve the matching efficiency and facilitate the identification of malicious operation as soon as possible, thereby facilitating the reduction of the influence of the malicious operation on the safe operation of a data center as much as possible, the evaluation value in the database can be divided into a plurality of matching groups, and the evaluation value of the operation can be simultaneously matched with each of the divided matching groups, when the matching is performed, when the evaluation value of the operation is successfully matched with the evaluation value in any one of the matching groups, the matching is terminated, that is, the matching is not continued, that is, a so-called suicide mechanism is realized, so as to improve the matching efficiency. When the matching is successfully terminated, the evaluation value successfully matched can be used as a target evaluation value, and the operation behavior corresponding to the target evaluation value can be acquired from the database, so that whether the operation performed by the user is a malicious operation or not can be determined according to the operation behavior.
The malicious operation identification method provided by the embodiment of the application matches the evaluation value of the operation with each matching group respectively, and may include:
taking the first evaluation value in the matching group as a current evaluation value, and judging whether the evaluation value of the operation is within a matching range determined by the current evaluation value;
if yes, determining that the matching is successful;
if not, the next evaluation value in the matching group is taken as the current evaluation value, and a step of judging whether the evaluation value of the operation is within the matching range determined by the current evaluation value is performed.
When the evaluation value of the operation is matched with each matching group, respectively, the first evaluation value in each matching group may be set as a current evaluation value, and it is determined whether the evaluation value of the operation is within a matching range determined by the current evaluation value, matching is successful if the evaluation value of the operation is within the matching range determined by the current evaluation value, and if the evaluation value of the operation is not within the matching range determined by the current evaluation value, the next evaluation value in each matching group (i.e., one evaluation value located behind the current evaluation value) may be set as the current evaluation value, and the step of determining whether the evaluation value of the operation is within the matching range determined by the current evaluation value is performed until matching is successful. The above-mentioned matching range may be specifically a range (including end points) obtained by expanding a preset error (for example, 10 or 20, etc.) to the left and right sides with the current evaluation value as a center, for example: taking the current evaluation value as 100 and the preset error as 20 as an example, the corresponding matching range is 80-120 (including 80 and 120), that is, when the evaluation value of the operation is any value between 80-120, the target evaluation value matched with the operation is 100.
The fuzzy matching is realized by judging whether the evaluation value of the operation is within the matching range determined by the current evaluation value, so as to improve the matching efficiency.
The malicious operation identification method provided by the embodiment of the application divides the evaluation value in the database into a plurality of matching groups, and may include:
the evaluation values in the database are divided into odd number matching groups and even number matching groups according to the parity.
When dividing the evaluation values in the database, the evaluation values in the database may be specifically divided into odd-numbered matched groups and even-numbered matched groups according to odd numbers and even numbers, where the evaluation values included in the odd-numbered matched groups are all odd numbers, and the evaluation values included in the even-numbered matched groups are all even numbers.
Of course, the evaluation values in the database may be divided into a plurality of matching groups in other manners, and the dividing manner is not limited herein.
After intercepting the operation, the malicious operation identification method provided by the embodiment of the application may further include:
and sending a prompt to the user.
After the operation is intercepted, a prompt can be sent to the user, so that the user can correct the operation in time or take other measures to reduce the influence of the malicious operation on the data center.
Referring to fig. 2, a structural schematic diagram of a malicious operation recognition apparatus provided in an embodiment of the present application is shown, and the malicious operation recognition apparatus may include:
a receiving module 21, configured to receive an operation of a user and determine an operation object of the operation;
a first determining module 22, configured to determine an operation value of the operation object based on a correspondence relationship between the operation object and the operation value established in advance, and calculate an evaluation value of the operation according to the operation value of the operation object;
a second determining module 23, configured to match the evaluation value of the operation with a pre-established database, and determine a target evaluation value corresponding to the evaluation value of the operation and an operation behavior corresponding to the target evaluation value;
and the intercepting module 24 is configured to determine whether the operation is a malicious operation based on the operation behavior, and intercept the operation if the operation is the malicious operation.
In an apparatus for identifying malicious operations provided in an embodiment of the present application, the first determining module 22 may include:
a computing unit for utilizing
Figure 623178DEST_PATH_IMAGE012
Calculating an evaluation value of the operation
Figure 361327DEST_PATH_IMAGE002
Wherein,
Figure 678039DEST_PATH_IMAGE003
the operation value corresponding to the account logged in by the user,
Figure 695280DEST_PATH_IMAGE004
the weight corresponding to the account the user is logged in,
Figure 185167DEST_PATH_IMAGE020
in order to operate the operation value of the main body,
Figure 449927DEST_PATH_IMAGE006
in order to manipulate the weight of the subject,
Figure 999857DEST_PATH_IMAGE015
in order to operate the operation value of the object,
Figure DEST_PATH_IMAGE027
in order to manipulate the weight of the object,
Figure DEST_PATH_IMAGE028
is the operational value of the operational action,
Figure 474700DEST_PATH_IMAGE010
in order to weight the action of the operation,
Figure 830595DEST_PATH_IMAGE011
in an apparatus for identifying malicious operations provided in an embodiment of the present application, the second determining module 23 may include:
a dividing unit configured to divide the evaluation values in the database into a plurality of matching groups;
a matching unit for matching the evaluation value of the operation with each matching group, respectively;
and an acquisition unit configured to terminate the matching when the evaluation value of the operation is successfully matched with the evaluation value in one of the matching groups, and to take the evaluation value successfully matched as a target evaluation value, and to acquire an operation behavior corresponding to the target evaluation value from the database.
In an apparatus for identifying malicious operations provided in an embodiment of the present application, a matching unit may include:
a judging subunit operable to take the first evaluation value in the matching group as a current evaluation value, and judge whether the evaluation value of the operation is within a matching range determined by the current evaluation value;
a determination subunit operable to determine that matching is successful if the evaluation value of the operation is within the matching range determined by the current evaluation value;
an execution subunit operable, if the evaluation value of the operation is not within the matching range determined by the current evaluation value, to take a next evaluation value in the matching group as the current evaluation value, and to execute a step of judging whether the evaluation value of the operation is within the matching range determined by the current evaluation value.
In an apparatus for identifying malicious operations provided in an embodiment of the present application, a dividing unit may include:
and the dividing subunit is used for dividing the evaluation values in the database into odd number matching groups and even number matching groups according to the odd number and the even number.
The malicious operation identification device provided by the embodiment of the application can further include:
and the prompt module is used for sending a prompt to the user after the operation is intercepted.
An embodiment of the present application further provides a malicious operation identification device, see fig. 3, which shows a schematic structural diagram of a malicious operation identification device provided in an embodiment of the present application, and the malicious operation identification device may include:
a memory 31 for storing a computer program;
the processor 32, when executing the computer program stored in the memory 31, may implement the following steps:
receiving the operation of a user and determining an operation object of the operation; determining an operation value of an operation object based on a corresponding relation between the operation object and the operation value established in advance, and calculating an evaluation value of the operation according to the operation value of the operation object; matching the evaluation value of the operation with a pre-established database, and determining a target evaluation value corresponding to the evaluation value of the operation and an operation behavior corresponding to the target evaluation value; and judging whether the operation is malicious operation or not based on the operation behavior, and if so, intercepting the operation.
An embodiment of the present application further provides a computer-readable storage medium, in which a computer program is stored, and when executed by a processor, the computer program can implement the following steps:
receiving the operation of a user and determining an operation object of the operation; determining an operation value of an operation object based on a corresponding relation between the operation object and the operation value established in advance, and calculating an evaluation value of the operation according to the operation value of the operation object; matching the evaluation value of the operation with a pre-established database, and determining a target evaluation value corresponding to the evaluation value of the operation and an operation behavior corresponding to the target evaluation value; and judging whether the operation is malicious operation or not based on the operation behavior, and if so, intercepting the operation.
The computer-readable storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
For a description of a relevant part in a malicious operation identification apparatus, a device, and a computer-readable storage medium provided in an embodiment of the present application, reference may be made to a detailed description of a corresponding part in a malicious operation identification method provided in an embodiment of the present application, and details are not described here again.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Furthermore, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include elements inherent in the list. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element. In addition, parts of the above technical solutions provided in the embodiments of the present application, which are consistent with the implementation principles of corresponding technical solutions in the prior art, are not described in detail so as to avoid redundant description.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (7)

1. A malicious operation identification method, comprising:
receiving the operation of a user and determining an operation object of the operation;
determining an operation value of an operation object based on a corresponding relation between the operation object and the operation value which is established in advance, and calculating an evaluation value of the operation according to the operation value of the operation object;
matching the evaluation value of the operation with a pre-established database, and determining a target evaluation value corresponding to the evaluation value of the operation and an operation behavior corresponding to the target evaluation value;
judging whether the operation is malicious operation or not based on the operation behavior, and if so, intercepting the operation;
calculating an evaluation value of the operation according to the operation value of the operation object, including:
by using
Figure DEST_PATH_IMAGE002
Calculating an evaluation value of the operation
Figure DEST_PATH_IMAGE004
Wherein,
Figure DEST_PATH_IMAGE006
the operation value corresponding to the account logged in by the user,
Figure DEST_PATH_IMAGE008
a weight corresponding to an account for which the user is logged in,
Figure DEST_PATH_IMAGE010
in order to operate the operation value of the main body,
Figure DEST_PATH_IMAGE012
is the weight of the subject of the operation,
Figure DEST_PATH_IMAGE014
in order to operate the operation value of the object,
Figure DEST_PATH_IMAGE016
is the weight of the operation object and is the weight of the operation object,
Figure DEST_PATH_IMAGE018
is an operation value for the operation action and,
Figure DEST_PATH_IMAGE020
is the weight of the action of the operation,
Figure DEST_PATH_IMAGE022
matching the evaluation value of the operation with a pre-established database, and determining a target evaluation value corresponding to the evaluation value of the operation and an operation behavior corresponding to the target evaluation value, wherein the method comprises the following steps:
dividing the evaluation values in the database into a plurality of matching groups;
matching the evaluation value of the operation with each matching group respectively;
and when the evaluation value of the operation is successfully matched with the evaluation value in one of the matching groups, terminating the matching, taking the evaluation value successfully matched as the target evaluation value, and acquiring the operation behavior corresponding to the target evaluation value from the database.
2. The malicious operation identification method according to claim 1, wherein matching the evaluation value of the operation with each of the matching groups, respectively, includes:
taking the first evaluation value in the matching group as a current evaluation value, and judging whether the evaluation value of the operation is within a matching range determined by the current evaluation value;
if yes, determining that the matching is successful;
if not, the next evaluation value in the matching group is taken as the current evaluation value, and the step of judging whether the evaluation value of the operation is within the matching range determined by the current evaluation value is executed.
3. The malicious operation identification method according to claim 1, wherein dividing the evaluation values in the database into a plurality of matching groups includes:
and dividing the evaluation values in the database into odd number matching groups and even number matching groups according to the odd number and the even number.
4. The malicious operation identification method according to claim 1, further comprising, after intercepting the operation:
and sending a prompt to the user.
5. A malicious operation recognition apparatus, comprising:
the receiving module is used for receiving the operation of a user and determining an operation object of the operation;
the first determination module is used for determining the operation value of the operation object based on the corresponding relation between the operation object and the operation value which is established in advance, and calculating the evaluation value of the operation according to the operation value of the operation object;
the second determination module is used for matching the evaluation value of the operation with a pre-established database and determining a target evaluation value corresponding to the evaluation value of the operation and an operation behavior corresponding to the target evaluation value;
the intercepting module is used for judging whether the operation is malicious operation or not based on the operation behavior, and if so, intercepting the operation;
the first determining module includes:
a computing unit for utilizing
Figure DEST_PATH_IMAGE023
Calculating an evaluation value of the operation
Figure DEST_PATH_IMAGE024
Wherein,
Figure 616436DEST_PATH_IMAGE006
the operation value corresponding to the account logged in by the user,
Figure 789970DEST_PATH_IMAGE008
a weight corresponding to an account to which the user logs in,
Figure 304128DEST_PATH_IMAGE010
in order to operate the operation value of the main body,
Figure 168179DEST_PATH_IMAGE012
is the weight of the subject of the operation,
Figure 716972DEST_PATH_IMAGE014
in order to operate the operation value of the object,
Figure 273855DEST_PATH_IMAGE016
is the weight of the operation object,
Figure 275309DEST_PATH_IMAGE018
is the operational value of the operational action,
Figure 943051DEST_PATH_IMAGE020
is the weight of the action of the operation,
Figure 346350DEST_PATH_IMAGE022
the second determining module includes:
a dividing unit configured to divide the evaluation values in the database into a plurality of matching groups;
a matching unit for matching the evaluation value of the operation with each of the matching groups, respectively;
and the acquisition unit is used for terminating the matching when the evaluation value of the operation is successfully matched with the evaluation value in one of the matching groups, taking the successfully matched evaluation value as the target evaluation value, and acquiring the operation behavior corresponding to the target evaluation value from the database.
6. A malicious operation identification device characterized by comprising:
a memory for storing a computer program;
a processor for implementing the steps of the malicious operation identification method of any of claims 1 to 4 when executing the computer program.
7. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the malicious operation identification method according to any one of claims 1 to 4.
CN202010738573.XA 2020-07-28 2020-07-28 Malicious operation identification method, device, equipment and readable storage medium Active CN111898123B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010738573.XA CN111898123B (en) 2020-07-28 2020-07-28 Malicious operation identification method, device, equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010738573.XA CN111898123B (en) 2020-07-28 2020-07-28 Malicious operation identification method, device, equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN111898123A CN111898123A (en) 2020-11-06
CN111898123B true CN111898123B (en) 2022-06-10

Family

ID=73182237

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010738573.XA Active CN111898123B (en) 2020-07-28 2020-07-28 Malicious operation identification method, device, equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN111898123B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114185610A (en) * 2021-11-18 2022-03-15 福建省天奕网络科技有限公司 Client function configuration method and server

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104954342A (en) * 2014-03-31 2015-09-30 腾讯科技(深圳)有限公司 Security estimation method and device
CN110365698A (en) * 2019-07-29 2019-10-22 杭州数梦工场科技有限公司 Methods of risk assessment and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8196201B2 (en) * 2006-07-19 2012-06-05 Symantec Corporation Detecting malicious activity

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104954342A (en) * 2014-03-31 2015-09-30 腾讯科技(深圳)有限公司 Security estimation method and device
CN110365698A (en) * 2019-07-29 2019-10-22 杭州数梦工场科技有限公司 Methods of risk assessment and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
P2P网络中基于信任的用户行为分析与安全管理机制;刘武等;《中国海洋大学学报(自然科学版)》;20081015;101-103 *

Also Published As

Publication number Publication date
CN111898123A (en) 2020-11-06

Similar Documents

Publication Publication Date Title
EP1811381B1 (en) Software operation modeling and monitoring device and method
CN108053318B (en) Method and device for identifying abnormal transactions
CN107220130B (en) Method, device and system for realizing information consensus at nodes of block chain
EP3627431A1 (en) Cross-chain trading method and apparatus
CN110348188B (en) Core body checking method and device
CN109815697B (en) Method and device for processing false alarm behavior
KR102440878B1 (en) Learning method for learning detection model for fraud detection of virtual asset, detecting method of fraud detection of virtual asset using the detection model, apparatus and computer program for performing the learning method and the detecting method
CN109242658B (en) Suspicious transaction report generation method, suspicious transaction report generation system, suspicious transaction report generation computer device and suspicious transaction report storage medium
CN111898123B (en) Malicious operation identification method, device, equipment and readable storage medium
CN113064759A (en) Block chain data rollback processing method and processing system thereof
CN109583731A (en) A kind of Risk Identification Method, device and equipment
CN103440460A (en) Application system change validation method and system
KR101951015B1 (en) Server detecting abnormal game activity and operating method of thereof
CN108090736B (en) Workflow approval bill-based approval method and device and readable storage medium
CN113220598A (en) System test method, apparatus, device, medium, and program product
EP3174263A1 (en) Apparatus and method for verifying detection rule
CN111191215A (en) Safety equipment identification method and system
CN116010217A (en) Data processing method, device, computer equipment and storage medium
CN112488562B (en) Service realization method and device
CN104933620A (en) Online transaction monitoring device and method
EP3907968A1 (en) Method and system for blockchain intrusion prevention
CN114416581A (en) Method, device and equipment for determining test failure reason
CN112529462A (en) Service verification method, device, server and storage medium
CN112966288A (en) Data processing method and device, electronic equipment and storage medium
CN112363933A (en) Automatic verification method and device for word paragraph table, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant