CN115168917B - A cloud computing service abnormal user behavior processing method and server - Google Patents

A cloud computing service abnormal user behavior processing method and server Download PDF

Info

Publication number
CN115168917B
CN115168917B CN202210796059.0A CN202210796059A CN115168917B CN 115168917 B CN115168917 B CN 115168917B CN 202210796059 A CN202210796059 A CN 202210796059A CN 115168917 B CN115168917 B CN 115168917B
Authority
CN
China
Prior art keywords
abnormal user
user tag
target
window
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210796059.0A
Other languages
Chinese (zh)
Other versions
CN115168917A (en
Inventor
孙哓伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Datang Zhichuang Shandong Technology Co ltd
Original Assignee
Datang Zhichuang Shandong Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Datang Zhichuang Shandong Technology Co ltd filed Critical Datang Zhichuang Shandong Technology Co ltd
Priority to CN202210796059.0A priority Critical patent/CN115168917B/en
Publication of CN115168917A publication Critical patent/CN115168917A/en
Application granted granted Critical
Publication of CN115168917B publication Critical patent/CN115168917B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention provides an abnormal user behavior processing method and a server of cloud computing service, wherein a cloud computing security server respectively acquires a plurality of window weight scores of a plurality of abnormal user tag capturing windows and a plurality of disturbance weight scores between every two abnormal user tag capturing windows, filters capturing information with errors and disturbances from the plurality of abnormal user tag capturing windows based on the plurality of window weight scores and the plurality of disturbance weight scores, and then determines a target capturing window needing to be subjected to continuous analysis of operation behaviors, so that the precision and the credibility of continuous analysis can be ensured when an operation behavior analysis instruction is determined, and the behavior analysis and detection reliability of abnormal users is improved.

Description

一种云计算服务的异常用户行为处理方法及服务器A cloud computing service abnormal user behavior processing method and server

技术领域Technical field

本发明涉及云计算技术领域,尤其涉及一种云计算服务的异常用户行为处理方法及服务器。The present invention relates to the technical field of cloud computing, and in particular to a method and server for processing abnormal user behavior of cloud computing services.

背景技术Background technique

云计算(cloud computing)是分布式计算的一种,指的是通过网络“云”将巨大的数据计算处理程序分解成无数个小程序,然后通过多部服务器组成的系统进行处理和分析这些小程序得到结果并返回给用户。Cloud computing is a type of distributed computing, which refers to decomposing huge data computing processing programs into countless small programs through the network "cloud", and then processing and analyzing these small programs through a system composed of multiple servers. The program gets the results and returns them to the user.

当下,云计算的服务功能和服务类型不断增加,涉及到诸如区块链金融、虚拟现实活动、政企云业务、云游戏对战等。与此同时,针对云计算服务的安全防护处理必不可少。相关的云计算服务安全防护处理的其中一个重要步骤是对异常用户行为进行分析处理,而如何精准可靠地实现异常用户行为的持续性分析,减少不必要的干扰和误差,是现目前需要攻克的其中一个难点。At present, the service functions and service types of cloud computing are constantly increasing, involving blockchain finance, virtual reality activities, government and enterprise cloud services, cloud game battles, etc. At the same time, security protection for cloud computing services is essential. One of the important steps in the security protection of related cloud computing services is to analyze and process abnormal user behavior. However, how to accurately and reliably achieve continuous analysis of abnormal user behavior and reduce unnecessary interference and errors is what needs to be overcome at present. One of the difficulties.

发明内容Contents of the invention

本发明提供一种云计算服务的异常用户行为处理方法及服务器,为实现上述技术目的,本发明采用如下技术方案。The present invention provides a cloud computing service abnormal user behavior processing method and server. In order to achieve the above technical objectives, the present invention adopts the following technical solutions.

第一方面是一种云计算服务的异常用户行为处理方法,应用于云计算安防服务器,所述方法包括:The first aspect is a method for processing abnormal user behavior of cloud computing services, which is applied to cloud computing security servers. The method includes:

通过目标云服务互动流式记录和所述目标云服务互动流式记录存在时序先后关系的在先云服务互动流式记录,确定若干个异常用户标签捕捉窗口和所述若干个异常用户标签捕捉窗口对应的若干个窗口权重评分;其中,所述若干个异常用户标签捕捉窗口中的各个异常用户标签捕捉窗口对应一个窗口权重评分;Determine several abnormal user tag capture windows and the several abnormal user tag capture windows through the target cloud service interactive streaming record and the target cloud service interactive streaming record that has a temporal relationship with the previous cloud service interactive streaming record Corresponding several window weight scores; wherein each abnormal user label capture window among the several abnormal user label capture windows corresponds to one window weight score;

基于所述目标云服务互动流式记录,确定所述若干个异常用户标签捕捉窗口中每两个异常用户标签捕捉窗口之间的扰动权重评分;Based on the target cloud service interactive streaming record, determine the disturbance weight score between each two abnormal user tag capture windows in the several abnormal user tag capture windows;

基于所述若干个窗口权重评分和所述扰动权重评分,从所述若干个异常用户标签捕捉窗口中确定出目标异常用户标签捕捉窗口,并确定所述目标异常用户标签捕捉窗口中携带的第一目标异常用户标签,以对所述第一目标异常用户标签进行操作行为持续化分析。Based on the several window weight scores and the disturbance weight score, a target abnormal user label capture window is determined from the several abnormal user label capture windows, and the first abnormal user label capture window carried in the target abnormal user label capture window is determined. The target abnormal user tag is used to conduct a continuous analysis of the operating behavior of the first target abnormal user tag.

在一些可能的实施例中,所述通过目标云服务互动流式记录和所述目标云服务互动流式记录存在时序先后关系的在先云服务互动流式记录,确定若干个异常用户标签捕捉窗口和所述若干个异常用户标签捕捉窗口对应的若干个窗口权重评分,包括:In some possible embodiments, several abnormal user tag capture windows are determined through the target cloud service interaction streaming record and the target cloud service interaction streaming record that has a temporal relationship with the previous cloud service interaction streaming record. Several window weight scores corresponding to the several abnormal user tag capture windows include:

基于所述目标云服务互动流式记录,确定所述若干个异常用户标签捕捉窗口和所述若干个异常用户标签捕捉窗口对应的若干个标签捕捉可信系数,所述若干个异常用户标签捕捉窗口中的各个异常用户标签捕捉窗口对应一个标签捕捉可信系数;Based on the target cloud service interactive streaming record, determine the several abnormal user tag capture windows and several tag capture credibility coefficients corresponding to the several abnormal user tag capture windows, and determine the several abnormal user tag capture windows. Each abnormal user tag capture window in corresponds to a tag capture credibility coefficient;

基于所述目标云服务互动流式记录和所述在先云服务互动流式记录,确定所述若干个异常用户标签捕捉窗口对应的若干个时序关联变量,所述各个异常用户标签捕捉窗口对应一个时序关联变量;Based on the target cloud service interactive streaming record and the previous cloud service interactive streaming record, several timing associated variables corresponding to the several abnormal user tag capture windows are determined, and each of the abnormal user tag capture windows corresponds to one time series related variables;

基于所述若干个标签捕捉可信系数和所述若干个时序关联变量,确定所述若干个异常用户标签捕捉窗口对应的若干个窗口权重评分。Based on the several tag capture credibility coefficients and the several time series correlation variables, several window weight scores corresponding to the several abnormal user tag capture windows are determined.

在一些可能的实施例中,所述基于所述目标云服务互动流式记录和所述在先云服务互动流式记录,确定所述若干个异常用户标签捕捉窗口对应的若干个时序关联变量,包括:In some possible embodiments, determining a number of timing associated variables corresponding to the several abnormal user tag capture windows based on the target cloud service interaction streaming record and the previous cloud service interaction streaming record, include:

在所述在先云服务互动流式记录中,确定若干个在先异常用户标签捕捉窗口;In the previous cloud service interactive streaming record, determine several previous abnormal user tag capture windows;

确定第一异常用户标签捕捉窗口与所述若干个在先异常用户标签捕捉窗口之间的若干个相对分布特征值,所述第一异常用户标签捕捉窗口为所述若干个异常用户标签捕捉窗口中的其中一个异常用户标签捕捉窗口;Determine several relative distribution characteristic values between the first abnormal user tag capture window and the several previous abnormal user tag capture windows, and the first abnormal user tag capture window is one of the several abnormal user tag capture windows. One of the exception user tag capture windows;

将所述若干个相对分布特征值中的最大特征值确定为所述第一异常用户标签捕捉窗口对应的第一时序关联变量;Determine the maximum eigenvalue among the several relative distribution eigenvalues as the first time series associated variable corresponding to the first abnormal user tag capture window;

确定若干个所述第一异常用户标签捕捉窗口对应的若干个第一时序关联变量,以确定出所述若干个异常用户标签捕捉窗口对应的所述若干个时序关联变量。Determine a plurality of first timing associated variables corresponding to a plurality of the first abnormal user tag capture windows, so as to determine the plurality of timing associated variables corresponding to the several abnormal user tag capture windows.

在一些可能的实施例中,所述基于所述目标云服务互动流式记录,确定所述若干个异常用户标签捕捉窗口中每两个异常用户标签捕捉窗口之间的扰动权重评分,包括:In some possible embodiments, determining the disturbance weight score between each two abnormal user tag capture windows in the several abnormal user tag capture windows based on the target cloud service interaction streaming record includes:

在所述目标云服务互动流式记录中,确定每两个异常用户标签捕捉窗口之间的相对分布共性变量和记录内容共性变量;In the target cloud service interactive streaming record, determine the relative distribution common variables and record content common variables between each two abnormal user tag capture windows;

基于所述相对分布共性变量和所述记录内容共性变量,确定出所述每两个异常用户标签捕捉窗口之间的扰动权重评分。Based on the relative distribution common variables and the recorded content common variables, the disturbance weight score between each two abnormal user tag capture windows is determined.

在一些可能的实施例中,所述在所述目标云服务互动流式记录中,确定每两个异常用户标签捕捉窗口之间的相对分布共性变量,包括:In some possible embodiments, determining the relative distribution common variables between each two abnormal user tag capture windows in the target cloud service interaction streaming record includes:

分别获取第一异常用户标签捕捉窗口的信息捕捉单元和第二异常用户标签捕捉窗口的信息捕捉单元,所述第一异常用户标签捕捉窗口和所述第二异常用户标签捕捉窗口为所述每两个异常用户标签捕捉窗口;Obtain the information capture unit of the first abnormal user tag capture window and the information capture unit of the second abnormal user tag capture window respectively, and the first abnormal user tag capture window and the second abnormal user tag capture window are the two An abnormal user label capture window;

基于所述第一异常用户标签捕捉窗口的信息捕捉单元和所述第二异常用户标签捕捉窗口的信息捕捉单元,确定所述第一异常用户标签捕捉窗口和所述第二异常用户标签捕捉窗口之间的相对分布共性变量,以确定出所述每两个异常用户标签捕捉窗口之间的相对分布共性变量。Based on the information capture unit of the first abnormal user tag capture window and the information capture unit of the second abnormal user tag capture window, determine the first abnormal user tag capture window and the second abnormal user tag capture window. The relative distribution common variables between each two abnormal user tag capture windows are determined to determine the relative distribution common variables between each two abnormal user tag capture windows.

在一些可能的实施例中,所述基于所述若干个窗口权重评分和所述扰动权重评分,从所述若干个异常用户标签捕捉窗口中确定出目标异常用户标签捕捉窗口,包括:In some possible embodiments, determining a target abnormal user label capture window from the several abnormal user label capture windows based on the several window weight scores and the disturbance weight score includes:

以所述若干个窗口权重评分作为捕捉扰动关系网的扰动特征成员的影响因子;The several window weight scores are used as influencing factors to capture the disturbance feature members of the disturbance relationship network;

将每两个异常用户标签捕捉窗口之间的扰动权重评分,作为所述每两个异常用户标签捕捉窗口对应的两个扰动特征成员之间的连接向量的影响因子,生成捕捉扰动关系网;The disturbance weight score between each two abnormal user label capture windows is used as the influencing factor of the connection vector between the two disturbance feature members corresponding to each two abnormal user label capture windows to generate a capture disturbance relationship network;

在所述捕捉扰动关系网中确定不少于一个局部关系网,并基于所述不少于一个局部关系网携带的窗口权重评分和扰动权重评分,从所述不少于一个局部关系网中确定出第一局部关系网;Determine no less than one local relationship network in the capturing disturbance relationship network, and determine from the no less than one local relationship network based on the window weight score and the disturbance weight score carried by the no less than one local relationship network. Out of the first local relationship network;

将所述第一局部关系网携带的异常用户标签捕捉窗口确定为所述目标异常用户标签捕捉窗口。The abnormal user tag capture window carried by the first local relationship network is determined as the target abnormal user tag capture window.

在一些可能的实施例中,所述基于所述不少于一个局部关系网携带的窗口权重评分和扰动权重评分,从所述不少于一个局部关系网中确定出第一局部关系网,包括:In some possible embodiments, determining the first local relationship network from the no less than one local relationship network based on the window weight score and the perturbation weight score carried by the no less than one local relationship network includes: :

分别确定不少于一个局部关系网对应的不少于一组局部流式记录,所述不少于一个局部关系网中的各个局部关系网对应一组局部流式记录,所述一组局部流式记录中包括不少于一个局部流式记录;Respectively determine no less than a set of local streaming records corresponding to no less than one local relationship network, each local relationship network in the no less than one local relationship network corresponding to a set of local streaming records, and the set of local streaming records The streaming record includes no less than one partial streaming record;

基于所述不少于一个局部流式记录携带的窗口权重评分和扰动权重评分,确定所述不少于一个局部关系网中各个局部关系网对应的不少于一个解析指数,所述不少于一个局部流式记录中的各个局部流式记录对应一个解析指数;Based on the window weight score and the perturbation weight score carried by the no less than one local streaming record, determine no less than one parsing index corresponding to each local relationship network in the no less than one local relationship network, the no less than Each local streaming record in a local streaming record corresponds to a parsing index;

从所述各个局部关系网对应的不少于一个解析指数确定出解析指数最大的目标解析指数,直到确定出所述不少于一个局部关系网对应的不少于一个目标解析指数;Determine the target resolution index with the largest resolution index from no less than one resolution index corresponding to each of the local relationship networks, until no less than one target resolution index corresponding to the no less than one local relationship network is determined;

从所述不少于一个局部关系网中,确定所述不少于一个目标解析指数对应的不少于一个关系网特征分布;From the no less than one local relationship network, determine the characteristic distribution of no less than one relationship network corresponding to the no less than one target resolution index;

将所述不少于一个关系网特征分布拼接为所述第一局部关系网。The feature distribution of no less than one relationship network is spliced into the first local relationship network.

在一些可能的实施例中,所述确定所述目标异常用户标签捕捉窗口中携带的第一目标异常用户标签之后,所述方法还包括:In some possible embodiments, after determining the first target abnormal user label carried in the target abnormal user label capture window, the method further includes:

基于所述目标云服务互动流式记录,确定所述第一目标异常用户标签对应的活动事件识别结果和噪声标签对应的噪声事件识别结果,所述噪声标签为与所述第一目标异常用户标签中的目标异常用户标签的相关度最高的用户标签;Based on the target cloud service interactive streaming record, determine the activity event identification result corresponding to the first target abnormal user label and the noise event identification result corresponding to the noise label, and the noise label is the same as the first target abnormal user label The user label with the highest correlation to the target abnormal user label;

基于所述目标云服务互动流式记录之前的在先云服务互动流式记录集,确定所述第一目标异常用户标签对应的在先互动行为描述字段集和噪声标签对应的在先噪声行为描述字段集;Based on the previous cloud service interactive streaming record set before the target cloud service interactive streaming record, determine the previous interactive behavior description field set corresponding to the first target abnormal user tag and the previous noise behavior description corresponding to the noise tag. fieldset;

通过和所述目标云服务互动流式记录存在时序先后关系的后一云服务互动流式记录,确定第二目标异常用户标签对应的当前活动事件分布特征和当前互动行为描述字段,所述第二目标异常用户标签为所述后一云服务互动流式记录的目标异常用户标签捕捉窗口中包括的目标异常用户标签;By determining the current activity event distribution characteristics and the current interaction behavior description field corresponding to the second target abnormal user tag through the subsequent cloud service interactive streaming record that has a temporal relationship with the target cloud service interaction streaming record, the second The target abnormal user label is the target abnormal user label included in the target abnormal user label capture window of the interactive streaming record of the latter cloud service;

基于所述活动事件识别结果、所述在先互动行为描述字段集、所述当前活动事件分布特征和所述当前互动行为描述字段,确定所述第一目标异常用户标签和所述第二目标异常用户标签之间的标签词向量距离;Based on the activity event identification result, the previous interaction behavior description field set, the current activity event distribution characteristics and the current interaction behavior description field, the first target abnormal user label and the second target abnormality are determined Tag word vector distance between user tags;

基于所述噪声事件识别结果、所述在先噪声行为描述字段集、所述当前活动事件分布特征和所述当前互动行为描述字段,确定噪声词向量距离;Determine the noise word vector distance based on the noise event identification result, the previous noise behavior description field set, the current activity event distribution characteristics and the current interactive behavior description field;

基于所述标签词向量距离和所述噪声词向量距离,确定所述第一目标异常用户标签的操作行为分析指示。Based on the tag word vector distance and the noise word vector distance, an operation behavior analysis indication of the first target abnormal user tag is determined.

在一些可能的实施例中,所述基于所述标签词向量距离和所述噪声词向量距离,确定所述第一目标异常用户标签的操作行为分析指示,包括:In some possible embodiments, determining the operation behavior analysis indication of the first target abnormal user tag based on the tag word vector distance and the noise word vector distance includes:

基于所述标签词向量距离和所述噪声词向量距离,确定所述第一目标异常用户标签和所述第二目标异常用户标签之间的操作行为上下游特征;Based on the label word vector distance and the noise word vector distance, determine the upstream and downstream characteristics of the operating behavior between the first target abnormal user label and the second target abnormal user label;

结合所述操作行为上下游特征,在所述第二目标异常用户标签中抽取与所述第一目标异常用户标签存在联系的风险用户标签,以确定所述第一目标异常用户标签的操作行为分析指示。Combining the upstream and downstream characteristics of the operation behavior, extract risk user tags that are related to the first target abnormal user tag from the second target abnormal user tag to determine the operation behavior analysis of the first target abnormal user tag. instruct.

第二方面是一种云计算安防服务器,包括存储器和处理器;所述存储器和所述处理器耦合;所述存储器用于存储计算机程序代码,所述计算机程序代码包括计算机指令;其中,当所述处理器执行所述计算机指令时,使得所述云计算安防服务器执行第一方面的方法。The second aspect is a cloud computing security server, including a memory and a processor; the memory is coupled to the processor; the memory is used to store computer program code, and the computer program code includes computer instructions; wherein, when the When the processor executes the computer instructions, the cloud computing security server is caused to execute the method of the first aspect.

第三方面是一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序在运行时执行第一方面的方法。The third aspect is a computer-readable storage medium having a computer program stored thereon, the computer program executing the method of the first aspect when running.

根据本发明的一个实施例,通过目标云服务互动流式记录和目标云服务互动流式记录存在时序先后关系的在先云服务互动流式记录,确定若干个异常用户标签捕捉窗口和若干个异常用户标签捕捉窗口对应的若干个窗口权重评分,若干个异常用户标签捕捉窗口中的各个异常用户标签捕捉窗口对应一个窗口权重评分;通过目标云服务互动流式记录,确定若干个异常用户标签捕捉窗口中每两个异常用户标签捕捉窗口之间的扰动权重评分;通过若干个窗口权重评分和扰动权重评分,从若干个异常用户标签捕捉窗口中确定出目标异常用户标签捕捉窗口,并确定目标异常用户标签捕捉窗口中携带的第一目标异常用户标签,以对第一目标异常用户标签进行操作行为持续化分析。应用于本发明实施例,云计算安防服务器分别获取若干个异常用户标签捕捉窗口的若干个窗口权重评分和每两个异常用户标签捕捉窗口之间的若干个扰动权重评分,并基于若干个窗口权重评分和若干个扰动权重评分从若干个异常用户标签捕捉窗口中过滤掉存在误差和扰动的捕捉信息,然后确定出需进行操作行为持续化分析的目标捕捉窗口,这样一来,在确定操作行为分析指示时,能够保障持续化分析的精度和可信度,提高针对异常用户的行为分析和检测可靠性。According to an embodiment of the present invention, several abnormal user tag capture windows and several exceptions are determined through the target cloud service interactive streaming record and the target cloud service interactive streaming record that have a temporal relationship with the previous cloud service interactive streaming record. Several window weight scores corresponding to the user tag capture window, and each abnormal user tag capture window in the several abnormal user tag capture windows corresponds to a window weight score; several abnormal user tag capture windows are determined through the target cloud service interactive streaming record The disturbance weight score between each two abnormal user label capture windows; through several window weight scores and disturbance weight scores, the target abnormal user label capture window is determined from several abnormal user label capture windows, and the target abnormal user is determined The tag captures the first target abnormal user tag carried in the window to conduct continuous analysis of the operation behavior of the first target abnormal user tag. Applied to the embodiment of the present invention, the cloud computing security server obtains several window weight scores of several abnormal user tag capture windows and several disturbance weight scores between every two abnormal user tag capture windows, and based on several window weights Scores and several disturbance weight scores filter out capture information with errors and disturbances from several abnormal user tag capture windows, and then determine the target capture window that requires continuous analysis of operational behavior. In this way, when determining the operational behavior analysis When instructed, it can ensure the accuracy and credibility of continuous analysis and improve the reliability of behavioral analysis and detection of abnormal users.

附图说明Description of the drawings

图1为本发明实施例提供的云计算服务的异常用户行为处理方法的流程示意图。Figure 1 is a schematic flowchart of a method for processing abnormal user behavior of cloud computing services provided by an embodiment of the present invention.

图2为本发明实施例提供的异常用户行为处理装置的模块框图。Figure 2 is a module block diagram of an abnormal user behavior processing device provided by an embodiment of the present invention.

具体实施方式Detailed ways

以下,术语“第一”、“第二”和“第三”等仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”或“第三”等的特征可以明示或者隐含地包括一个或者更多个该特征。Hereinafter, the terms “first”, “second” and “third” are used for descriptive purposes only and cannot be understood as indicating or implying relative importance or implicitly indicating the number of indicated technical features. Thus, a feature defined as "first", "second", "third", etc. may explicitly or implicitly include one or more of these features.

图1示出了本发明实施例提供的云计算服务的异常用户行为处理方法的流程示意图,云计算服务的异常用户行为处理方法可以通过云计算安防服务器实现,云计算安防服务器可以包括存储器和处理器;所述存储器和所述处理器耦合;所述存储器用于存储计算机程序代码,所述计算机程序代码包括计算机指令;其中,当所述处理器执行所述计算机指令时,使得所述云计算安防服务器执行如下步骤所描述的技术方案。Figure 1 shows a schematic flowchart of a method for processing abnormal user behavior of cloud computing services provided by an embodiment of the present invention. The method of processing abnormal user behavior of cloud computing services can be implemented through a cloud computing security server. The cloud computing security server can include a memory and a processor. The memory is coupled to the processor; the memory is used to store computer program code, the computer program code includes computer instructions; wherein when the processor executes the computer instructions, the cloud computing The security server implements the technical solution described in the following steps.

步骤101、通过目标云服务互动流式记录和目标云服务互动流式记录存在时序先后关系的在先云服务互动流式记录,确定若干个异常用户标签捕捉窗口和若干个异常用户标签捕捉窗口对应的若干个窗口权重评分,若干个异常用户标签捕捉窗口中的各个异常用户标签捕捉窗口对应一个窗口权重评分。Step 101: Determine the correspondence between several abnormal user tag capture windows and several abnormal user tag capture windows through the target cloud service interactive streaming record and the target cloud service interactive streaming record that have a temporal relationship with the previous cloud service interactive streaming record. There are several window weight scores, and each abnormal user label capture window in several abnormal user label capture windows corresponds to a window weight score.

对于本发明实施例而言,异常用户标签捕捉窗口中的异常用户标签可以为用户ID、互动事件主题。For this embodiment of the present invention, the abnormal user tag in the abnormal user tag capture window may be a user ID or an interaction event theme.

对于本发明实施例而言,云计算安防服务器在目标云服务互动流式记录中确定包括异常用户标签的异常用户标签捕捉窗口,该异常用户标签捕捉窗口可以为包括异常用户标签的设定可视化形状。For this embodiment of the present invention, the cloud computing security server determines an abnormal user tag capture window including an abnormal user tag in the target cloud service interactive streaming record. The abnormal user tag capture window may be a set visualization shape including the abnormal user tag. .

对于本发明实施例而言,云计算安防服务器通过目标云服务互动流式记录,确定若干个异常用户标签捕捉窗口和若干个异常用户标签捕捉窗口对应的若干个标签捕捉可信系数,若干个异常用户标签捕捉窗口中的各个异常用户标签捕捉窗口对应一个标签捕捉可信系数。For the embodiment of the present invention, the cloud computing security server determines several abnormal user tag capture windows and several tag capture credibility coefficients corresponding to several abnormal user tag capture windows through the target cloud service interactive streaming record, and several abnormal user tag capture windows. Each abnormal user tag capture window in the user tag capture window corresponds to a tag capture credibility coefficient.

举例而言,信息捕捉模块对目标云服务互动流式记录中的异常用户标签捕捉窗口进行可信系数运算,得到异常用户标签捕捉窗口对应的标签捕捉可信系数,其中,信息捕捉模块可以为支持向量机等可以提供异常用户标签捕捉窗口的标签捕捉可信系数的功能模块。For example, the information capture module performs a credibility coefficient calculation on the abnormal user tag capture window in the target cloud service interactive streaming record, and obtains the tag capture credibility coefficient corresponding to the abnormal user tag capture window, where the information capture module can support Vector machines and other functional modules can provide tag capture confidence coefficients for abnormal user tag capture windows.

对于本发明实施例而言,云计算安防服务器通过目标云服务互动流式记录和在先云服务互动流式记录,确定若干个异常用户标签捕捉窗口对应的若干个时序关联变量,各个异常用户标签捕捉窗口对应一个时序关联变量(连续化的可信系数)。For the embodiment of the present invention, the cloud computing security server determines several timing associated variables corresponding to several abnormal user tag capture windows through the target cloud service interactive streaming record and the previous cloud service interactive streaming record. Each abnormal user tag The capture window corresponds to a time series correlation variable (continuous confidence coefficient).

举例而言,云计算安防服务器通过目标云服务互动流式记录和在先云服务互动流式记录,确定若干个异常用户标签捕捉窗口对应的若干个时序关联变量的过程包括:云计算安防服务器在在先云服务互动流式记录中,确定若干个在先异常用户标签捕捉窗口;然后,云计算安防服务器确定第一异常用户标签捕捉窗口与若干个在先异常用户标签捕捉窗口之间的若干个相对分布特征值,第一异常用户标签捕捉窗口为若干个异常用户标签捕捉窗口中的其中一个异常用户标签捕捉窗口;云计算安防服务器将若干个相对分布特征值中的最大特征值确定为第一异常用户标签捕捉窗口对应的第一时序关联变量;并确定若干个第一异常用户标签捕捉窗口对应的若干个第一时序关联变量,进而云计算安防服务器得到若干个异常用户标签捕捉窗口对应的若干个时序关联变量。For example, the cloud computing security server uses the target cloud service interactive streaming record and the previous cloud service interactive streaming record to determine several time series associated variables corresponding to several abnormal user tag capture windows, including: The cloud computing security server In the first cloud service interactive streaming record, several previous abnormal user tag capture windows are determined; then, the cloud computing security server determines several previous abnormal user tag capture windows between the first abnormal user tag capture window and several previous abnormal user tag capture windows. Relative distribution feature values, the first abnormal user tag capture window is one of several abnormal user tag capture windows; the cloud computing security server determines the largest feature value among several relative distribution feature values as the first First timing associated variables corresponding to the abnormal user tag capture window; and determine several first timing associated variables corresponding to several first abnormal user tag capture windows, and then the cloud computing security server obtains several corresponding to several abnormal user tag capture windows time series related variables.

举例而言,云计算安防服务器逐一确定目标云服务互动流式记录中的第一异常用户标签捕捉窗口与在先云服务互动流式记录中的若干个在先异常用户标签捕捉窗口之间的若干个窗口叠加变量(若干个相对分布特征值),然后,云计算安防服务器从若干个窗口叠加变量中确定出最大窗口叠加变量,则该最大窗口叠加变量的取值可以为第一异常用户标签捕捉窗口的第一时序关联变量。云计算安防服务器对若干个异常用户标签捕捉窗口都采用以上思路实现,从而获得若干个异常用户标签捕捉窗口对应的若干个时序关联变量。For example, the cloud computing security server determines one by one the first abnormal user tag capture window in the target cloud service interaction streaming record and several previous abnormal user tag capture windows in the previous cloud service interaction streaming record. window overlay variables (several relative distribution characteristic values), then, the cloud computing security server determines the maximum window overlay variable from several window overlay variables, then the value of the maximum window overlay variable can be captured by the first abnormal user tag The first timing associated variable of the window. The cloud computing security server uses the above ideas to implement several abnormal user tag capture windows, thereby obtaining several time series associated variables corresponding to several abnormal user tag capture windows.

在一些示例下,异常用户标签捕捉窗口对应的时序关联变量通过不同时序的异常用户标签捕捉窗口的叠加计算数据得到,该叠加计算数据通过不同异常用户标签捕捉窗口的可视化覆盖面积计算得到。In some examples, the time series associated variables corresponding to the abnormal user label capture window are obtained by superimposing calculation data of abnormal user label capture windows of different time series. The superposition calculation data is calculated by the visual coverage area of different abnormal user label capture windows.

对于本发明实施例而言,云计算安防服务器在得到若干个异常用户标签捕捉窗口对应的若干个标签捕捉可信系数和若干个时序关联变量之后,云计算安防服务器通过若干个标签捕捉可信系数和若干个时序关联变量,确定若干个异常用户标签捕捉窗口对应的若干个窗口权重评分。For the embodiment of the present invention, after the cloud computing security server obtains several tag capture credibility coefficients and several timing associated variables corresponding to several abnormal user tag capture windows, the cloud computing security server captures the credibility coefficient through several tags and several time series associated variables to determine several window weight scores corresponding to several abnormal user tag capture windows.

对于本发明实施例而言,窗口权重评分可以为标签捕捉可信系数和时序关联变量进行全局处理(比如:加权处理)所获得的,示例性的算法如下:P1=F*P2+(1-F)*P3。For the embodiment of the present invention, the window weight score can be obtained by performing global processing (such as weighting processing) on tag capture credibility coefficients and time series related variables. The exemplary algorithm is as follows: P1=F*P2+(1-F )*P3.

其中,P1为异常用户标签捕捉窗口的窗口权重评分,P2是时序关联变量,P3为标签捕捉可信系数,F是兼容指数。Among them, P1 is the window weight score of the abnormal user tag capture window, P2 is the time series correlation variable, P3 is the tag capture credibility coefficient, and F is the compatibility index.

步骤102、通过目标云服务互动流式记录,确定若干个异常用户标签捕捉窗口中每两个异常用户标签捕捉窗口之间的扰动权重评分。Step 102: Determine the disturbance weight score between each two abnormal user tag capture windows in several abnormal user tag capture windows through the target cloud service interactive streaming record.

对于本发明实施例而言,当云计算安防服务器通过目标云服务互动流式记录和目标云服务互动流式记录存在时序先后关系的在先云服务互动流式记录确定出若干个异常用户标签捕捉窗口之后,云计算安防服务器将若干个异常用户标签捕捉窗口中的异常用户标签捕捉窗口进行两两组合,得到若干种拼接策略,云计算安防服务器通过目标云服务互动流式记录,对各种拼接策略(组合方式)中的两个异常用户标签捕捉窗口之间的扰动权重评分(干扰权重、冲突权重)进行运算。For the embodiment of the present invention, when the cloud computing security server determines several abnormal user tag captures through the target cloud service interaction streaming record and the target cloud service interaction streaming record that have a temporal relationship with the previous cloud service interaction streaming record After the window, the cloud computing security server combines the abnormal user tag capture windows in several abnormal user tag capture windows to obtain several splicing strategies. The cloud computing security server records various splicing through the target cloud service interactive streaming record. The disturbance weight score (interference weight, conflict weight) between the two abnormal user label capture windows in the strategy (combination method) is calculated.

对于本发明实施例而言,云计算安防服务器在目标云服务互动流式记录中,确定每两个异常用户标签捕捉窗口之间的相对分布共性变量(可以当作位置相似度理解)和记录内容共性变量(可以理解为内容相似度)。For the embodiment of the present invention, the cloud computing security server determines the relative distribution common variables (which can be understood as position similarity) and record content between each two abnormal user tag capture windows in the target cloud service interactive streaming record. Common variables (can be understood as content similarity).

对于本发明实施例而言,云计算安防服务器结合显性内容挖掘模块确定异常用户标签捕捉窗口中携带的云服务互动内容描述信息,然后,云计算安防服务器确定两个云服务互动内容描述信息之间的向量差异值,并将该向量差异值(比如余弦距离)确定为该两个云服务互动内容描述信息对应的两个异常用户标签捕捉窗口之间的记录内容共性变量。For the embodiment of the present invention, the cloud computing security server combines the explicit content mining module to determine the cloud service interactive content description information carried in the abnormal user tag capture window. Then, the cloud computing security server determines one of the two cloud service interactive content description information. The vector difference value (such as cosine distance) is determined as the common variable of the recorded content between the two abnormal user tag capture windows corresponding to the interactive content description information of the two cloud services.

对于本发明实施例而言,云计算安防服务器分别获取第一异常用户标签捕捉窗口的信息捕捉单元和第二异常用户标签捕捉窗口的信息捕捉单元,其中,第一异常用户标签捕捉窗口和第二异常用户标签捕捉窗口为每两个异常用户标签捕捉窗口;然后,云计算安防服务器通过第一异常用户标签捕捉窗口的信息捕捉单元和第二异常用户标签捕捉窗口的信息捕捉单元,确定第一异常用户标签捕捉窗口和第二异常用户标签捕捉窗口之间的相对分布共性变量,以确定出每两个异常用户标签捕捉窗口之间的相对分布共性变量。For the embodiment of the present invention, the cloud computing security server obtains the information capture unit of the first abnormal user tag capture window and the information capture unit of the second abnormal user tag capture window respectively, wherein the first abnormal user tag capture window and the second abnormal user tag capture window The abnormal user tag capture window is every two abnormal user tag capture windows; then, the cloud computing security server determines the first abnormality through the information capture unit of the first abnormal user tag capture window and the information capture unit of the second abnormal user tag capture window. The relative distribution common variables between the user tag capture window and the second abnormal user tag capture window are used to determine the relative distribution common variables between each two abnormal user tag capture windows.

在一种可示性的示例中,信息捕捉单元可以为占异常用户标签捕捉窗口的第一窗口尺寸约束值和第二窗口尺寸约束值的0.5倍的窗口范围,云计算安防服务器确定第一异常用户标签捕捉窗口的信息捕捉单元和第二异常用户标签捕捉窗口的信息捕捉单元之间的窗口叠加变量,云计算安防服务器通过第一异常用户标签捕捉窗口的信息捕捉单元、第二异常用户标签捕捉窗口的信息捕捉单元和窗口叠加变量,确定出第一异常用户标签捕捉窗口和第二异常用户标签捕捉窗口之间的相对分布共性变量(位置相似度)。进一步地,窗口叠加变量可以理解为第一异常用户标签捕捉窗口的信息捕捉单元和第二异常用户标签捕捉窗口的信息捕捉单元之间的交叉变量。In an illustrative example, the information capture unit may be a window range that accounts for 0.5 times the first window size constraint value and the second window size constraint value of the abnormal user tag capture window, and the cloud computing security server determines the first abnormality The window overlay variable between the information capture unit of the user tag capture window and the information capture unit of the second abnormal user tag capture window, the cloud computing security server captures the information through the information capture unit of the first abnormal user tag capture window and the second abnormal user tag capture window The information capture unit and window overlay variable of the window determine the relative distribution common variable (position similarity) between the first abnormal user label capture window and the second abnormal user label capture window. Further, the window overlay variable can be understood as a cross variable between the information capturing unit of the first abnormal user tag capturing window and the information capturing unit of the second abnormal user tag capturing window.

对于本发明实施例而言,云计算安防服务器通过相对分布共性变量和记录内容共性变量,确定出每两个异常用户标签捕捉窗口之间的扰动权重评分。For the embodiment of the present invention, the cloud computing security server determines the disturbance weight score between each two abnormal user tag capture windows through the relative distribution of common variables and the recorded content common variables.

步骤103、通过若干个窗口权重评分和扰动权重评分,从若干个异常用户标签捕捉窗口中确定出目标异常用户标签捕捉窗口,并确定目标异常用户标签捕捉窗口中携带的第一目标异常用户标签,以对第一目标异常用户标签进行操作行为持续化分析。Step 103: Determine the target abnormal user label capture window from several abnormal user label capture windows through several window weight scores and disturbance weight scores, and determine the first target abnormal user label carried in the target abnormal user label capture window, To conduct continuous analysis of operating behavior on the first target abnormal user tag.

对于本发明实施例而言,当云计算安防服务器分别确定出若干个异常用户标签捕捉窗口对应的若干个窗口权重评分和每两个异常用户标签捕捉窗口之间的扰动权重评分之后,云计算安防服务器通过若干个窗口权重评分和扰动权重评分,从若干个异常用户标签捕捉窗口中确定出目标异常用户标签捕捉窗口,并确定目标异常用户标签捕捉窗口中携带的第一目标异常用户标签,以对第一目标异常用户标签进行操作行为持续化分析。其中,操作行为持续化分析可以理解为操作行为检测分析或者跟踪分析,用于进行操作行为层面的实时分析处理。For the embodiment of the present invention, when the cloud computing security server determines several window weight scores corresponding to several abnormal user tag capture windows and the disturbance weight score between every two abnormal user tag capture windows, the cloud computing security server The server determines the target abnormal user label capture window from several abnormal user label capture windows through several window weight scores and disturbance weight scores, and determines the first target abnormal user label carried in the target abnormal user label capture window to target The first target abnormal user label conducts continuous analysis of operating behavior. Among them, continuous analysis of operating behavior can be understood as operating behavior detection analysis or tracking analysis, which is used for real-time analysis and processing at the level of operating behavior.

对于本发明实施例而言,云计算安防服务器以若干个窗口权重评分作为捕捉扰动关系网(捕捉扰动特征图)的扰动特征成员(关系网节点或者关系网元素)的影响因子(权重值);并将每两个异常用户标签捕捉窗口之间的扰动权重评分,作为每两个异常用户标签捕捉窗口对应的两个扰动特征成员之间的连接向量的影响因子,这样一来,云计算安防服务器生成了若干个异常用户标签捕捉窗口对应的完整丰富的捕捉扰动关系网。For the embodiment of the present invention, the cloud computing security server uses several window weight scores as the influencing factors (weight values) of the disturbance feature members (relationship network nodes or relationship network elements) that capture the disturbance relationship network (capture the disturbance feature map); And the disturbance weight score between each two abnormal user label capture windows is used as the influencing factor of the connection vector between the two disturbance feature members corresponding to each two abnormal user label capture windows. In this way, the cloud computing security server A complete and rich capture perturbation relationship network corresponding to several abnormal user tag capture windows is generated.

对于本发明实施例而言,云计算安防服务器在捕捉扰动关系网中确定不少于一个局部关系网,并通过不少于一个局部关系网携带的窗口权重评分和扰动权重评分,从不少于一个局部关系网中确定出第一局部关系网;将第一局部关系网携带的异常用户标签捕捉窗口确定为目标异常用户标签捕捉窗口。For the embodiment of the present invention, the cloud computing security server determines no less than one local relationship network in the capture disturbance relationship network, and uses the window weight score and the disturbance weight score carried by no less than one local relationship network, and is never less than The first local relationship network is determined in a local relationship network; the abnormal user label capture window carried by the first local relationship network is determined as the target abnormal user label capture window.

对于本发明实施例而言,云计算安防服务器逐一访问捕捉扰动关系网,依次确定出捕捉扰动关系网中关系描述的全部可能的局部关系网,并将从所有可能的局部关系网确定为不少于一个局部关系网,其中,关系描述包括扰动特征成员和连接向量。For the embodiment of the present invention, the cloud computing security server accesses the capture disturbance relationship network one by one, determines all possible local relationship networks described in the capture disturbance relationship network, and determines a number of possible local relationship networks from all possible local relationship networks. In a local relationship network, the relationship description includes perturbation feature members and connection vectors.

对于本发明实施例而言,云计算安防服务器从不少于一个局部关系网中的各个局部关系网中确定出解析指数最大的局部流式记录,并将各个局部关系网中解析指数最大的局部流式记录的集合确定为捕捉扰动关系网的第一局部关系网,在实际实施时,云计算安防服务器分别确定不少于一个局部关系网对应的不少于一组局部流式记录,其中,不少于一个局部关系网中的各个局部关系网对应一组局部流式记录,一组局部流式记录中包括不少于一个局部流式记录;然后,云计算安防服务器通过不少于一个局部流式记录携带的窗口权重评分和扰动权重评分,确定不少于一个局部关系网中各个局部关系网对应的不少于一个解析指数,其中,不少于一个局部流式记录中的各个局部流式记录对应一个解析指数;并从各个局部关系网对应的不少于一个解析指数确定出解析指数最大的目标解析指数,直到确定出不少于一个局部关系网对应的不少于一个目标解析指数;最后,云计算安防服务器从不少于一个局部关系网中,确定不少于一个目标解析指数对应的不少于一个关系网特征分布;并将不少于一个关系网特征分布拼接为第一局部关系网。For the embodiment of the present invention, the cloud computing security server determines the local streaming record with the largest resolution index from each local relationship network in no less than one local relationship network, and records the local streaming record with the largest resolution index in each local relationship network. The set of streaming records is determined as the first partial relationship network that captures the disturbance relationship network. In actual implementation, the cloud computing security server determines no less than one local relationship network and no less than a set of local streaming records corresponding to it, where, Each local relationship network in no less than one local relationship network corresponds to a set of local streaming records, and a set of local streaming records includes no less than one local streaming record; then, the cloud computing security server passes no less than one local streaming record. The window weight score and perturbation weight score carried by the streaming record determine no less than one parsing index corresponding to each local relationship network in no less than one local relationship network, where no less than each local flow in one local streaming record is The formula record corresponds to an analytic index; and the target analytic index with the largest analytic index is determined from no less than one analytic index corresponding to each local relationship network, until no less than one target analytic index corresponding to no less than one local relationship network is determined. ; Finally, the cloud computing security server determines no less than one relationship network feature distribution corresponding to no less than one target resolution index from no less than one local relationship network; and splices no less than one relationship network feature distribution into the first local network.

在实际实施时,鉴于捕捉扰动关系网中扰动特征成员及连接向量的数目较大,云计算安防服务器将捕捉扰动关系网拆解为不少于一个局部关系网,并分别从不少于一个局部关系网中确定不少于一个关系网特征分布,以将不少于一个关系网特征分布组成第一局部关系网,能够提升确定第一局部关系网的效率。In actual implementation, in view of the large number of disturbance feature members and connection vectors in the capture disturbance relationship network, the cloud computing security server disassembles the capture disturbance relationship network into no less than one local relationship network, and no less than one partial relationship network respectively. Determining at least one relationship network feature distribution in the relationship network, so as to form the first partial relationship network by combining at least one relationship network feature distribution, can improve the efficiency of determining the first partial relationship network.

对于本发明实施例而言,解析指数可以为局部流式记录携带的窗口权重评分自乘积和与扰动权重评分统计值之间的对比结果,这样一来,云计算安防服务器通过解析指数确定出的目标异常用户标签捕捉窗口之间的扰动最小,得到的目标异常用户标签捕捉窗口也更加可信。For the embodiment of the present invention, the parsing index can be the comparison result between the self-product sum of the window weight score carried by the local streaming record and the statistical value of the disturbance weight score. In this way, the cloud computing security server determines by parsing the index The disturbance between the target abnormal user label capture windows is minimal, and the obtained target abnormal user label capture window is more credible.

对于本发明实施例而言,云计算安防服务器获取第一局部关系网携带的扰动特征成员,并将该扰动特征成员对应的异常用户标签捕捉窗口确定为目标异常用户标签捕捉窗口,并确定目标异常用户标签捕捉窗口中携带的第一目标异常用户标签,以实现对第一目标异常用户标签的操作行为分析指示处理;云计算安防服务器将若干个异常用户标签捕捉窗口中、没有包含在第一局部关系网中的异常用户标签捕捉窗口过滤。For the embodiment of the present invention, the cloud computing security server obtains the disturbance feature members carried by the first local relationship network, determines the abnormal user tag capture window corresponding to the disturbance feature member as the target abnormal user tag capture window, and determines the target abnormality The first target abnormal user tag carried in the user tag capture window is used to realize the operation behavior analysis and instruction processing of the first target abnormal user tag; the cloud computing security server captures several abnormal user tags that are not included in the first part Abnormal user tag capture window filtering in relationship networks.

应用以上实施例,云计算安防服务器分别获取若干个异常用户标签捕捉窗口的若干个窗口权重评分和每两个异常用户标签捕捉窗口之间的若干个扰动权重评分,并基于若干个窗口权重评分和若干个扰动权重评分生成异常用户标签的捕捉扰动关系网,云计算安防服务器通过捕捉扰动关系网从若干个异常用户标签捕捉窗口中过滤掉存在误差和扰动的捕捉信息,然后确定出需进行操作行为持续化分析的目标捕捉窗口,这样一来,在确定操作行为分析指示时,能够保障持续化分析的精度和可信度,提高针对异常用户的行为分析和检测可靠性。Applying the above embodiments, the cloud computing security server obtains several window weight scores of several abnormal user tag capture windows and several disturbance weight scores between every two abnormal user tag capture windows, and based on the several window weight scores and Several disturbance weight scores generate a capture disturbance relationship network of abnormal user tags. The cloud computing security server filters out the capture information with errors and disturbances from several abnormal user tag capture windows through the capture disturbance relationship network, and then determines the required operation behavior. The target capture window of continuous analysis can ensure the accuracy and credibility of continuous analysis when determining operation behavior analysis instructions, and improve the reliability of behavior analysis and detection of abnormal users.

对于一种可独立实施例的技术方案而言,本发明实施例还示出了一种云计算服务的异常用户行为处理方法,该方法可以包括如下步骤201-步骤206。As a technical solution that can be implemented independently, the embodiment of the present invention also shows a method for processing abnormal user behavior of cloud computing services. The method may include the following steps 201 to 206.

步骤201、通过目标云服务互动流式记录,确定第一目标异常用户标签对应的活动事件识别结果和噪声标签对应的噪声事件识别结果,噪声标签可以为与第一目标异常用户标签的相关度最高的用户标签。Step 201: Determine the activity event identification result corresponding to the first target abnormal user label and the noise event identification result corresponding to the noise label through the target cloud service interactive streaming record. The noise label can be the one with the highest correlation with the first target abnormal user label. user tag.

对于本发明实施例而言,云计算安防服务器在确定出目标异常用户标签捕捉窗口然后,云计算安防服务器获取目标异常用户标签捕捉窗口中的第一目标异常用户标签,云计算安防服务器在目标云服务互动流式记录中确定出第一目标异常用户标签和与第一目标异常用户标签最类似的噪声标签,然后利用可实现单标签分析的算法,确定第一目标异常用户标签的活动事件识别结果和噪声标签的噪声事件识别结果。进一步地,可实现单标签分析的算法可以是借助单标签分析模型组成的算法。For the embodiment of the present invention, after the cloud computing security server determines the target abnormal user label capture window, the cloud computing security server obtains the first target abnormal user label in the target abnormal user label capture window, and the cloud computing security server determines the target abnormal user label capture window. Determine the first target abnormal user label and the noise label most similar to the first target abnormal user label in the service interaction streaming record, and then use an algorithm that can realize single label analysis to determine the activity event identification results of the first target abnormal user label and noise event identification results of noise labels. Furthermore, the algorithm that can implement single-label analysis may be an algorithm composed of a single-label analysis model.

对于本发明实施例而言,云计算安防服务器在目标云服务互动流式记录中确定包括第一目标异常用户标签的目标可视化文本单元,然后,云计算安防服务器根据目标可视化文本单元的窗口叠加变量对应的满足设定条件(比如窗口覆盖面的判定条件)的目标异常用户标签,确定为与第一目标异常用户标签最类似的噪声标签。For the embodiment of the present invention, the cloud computing security server determines the target visual text unit including the first target abnormal user label in the target cloud service interactive streaming record, and then, the cloud computing security server superimposes variables according to the window of the target visual text unit. The corresponding target abnormal user label that meets the set conditions (such as the window coverage judgment condition) is determined as the noise label most similar to the first target abnormal user label.

对于本发明实施例而言,云计算安防服务器并基于单标签分析的算法,确定第一目标异常用户标签在后一云服务互动流式记录中的活动事件识别结果和噪声标签在后一云服务互动流式记录中的噪声事件识别结果。进一步地,单标签分析的算法包括双生模型等,本发明实施例对此不作限制。For the embodiment of the present invention, the cloud computing security server determines the activity event recognition results of the first target abnormal user tag in the latter cloud service interactive streaming record and the noise tag in the latter cloud service based on the algorithm of single tag analysis. Noisy event identification results in interactive streaming recordings. Furthermore, the single-label analysis algorithm includes twin models, etc., and the embodiments of the present invention do not limit this.

步骤202、通过目标云服务互动流式记录之前的在先云服务互动流式记录集,确定第一目标异常用户标签对应的在先互动行为描述字段集和噪声标签对应的在先噪声行为描述字段集。Step 202: Determine the previous interactive behavior description field set corresponding to the first target abnormal user label and the previous noise behavior description field corresponding to the noise label through the previous cloud service interactive streaming record set before the target cloud service interactive streaming record. set.

对于本发明实施例而言,云计算安防服务器通过目标云服务互动流式记录之前的在先云服务互动流式记录集,确定出第一目标异常用户标签和与第一目标异常用户标签最类似的噪声标签,然后结合用户ID二次分析策略,确定第一目标异常用户标签的在先互动行为描述字段集和噪声标签的在先噪声行为描述字段集。For the embodiment of the present invention, the cloud computing security server determines the first target abnormal user label and the most similar first target abnormal user label through the previous cloud service interactive streaming record set before the target cloud service interactive streaming record. noise tags, and then combined with the user ID secondary analysis strategy to determine the previous interaction behavior description field set of the first target abnormal user tag and the previous noise behavior description field set of the noise tag.

对于本发明实施例而言,云计算安防服务器获取目标云服务互动流式记录之前的连续多组互动记录,作为在先云服务互动流式记录集,并基于可实现用户ID二次分析策略,确定第一目标异常用户标签的在先互动行为描述字段集和噪声标签的在先噪声行为描述字段集。For the embodiment of the present invention, the cloud computing security server obtains multiple consecutive sets of interaction records before the target cloud service interaction streaming record as a set of previous cloud service interaction streaming records, and based on the user ID secondary analysis strategy, Determine the previous interaction behavior description field set of the first target abnormal user label and the previous noise behavior description field set of the noise label.

对于本发明实施例而言,在先互动行为描述字段集中的字段数量和在先噪声行为描述字段集中的字段数量,与在先云服务互动流式记录集的组数逐一对应。For this embodiment of the present invention, the number of fields in the previous interaction behavior description field set and the number of fields in the previous noise behavior description field set correspond to the number of groups in the previous cloud service interaction streaming record set.

在一些示例中,可实现用户ID二次分析策略可以利用用户ID二次分析策略组成的模型。进一步地,用户ID二次分析策略包括长短期记忆模型。In some examples, the user ID secondary analysis strategy may be implemented using a model composed of the user ID secondary analysis strategy. Further, the user ID secondary analysis strategy includes a long short-term memory model.

在一些示例中,第一目标异常用户标签的个数为若干个。In some examples, the number of first target abnormal user labels is several.

在本发明实施例中,步骤201和步骤202为步骤203之前的两个同时处理的步骤,步骤201和步骤202之间并没有固定的先后关系,具体实施步骤可以通过实际情况进行操作,本发明实施例不步骤201和步骤202的实施顺序不进行限定。In the embodiment of the present invention, step 201 and step 202 are two simultaneous processing steps before step 203. There is no fixed sequence relationship between step 201 and step 202. The specific implementation steps can be operated according to the actual situation. The present invention The embodiment does not limit the execution order of step 201 and step 202.

步骤203、通过和目标云服务互动流式记录存在时序先后关系的后一云服务互动流式记录,确定第二目标异常用户标签对应的当前活动事件分布特征和当前互动行为描述字段,第二目标异常用户标签为后一云服务互动流式记录的目标异常用户标签捕捉窗口中包括的目标异常用户标签。Step 203: Determine the current activity event distribution characteristics and current interaction behavior description fields corresponding to the second target abnormal user tag through the interactive streaming record of the subsequent cloud service that has a temporal relationship with the target cloud service. The second target The abnormal user label is a target abnormal user label included in the target abnormal user label capture window recorded by the latter cloud service interactive streaming.

对于本发明实施例而言,云计算安防服务器通过后一云服务互动流式记录,确定出第二目标异常用户标签以及第二目标异常用户标签对应的当前活动事件分布特征和当前互动行为描述字段。第一目标异常用户标签和第二目标异常用户标签至少部分配对,可以理解为第一目标异常用户标签中的至少部分风险用户标签与第二目标异常用户标签中的至少部分风险用户标签配对。第二目标异常用户标签的异常用户标签为若干个。For the embodiment of the present invention, the cloud computing security server determines the second target abnormal user label and the current activity event distribution characteristics and current interactive behavior description field corresponding to the second target abnormal user label through the latter cloud service interactive streaming record. . The first target abnormal user label and the second target abnormal user label are at least partially matched, which can be understood as at least part of the risk user labels in the first target abnormal user label and at least part of the risk user label in the second target abnormal user label. There are several abnormal user labels of the second target abnormal user label.

步骤204、通过活动事件识别结果、在先互动行为描述字段集、当前活动事件分布特征和当前互动行为描述字段,确定第一目标异常用户标签和第二目标异常用户标签之间的标签词向量距离。Step 204: Determine the tag word vector distance between the first target abnormal user tag and the second target abnormal user tag through the activity event recognition results, the previous interaction behavior description field set, the current activity event distribution characteristics and the current interaction behavior description field. .

对于本发明实施例而言,云计算安防服务器通过活动事件识别结果和当前活动事件分布特征,确定目标相对分布共性变量;云计算安防服务器通过在先互动行为描述字段集和当前互动行为描述字段,确定行为描述共性变量集;然后,云计算安防服务器将目标相对分布共性变量和行为描述共性变量集确定为第一目标异常用户标签和第二目标异常用户标签之间的标签词向量距离(用户类型/用户行为类型/用户交互事件类型的差异)。For the embodiment of the present invention, the cloud computing security server determines the target relative distribution common variables through the activity event recognition results and the current activity event distribution characteristics; the cloud computing security server determines the target relative distribution common variables through the previous interaction behavior description field set and the current interaction behavior description field, Determine the behavior description common variable set; then, the cloud computing security server determines the target relative distribution common variable and the behavior description common variable set as the label word vector distance (user type) between the first target abnormal user label and the second target abnormal user label /Differences in user behavior types/user interaction event types).

对于本发明实施例而言,云计算安防服务器将活动事件识别结果和当前活动事件分布特征进行共性变量运算,得到目标相对分布共性变量;云计算安防服务器对在先互动行为描述字段集和当前互动行为描述字段进行共性变量运算,得到行为描述共性变量集。For the embodiment of the present invention, the cloud computing security server performs common variable operations on the activity event recognition results and the current activity event distribution characteristics to obtain the common variables of the target relative distribution; the cloud computing security server calculates the previous interaction behavior description field set and the current interaction The behavior description field performs common variable operations to obtain a set of behavior description common variables.

步骤205、通过噪声事件识别结果、在先噪声行为描述字段集、当前活动事件分布特征和当前互动行为描述字段,确定噪声词向量距离。Step 205: Determine the noise word vector distance through the noise event recognition results, the previous noise behavior description field set, the current activity event distribution characteristics and the current interactive behavior description field.

对于本发明实施例而言,云计算安防服务器通过噪声事件识别结果和当前活动事件分布特征,确定噪声标签相对分布共性变量;云计算安防服务器通过在先噪声行为描述字段集和当前互动行为描述字段,确定噪声标签的行为描述共性变量;然后,云计算安防服务器将噪声标签相对分布共性变量和噪声标签的行为描述共性变量确定为噪声词向量距离。For the embodiment of the present invention, the cloud computing security server determines the common variables of the relative distribution of noise tags through the noise event recognition results and the current active event distribution characteristics; the cloud computing security server determines the common variables of the relative distribution of noise tags through the previous noise behavior description field set and the current interaction behavior description field. , determine the common variables of the behavior description of the noise tag; then, the cloud computing security server determines the common variable of the relative distribution of the noise tag and the common variable of the behavior description of the noise tag as the noise word vector distance.

对于本发明实施例而言,云计算安防服务器对噪声事件识别结果和当前活动事件分布特征进行共性变量运算,得到噪声标签相对分布共性变量;云计算安防服务器对在先噪声行为描述字段集和当前互动行为描述字段进行共性变量运算,得到噪声标签的行为描述共性变量。For the embodiment of the present invention, the cloud computing security server performs common variable calculations on the noise event recognition results and the current active event distribution characteristics to obtain the common variables of the relative distribution of noise tags; the cloud computing security server performs common variable calculations on the previous noise behavior description field set and the current active event distribution characteristics. The interactive behavior description field performs common variable operations to obtain the common variables of the noise label's behavior description.

进一步地,目标相对分布共性变量为目标可视化文本单元的窗口叠加变量与窗口共享变量的商,行为描述共性变量集为行为描述向量距离。Furthermore, the target relative distribution common variable is the quotient of the window overlay variable and the window shared variable of the target visual text unit, and the behavior description common variable set is the behavior description vector distance.

可以理解的是,噪声标签相对分布共性变量的运算流程与目标相对分布共性变量的运算流程一致,噪声标签的行为描述共性变量和行为描述共性变量集的运算流程一致,本发明实施例在此不做过多描述。It can be understood that the operation process of the common variables of the relative distribution of noise tags is consistent with the operation process of the common variables of the relative distribution of the target, and the operation process of the behavior description common variables of the noise tags is consistent with the operation process of the behavior description common variable set. The embodiment of the present invention does not apply here. Too much description.

在本发明实施例中,步骤204和步骤205为步骤203之后、步骤206之前的两个同时处理的步骤,步骤204和步骤205之间并没有固定的先后关系,具体实施步骤可以通过实际情况进行操作,本发明实施例不步骤204和步骤205的实施顺序不进行限定。In the embodiment of the present invention, step 204 and step 205 are two simultaneous processing steps after step 203 and before step 206. There is no fixed sequence relationship between step 204 and step 205. The specific implementation steps can be carried out according to the actual situation. Operation, the embodiment of the present invention does not limit the execution order of step 204 and step 205.

步骤206、通过标签词向量距离和噪声词向量距离,确定第一目标异常用户标签的操作行为分析指示。Step 206: Determine the operation behavior analysis indication of the first target abnormal user tag through the tag word vector distance and the noise word vector distance.

对于本发明实施例而言,云计算安防服务器通过标签词向量距离和噪声词向量距离,确定第一目标异常用户标签和第二目标异常用户标签之间的操作行为上下游特征(关联行为描述向量);云计算安防服务器利用操作行为上下游特征,在第二目标异常用户标签中抽取与第一目标异常用户标签存在联系的风险用户标签,以确定第一目标异常用户标签的操作行为分析指示(用于指导对目标异常用户标签的行为分析挖掘引导)。For the embodiment of the present invention, the cloud computing security server determines the upstream and downstream characteristics of the operating behavior (associated behavior description vector) between the first target abnormal user label and the second target abnormal user label through the label word vector distance and the noise word vector distance. ); the cloud computing security server uses the upstream and downstream characteristics of the operation behavior to extract the risk user tags that are related to the first target abnormal user tags from the second target abnormal user tags to determine the operation behavior analysis instructions of the first target abnormal user tags ( Used to guide behavioral analysis and mining of target abnormal user tags).

对于本发明实施例而言,云计算安防服务器将标签词向量距离和噪声词向量距离传入设定逻辑回归模型;然后通过设定逻辑回归模型,确定出多种操作行为上下游特征的若干个投票值,其中多种操作行为上下游特征可以为对第一目标异常用户标签和第二目标异常用户标签之间进行操作行为联合分析,得到的操作行为上下游特征;云计算安防服务器从多种操作行为上下游特征中确定出投票值(判定分)最高的操作行为上下游特征,作为操作行为上下游特征。For the embodiment of the present invention, the cloud computing security server transmits the tag word vector distance and the noise word vector distance into the set logistic regression model; then by setting the logistic regression model, several upstream and downstream characteristics of various operating behaviors are determined. Voting value, among which the upstream and downstream characteristics of various operating behaviors can be the upstream and downstream characteristics of operating behaviors obtained by jointly analyzing the operating behaviors between the first target abnormal user label and the second target abnormal user label; the cloud computing security server obtains the upstream and downstream characteristics of the operating behavior from a variety of Among the upstream and downstream characteristics of the operation behavior, the upstream and downstream characteristics of the operation behavior with the highest voting value (judgment score) are determined as the upstream and downstream characteristics of the operation behavior.

对于本发明实施例而言,设定逻辑回归模型生成多种操作行为上下游特征中每个关联行为事件之间的投票值,然后,将每一种操作行为上下游特征中的投票值进行累积处理,得到该种操作行为上下游特征对应的投票值,鉴于此,就得到了多种操作行为上下游特征的若干个投票值。For the embodiment of the present invention, a logistic regression model is set to generate voting values between each associated behavioral event in the upstream and downstream characteristics of multiple operating behaviors, and then the voting values in the upstream and downstream characteristics of each operating behavior are accumulated. Through processing, the voting values corresponding to the upstream and downstream characteristics of the operation behavior are obtained. In view of this, several voting values for the upstream and downstream characteristics of various operation behaviors are obtained.

对于本发明实施例而言,云计算安防服务器结合设定操作行为分析模型,对目标云服务互动流式记录中的第一目标异常用户标签和后一云服务互动流式记录中的第二目标异常用户标签进行操作行为联合分析,得到第一目标异常用户标签和第二目标异常用户标签之间的多种操作行为上下游特征。For the embodiment of the present invention, the cloud computing security server combines the set operation behavior analysis model to analyze the first target abnormal user tag in the target cloud service interactive streaming record and the second target in the latter cloud service interactive streaming record. The abnormal user labels conduct joint analysis of operation behaviors to obtain a variety of upstream and downstream characteristics of operation behaviors between the first target abnormal user label and the second target abnormal user label.

对于本发明实施例而言,逻辑回归模型可以为决策树。设定操作行为分析模型可以为二分类算法。For this embodiment of the present invention, the logistic regression model may be a decision tree. The operating behavior analysis model can be set as a binary classification algorithm.

进一步地,当云计算安防服务器确定出操作行为上下游特征然后,云计算安防服务器在操作行为上下游特征中的第一目标异常用户标签中确定与第二目标异常用户标签存在联系的风险用户标签,当云计算安防服务器在操作行为上下游特征中的第一目标异常用户标签中确定出与第二目标异常用户标签不相关的第三目标异常用户标签时,云计算安防服务器通过第三目标异常用户标签的可信系数值,获取活动事件识别结果,然后,云计算安防服务器利用操作行为上下游特征和活动事件识别结果,确定出第一目标异常用户标签的操作行为分析指示。Further, when the cloud computing security server determines the upstream and downstream characteristics of the operation behavior, the cloud computing security server determines the risk user label that is related to the second target abnormal user label among the first target abnormal user labels in the upstream and downstream characteristics of the operation behavior. , when the cloud computing security server determines the third target abnormal user label that is not related to the second target abnormal user label among the first target abnormal user labels in the upstream and downstream characteristics of the operation behavior, the cloud computing security server passes the third target abnormal user label The credibility coefficient value of the user tag is used to obtain the activity event identification results. Then, the cloud computing security server uses the upstream and downstream characteristics of the operation behavior and the activity event identification results to determine the operation behavior analysis instructions of the first target abnormal user tag.

举例而言,当云计算安防服务器在第一目标异常用户标签中确定出与第二目标异常用户标签不相关的第三目标异常用户标签时,云计算安防服务器判断出目标云服务互动流式记录中的第三目标异常用户标签并没有在后一云服务互动流式记录中出现,此时,云计算安防服务器判断第三目标异常用户标签并没有在后一云服务互动流式记录中出现的原因,当第三目标异常用户标签的可信系数值不符合设定可信系数阈值时,表征第三目标异常用户标签切换出后一云服务互动流式记录;当第三目标异常用户标签的可信系数值符合设定可信系数阈值时,表征第三目标异常用户标签在后一云服务互动流式记录中被噪声标签干扰,此时,云计算安防服务器通过第三目标异常用户标签对应的活动事件识别结果,估计第三目标异常用户标签在后一云服务互动流式记录中的相对分布情况。For example, when the cloud computing security server determines in the first target abnormal user label a third target abnormal user label that is not related to the second target abnormal user label, the cloud computing security server determines that the target cloud service interaction streaming record The third target abnormal user label did not appear in the latter cloud service interactive streaming record. At this time, the cloud computing security server determined that the third target abnormal user label did not appear in the latter cloud service interactive streaming record. The reason is that when the credibility coefficient value of the third target abnormal user label does not meet the set credibility coefficient threshold, it means that the third target abnormal user label switches out of the subsequent cloud service interactive streaming record; when the third target abnormal user label When the credibility coefficient value meets the set credibility coefficient threshold, it means that the third target abnormal user label is interfered by the noise label in the latter cloud service interactive streaming record. At this time, the cloud computing security server corresponds to the third target abnormal user label through The activity event identification results are used to estimate the relative distribution of the third target abnormal user tags in the latter cloud service interactive streaming records.

进一步地,云计算安防服务器在操作行为上下游特征中的第二目标异常用户标签中确定与第一目标异常用户标签存在联系的风险用户标签,当云计算安防服务器在操作行为上下游特征中的第二目标异常用户标签中确定出与第一目标异常用户标签不相关的第四目标异常用户标签时,云计算安防服务器将第四目标异常用户标签添加至下一轮上下游特征中,其中,下一轮上下游特征为以后一云服务互动流式记录为目标云服务互动流式记录生成的上下游特征。Further, the cloud computing security server determines a risk user label that is related to the first target abnormal user label in the second target abnormal user label in the upstream and downstream characteristics of the operation behavior. When the cloud computing security server determines the risk user label in the upstream and downstream characteristics of the operation behavior. When the fourth target abnormal user label that is not related to the first target abnormal user label is determined from the second target abnormal user label, the cloud computing security server adds the fourth target abnormal user label to the next round of upstream and downstream features, where, The next round of upstream and downstream features are the upstream and downstream features generated by taking the next cloud service interaction streaming record as the target cloud service interaction streaming record.

举例而言,当云计算安防服务器在第二目标异常用户标签中确定出与第一目标异常用户标签不相关的第四目标异常用户标签时,表征第四目标异常用户标签为新增的目标异常用户标签,此时,云计算安防服务器对第四目标异常用户标签进行异常用户的行为分析。For example, when the cloud computing security server determines a fourth target abnormal user label that is not related to the first target abnormal user label among the second target abnormal user labels, it indicates that the fourth target abnormal user label is a newly added target abnormality. User tag, at this time, the cloud computing security server performs abnormal user behavior analysis on the fourth target abnormal user tag.

对于本发明实施例而言,在操作行为上下游特征中,第一目标异常用户标签和第二目标异常用户标签中匹配的目标异常用户标签组成了标签对,第一目标异常用户标签和第二目标异常用户标签中未匹配的目标异常用户标签组成了孤立成员,云计算安防服务器从孤立成员中查找第二目标异常用户标签中的目标异常用户标签,作为与第一目标异常用户标签不相关的第四目标异常用户标签;云计算安防服务器从孤立成员中查找第一目标异常用户标签中的目标异常用户标签,作为与第二目标异常用户标签不相关的第三目标异常用户标签。For the embodiment of the present invention, in the upstream and downstream characteristics of the operation behavior, the first target abnormal user label and the matching target abnormal user label in the second target abnormal user label form a label pair, and the first target abnormal user label and the second target abnormal user label form a label pair. The unmatched target abnormal user tags in the target abnormal user tags form an orphan member. The cloud computing security server searches for the target abnormal user tag in the second target abnormal user tag from the isolated members as a tag that is not related to the first target abnormal user tag. The fourth target abnormal user label; the cloud computing security server searches for the target abnormal user label in the first target abnormal user label from the isolated member as a third target abnormal user label that is not related to the second target abnormal user label.

对于本发明实施例而言,云计算安防服务器利用单标签分析的算法,分别确定第一目标异常用户标签对应的可信系数值和活动事件识别结果。For this embodiment of the present invention, the cloud computing security server uses a single tag analysis algorithm to determine the credibility coefficient value and activity event identification result corresponding to the first target abnormal user tag.

对于本发明实施例而言,云计算安防服务器将第三目标异常用户标签对应的可信系数值和设定可信系数值进行对比,当第三目标异常用户标签对应的可信系数值达到设定可信系数值时,云计算安防服务器获取活动事件识别结果。For the embodiment of the present invention, the cloud computing security server compares the credibility coefficient value corresponding to the third target abnormal user label with the set credibility coefficient value. When the credibility coefficient value corresponding to the third target abnormal user label reaches the set credibility coefficient value, When the credibility coefficient value is determined, the cloud computing security server obtains the activity event identification results.

可以理解的是,本发明实施例中的单标签分析的算法、用户ID二次分析策略、设定逻辑回归模型和设定操作行为分析模型均为动态算法模型。It can be understood that the single tag analysis algorithm, the user ID secondary analysis strategy, the set logistic regression model and the set operation behavior analysis model in the embodiment of the present invention are all dynamic algorithm models.

对于本发明实施例而言,云计算安防服务器从操作行为上下游特征,确定出在流式会话中的不同目标异常用户标签的实时操作行为记录,进而能够对目标异常用户标签进行分析。For the embodiment of the present invention, the cloud computing security server determines the real-time operation behavior records of different target abnormal user tags in the streaming session from the upstream and downstream characteristics of the operation behavior, and can then analyze the target abnormal user tags.

应用以上实施例,云计算安防服务器通过目标云服务互动流式记录,确定噪声标签的噪声事件识别结果、通过目标云服务互动流式记录之前的在先云服务互动流式记录集,确定噪声标签的在先噪声行为描述字段集,并融合噪声标签的噪声事件识别结果和在先噪声行为描述字段集,确定出目标云服务互动流式记录中的第一目标异常用户标签的操作行为分析指示,使得在进行异常用户的行为分析时,由于利用了噪声标签的噪声事件识别结果和在先噪声行为描述字段集,进而削弱了噪声标签对异常用户的行为分析造成干扰,提高针对异常用户的行为分析和检测可靠性。Applying the above embodiments, the cloud computing security server determines the noise event recognition result of the noise tag through the target cloud service interactive streaming record, and determines the noise tag through the previous cloud service interactive streaming record set before the target cloud service interactive streaming record. The previous noise behavior description field set is combined with the noise event recognition result of the noise tag and the previous noise behavior description field set to determine the operation behavior analysis indication of the first target abnormal user tag in the target cloud service interactive streaming record. When analyzing the behavior of abnormal users, the noise event recognition results of noise tags and the previous noise behavior description field set are used, thereby weakening the interference of noise tags on the behavior analysis of abnormal users and improving the behavior analysis of abnormal users. and detection reliability.

在本发明实施例中,云服务互动流式记录可以是针对区块链金融、虚拟现实活动、政企云业务、云游戏对战等云计算服务的记录,流式记录可以按照时间先后顺序将相关的会话互动信息进行记载。In embodiments of the present invention, cloud service interaction streaming records may be records for cloud computing services such as blockchain finance, virtual reality activities, government and enterprise cloud services, cloud game battles, etc. The streaming records may record relevant information in chronological order. Conversation interaction information is recorded.

在上述内容的基础上,对于一些独立性实施例而言,在确定出所述目标异常用户标签捕捉窗口中携带的第一目标异常用户标签之后,该方法还可以包括如下内容:对所述第一目标异常用户标签进行操作行为持续化分析,得到所述第一目标异常用户标签对应操作行为日志;基于所述操作行为日志确定所述第一目标异常用户标签的风险倾向字段;依据所述风险倾向字段确定针对所述第一目标异常用户标签的风险防控方案。Based on the above content, for some independent embodiments, after determining the first target abnormal user tag carried in the target abnormal user tag capture window, the method may also include the following content: A target abnormal user tag performs a continuous analysis of operation behavior to obtain an operation behavior log corresponding to the first target abnormal user tag; determine the risk tendency field of the first target abnormal user tag based on the operation behavior log; and based on the risk The tendency field determines the risk prevention and control plan for the first target abnormal user label.

比如,可以对第一目标异常用户标签的一系列操作行为进行跟踪记录,从而得到包括一系列操作行为事件的操作行为日志,然而通过风险倾向字段挖掘得到风险倾向字段,这样可以通过风险倾向字段匹配对应的风险防控方案。For example, a series of operation behaviors of the first target abnormal user tag can be tracked and recorded to obtain an operation behavior log including a series of operation behavior events. However, the risk propensity field can be obtained through risk propensity field mining, so that the risk propensity field can be matched Corresponding risk prevention and control plans.

对于一些独立性实施例而言,基于所述操作行为日志确定所述第一目标异常用户标签的风险倾向字段,可以包括如下内容:获取所述操作行为日志对应的待识别操作行为文本;利用操作行为文本挖掘网络,在指定互动场景上对所述待识别操作行为文本提取风险倾向;根据所述风险倾向得到所述待识别操作行为文本的风险倾向字段。For some independent embodiments, determining the risk tendency field of the first target abnormal user label based on the operation behavior log may include the following: obtaining the to-be-identified operation behavior text corresponding to the operation behavior log; using the operation The behavioral text mining network extracts the risk tendency of the operation behavior text to be identified on a designated interaction scene; and obtains the risk tendency field of the operation behavior text to be identified based on the risk tendency.

对于一些独立性实施例而言,所述获取待识别操作行为文本之前,所述方法还包括:根据参考互动场景的参考行为文本与所述指定互动场景的操作行为文本关联调试得到所述操作行为文本挖掘网络。For some independent embodiments, before obtaining the operation behavior text to be identified, the method further includes: debugging to obtain the operation behavior based on the reference behavior text of the reference interaction scene and the operation behavior text of the specified interaction scene. Text mining network.

对于一些独立性实施例而言,所述根据参考互动场景的参考行为文本与所述指定互动场景的操作行为文本关联调试得到所述操作行为文本挖掘网络,包括:将所述参考行为文本通过文本场景调整模型转换至指定互动场景,得到场景化行为文本;利用所述操作行为文本挖掘网络对所述场景化行为文本与所述操作行为文本进行联合特征挖掘,得到全局字段代价;根据所述全局字段代价对所述操作行为文本挖掘网络进行关联调试。For some independent embodiments, debugging the reference behavior text based on the reference interaction scene and the operation behavior text of the specified interaction scene to obtain the operation behavior text mining network includes: converting the reference behavior text through text The scene adjustment model is converted to the specified interaction scene to obtain the scene behavior text; the operation behavior text mining network is used to perform joint feature mining on the scene behavior text and the operation behavior text to obtain the global field cost; according to the global Field cost performs correlation debugging on the operational behavior text mining network.

对于一些独立性实施例而言,所述全局字段代价包括联合代价和识别代价;所述利用所述操作行为文本挖掘网络对所述场景化行为文本与所述操作行为文本进行联合细节描述挖掘,得到全局字段代价包括:利用所述操作行为文本挖掘网络分别对所述场景化行为文本、所述操作行为文本进行细节描述提取,得到场景化行为文本细节描述、操作行为文本细节描述;根据所述场景化行为文本细节描述得到所述场景化行为文本的第一风险倾向字段,并根据所述操作行为文本细节描述得到所述操作行为文本的第二风险倾向字段;根据所述场景化行为文本细节描述和所述操作行为文本细节描述,得到所述联合代价,并根据所述第一风险倾向字段和所述场景化行为文本的积极注释,以及所述第二风险倾向字段和所述操作行为文本的消极注释,得到所述识别代价;将所述联合代价和所述识别代价进行加权处理,得到所述全局字段代价。For some independent embodiments, the global field cost includes a joint cost and an identification cost; the operation behavior text mining network is used to perform joint detail description mining on the scenario behavior text and the operation behavior text, Obtaining the global field cost includes: using the operation behavior text mining network to extract detailed descriptions of the scene behavior text and the operation behavior text respectively, and obtaining the scene behavior text detail description and the operation behavior text detail description; according to The first risk propensity field of the scenario-based behavior text is obtained from the detailed description of the scenario-based behavior text, and the second risk propensity field of the operation behavior text is obtained according to the detailed description of the operation behavior text; according to the details of the scenario-based behavior text Description and the detailed description of the operation behavior text, the joint cost is obtained, and based on the positive annotation of the first risk tendency field and the scenario behavior text, as well as the second risk tendency field and the operation behavior text negative annotation to obtain the recognition cost; perform weighting processing on the joint cost and the recognition cost to obtain the global field cost.

基于同样的发明构思,图2示出了本发明实施例提供的异常用户行为处理装置的模块框图,异常用户行为处理装置可以包括实施图1所示的相关方法步骤的窗口确定模块21、权重确定模块22以及行为分析模块23。Based on the same inventive concept, Figure 2 shows a module block diagram of an abnormal user behavior processing device provided by an embodiment of the present invention. The abnormal user behavior processing device may include a window determination module 21 that implements the relevant method steps shown in Figure 1, and a weight determination module. module 22 and behavior analysis module 23.

窗口确定模块21,用于通过目标云服务互动流式记录和所述目标云服务互动流式记录存在时序先后关系的在先云服务互动流式记录,确定若干个异常用户标签捕捉窗口和所述若干个异常用户标签捕捉窗口对应的若干个窗口权重评分;其中,所述若干个异常用户标签捕捉窗口中的各个异常用户标签捕捉窗口对应一个窗口权重评分。The window determination module 21 is used to determine several abnormal user tag capture windows and the described target cloud service interactive streaming record through the target cloud service interactive streaming record and the previous cloud service interactive streaming record that has a chronological relationship. Several window weight scores corresponding to several abnormal user label capture windows; wherein, each abnormal user label capture window in the several abnormal user label capture windows corresponds to one window weight score.

权重确定模块22,用于基于所述目标云服务互动流式记录,确定所述若干个异常用户标签捕捉窗口中每两个异常用户标签捕捉窗口之间的扰动权重评分。The weight determination module 22 is configured to determine the disturbance weight score between each two abnormal user tag capture windows in the several abnormal user tag capture windows based on the target cloud service interactive streaming record.

行为分析模块23,用于基于所述若干个窗口权重评分和所述扰动权重评分,从所述若干个异常用户标签捕捉窗口中确定出目标异常用户标签捕捉窗口,并确定所述目标异常用户标签捕捉窗口中携带的第一目标异常用户标签,以对所述第一目标异常用户标签进行操作行为持续化分析。Behavior analysis module 23, configured to determine a target abnormal user label capture window from the several abnormal user label capture windows based on the several window weight scores and the disturbance weight score, and determine the target abnormal user label Capture the first target abnormal user tag carried in the window to perform a continuous analysis of the operating behavior of the first target abnormal user tag.

应用于本发明的相关实施例可以达到如下技术效果:通过目标云服务互动流式记录和目标云服务互动流式记录存在时序先后关系的在先云服务互动流式记录,确定若干个异常用户标签捕捉窗口和若干个异常用户标签捕捉窗口对应的若干个窗口权重评分,若干个异常用户标签捕捉窗口中的各个异常用户标签捕捉窗口对应一个窗口权重评分;通过目标云服务互动流式记录,确定若干个异常用户标签捕捉窗口中每两个异常用户标签捕捉窗口之间的扰动权重评分;通过若干个窗口权重评分和扰动权重评分,从若干个异常用户标签捕捉窗口中确定出目标异常用户标签捕捉窗口,并确定目标异常用户标签捕捉窗口中携带的第一目标异常用户标签,以对第一目标异常用户标签进行操作行为持续化分析。应用于本发明实施例,云计算安防服务器分别获取若干个异常用户标签捕捉窗口的若干个窗口权重评分和每两个异常用户标签捕捉窗口之间的若干个扰动权重评分,并基于若干个窗口权重评分和若干个扰动权重评分从若干个异常用户标签捕捉窗口中过滤掉存在误差和扰动的捕捉信息,然后确定出需进行操作行为持续化分析的目标捕捉窗口,这样一来,在确定操作行为分析指示时,能够保障持续化分析的精度和可信度,提高针对异常用户的行为分析和检测可靠性。The following technical effects can be achieved when applied to relevant embodiments of the present invention: several abnormal user tags are determined through the target cloud service interactive streaming record and the target cloud service interactive streaming record that has a temporal relationship with the previous cloud service interactive streaming record. Several window weight scores corresponding to the capture window and several abnormal user label capture windows. Each abnormal user label capture window in the several abnormal user label capture windows corresponds to a window weight score; through the target cloud service interactive streaming record, determine a number of The disturbance weight score between every two abnormal user label capture windows in the abnormal user label capture windows; through several window weight scores and disturbance weight scores, the target abnormal user label capture window is determined from several abnormal user label capture windows , and determine the first target abnormal user tag carried in the target abnormal user tag capture window, so as to conduct a continuous analysis of the operation behavior of the first target abnormal user tag. Applied to the embodiment of the present invention, the cloud computing security server obtains several window weight scores of several abnormal user tag capture windows and several disturbance weight scores between every two abnormal user tag capture windows, and based on several window weights Scores and several disturbance weight scores filter out capture information with errors and disturbances from several abnormal user tag capture windows, and then determine the target capture window that requires continuous analysis of operational behavior. In this way, when determining the operational behavior analysis When instructed, it can ensure the accuracy and credibility of continuous analysis and improve the reliability of behavioral analysis and detection of abnormal users.

以上所述,仅为本发明的具体实施方式。熟悉本技术领域的技术人员根据本发明提供的具体实施方式,可想到变化或替换,都应涵盖在本发明的保护范围之内。The above descriptions are only specific embodiments of the present invention. Those skilled in the art may think of changes or substitutions based on the specific embodiments provided by the present invention, and they shall all be included within the protection scope of the present invention.

Claims (6)

1. The abnormal user behavior processing method for the cloud computing service is characterized by being applied to a cloud computing security server, and comprises the following steps:
determining a plurality of abnormal user tag capturing windows and a plurality of window weight scores corresponding to the plurality of abnormal user tag capturing windows through a target cloud service interaction stream record and a previous cloud service interaction stream record with a time sequence relation; wherein each of the plurality of abnormal user tag capture windows corresponds to a window weight score;
determining disturbance weight scores between every two abnormal user tag capturing windows in the plurality of abnormal user tag capturing windows based on the target cloud service interactive streaming records;
determining a target abnormal user tag capturing window from the abnormal user tag capturing windows based on the window weight scores and the disturbance weight scores, and determining a first target abnormal user tag carried in the target abnormal user tag capturing window so as to perform continuous analysis on the operation behaviors of the first target abnormal user tag;
The window weight score is obtained by performing global processing on the tag capturing trusted coefficient and the time sequence related variable, wherein the global processing is weighting processing; the disturbance weight score is an interference weight or a conflict weight;
the determining a plurality of abnormal user tag capturing windows and a plurality of window weight scores corresponding to the plurality of abnormal user tag capturing windows according to the previous cloud service interaction flow records with time sequence relations between the target cloud service interaction flow records comprises the following steps:
determining the plurality of abnormal user tag capturing windows and a plurality of tag capturing trusted coefficients corresponding to the plurality of abnormal user tag capturing windows based on the target cloud service interactive streaming record, wherein each abnormal user tag capturing window in the plurality of abnormal user tag capturing windows corresponds to one tag capturing trusted coefficient;
determining a plurality of time sequence related variables corresponding to the plurality of abnormal user tag capturing windows based on the target cloud service interaction flow record and the previous cloud service interaction flow record, wherein each abnormal user tag capturing window corresponds to one time sequence related variable;
Determining a plurality of window weight scores corresponding to the plurality of abnormal user tag capture windows based on the plurality of tag capture trusted coefficients and the plurality of time sequence associated variables;
the determining, based on the target cloud service interaction flow record and the previous cloud service interaction flow record, a plurality of time sequence related variables corresponding to the plurality of abnormal user tag capturing windows includes:
determining a plurality of prior abnormal user tag capturing windows in the prior cloud service interactive streaming records;
determining a plurality of relative distribution characteristic values between a first abnormal user tag capture window and the plurality of previous abnormal user tag capture windows, wherein the first abnormal user tag capture window is one of the plurality of abnormal user tag capture windows;
determining the maximum characteristic value in the plurality of relative distribution characteristic values as a first time sequence associated variable corresponding to the first abnormal user tag capture window;
determining a plurality of first time sequence related variables corresponding to a plurality of first abnormal user tag capturing windows to determine the plurality of time sequence related variables corresponding to the plurality of abnormal user tag capturing windows;
The determining, based on the target cloud service interactive streaming record, a disturbance weight score between every two abnormal user tag capturing windows in the plurality of abnormal user tag capturing windows includes:
in the target cloud service interactive streaming record, determining a relative distribution common variable and a record content common variable between every two abnormal user tag capturing windows;
determining a disturbance weight score between every two abnormal user tag capture windows based on the relative distribution common variable and the recorded content common variable;
in the target cloud service interactive flow record, determining a relative distribution commonality variable between every two abnormal user tag capturing windows comprises the following steps:
the method comprises the steps of respectively obtaining an information capturing unit of a first abnormal user tag capturing window and an information capturing unit of a second abnormal user tag capturing window, wherein the first abnormal user tag capturing window and the second abnormal user tag capturing window are the two abnormal user tag capturing windows;
and determining relative distribution common variables between the first abnormal user tag capture window and the second abnormal user tag capture window based on the information capture unit of the first abnormal user tag capture window and the information capture unit of the second abnormal user tag capture window so as to determine the relative distribution common variables between every two abnormal user tag capture windows.
2. The method of claim 1, wherein the determining a target outlier user tag capture window from the number of outlier user tag capture windows based on the number of window weight scores and the perturbation weight score comprises:
taking the window weight scores as influence factors for capturing disturbance characteristic members of a disturbance relation network;
the disturbance weight scores between every two abnormal user tag capturing windows are used as influence factors of connection vectors between two disturbance feature members corresponding to the two abnormal user tag capturing windows, and a capturing disturbance relation network is generated;
determining at least one local relation network in the captured disturbance relation network, and determining a first local relation network from the at least one local relation network based on a window weight score and a disturbance weight score carried by the at least one local relation network;
and determining an abnormal user tag capturing window carried by the first local relation network as the target abnormal user tag capturing window.
3. The method of claim 2, wherein the determining a first local relationship network from the at least one local relationship network based on the window weight score and the perturbation weight score carried by the at least one local relationship network comprises:
Respectively determining at least one group of local streaming records corresponding to at least one local relation network, wherein each local relation network in the at least one local relation network corresponds to one group of local streaming records, and the group of local streaming records comprises at least one local streaming record;
determining at least one resolution index corresponding to each local relation network in the at least one local relation network based on the window weight score and the disturbance weight score carried by the at least one local flow record, wherein each local flow record in the at least one local flow record corresponds to one resolution index;
determining a target analysis index with the maximum analysis index from at least one analysis index corresponding to each local relation network until at least one target analysis index corresponding to the at least one local relation network is determined;
determining at least one relation network characteristic distribution corresponding to the at least one target analysis index from the at least one local relation network;
and splicing the at least one relationship network characteristic distribution into the first local relationship network.
4. The method of claim 1, wherein after the determining the first target anomalous user tag carried in the target anomalous user tag capture window, the method further comprises:
Determining an activity event identification result corresponding to the first target abnormal user tag and a noise event identification result corresponding to a noise tag based on the target cloud service interactive streaming record, wherein the noise tag is a user tag with highest correlation degree with a target abnormal user tag in the first target abnormal user tag;
determining a previous interaction behavior description field set corresponding to the first target abnormal user tag and a previous noise behavior description field set corresponding to the noise tag based on a previous cloud service interaction flow record set before the target cloud service interaction flow record;
determining a current active event distribution characteristic and a current interaction behavior description field corresponding to a second target abnormal user tag through a later cloud service interaction flow record with a time sequence relation with the target cloud service interaction flow record, wherein the second target abnormal user tag is a target abnormal user tag included in a target abnormal user tag capturing window of the later cloud service interaction flow record;
determining a tag word vector distance between the first target abnormal user tag and the second target abnormal user tag based on the activity event recognition result, the set of previous interaction behavior description fields, the current activity event distribution feature and the current interaction behavior description field;
Determining a noise word vector distance based on the noise event recognition result, the set of prior noise behavior description fields, the current active event distribution feature and the current interaction behavior description field;
and determining an operation behavior analysis indication of the first target abnormal user tag based on the tag word vector distance and the noise word vector distance.
5. The method of claim 4, wherein the determining an operational behavioral analysis indication of the first target abnormal user tag based on the tag word vector distance and the noise word vector distance comprises:
determining an operational behavior upstream-downstream feature between the first target abnormal user tag and the second target abnormal user tag based on the tag word vector distance and the noise word vector distance;
and extracting a risk user tag which is in contact with the first target abnormal user tag from the second target abnormal user tag by combining the upstream and downstream characteristics of the operation behaviors so as to determine an operation behavior analysis indication of the first target abnormal user tag.
6. The cloud computing security server is characterized by comprising: a memory and a processor; the memory is coupled to the processor; the memory is used for storing computer program codes, and the computer program codes comprise computer instructions; wherein the computer instructions, when executed by the processor, cause the cloud computing security server to perform the method of any of claims 1-5.
CN202210796059.0A 2022-07-07 2022-07-07 A cloud computing service abnormal user behavior processing method and server Active CN115168917B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210796059.0A CN115168917B (en) 2022-07-07 2022-07-07 A cloud computing service abnormal user behavior processing method and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210796059.0A CN115168917B (en) 2022-07-07 2022-07-07 A cloud computing service abnormal user behavior processing method and server

Publications (2)

Publication Number Publication Date
CN115168917A CN115168917A (en) 2022-10-11
CN115168917B true CN115168917B (en) 2023-09-22

Family

ID=83492006

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210796059.0A Active CN115168917B (en) 2022-07-07 2022-07-07 A cloud computing service abnormal user behavior processing method and server

Country Status (1)

Country Link
CN (1) CN115168917B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109474586A (en) * 2018-10-31 2019-03-15 施勇 A kind of advanced duration threat analysis method based on user behavior analysis
CN111092889A (en) * 2019-12-18 2020-05-01 贾海芳 Distributed data node abnormal behavior detection method and device and server
US10673880B1 (en) * 2016-09-26 2020-06-02 Splunk Inc. Anomaly detection to identify security threats
CN111291015A (en) * 2020-04-28 2020-06-16 国网电子商务有限公司 User behavior abnormity detection method and device
CN112037052A (en) * 2020-11-04 2020-12-04 上海冰鉴信息科技有限公司 User behavior detection method and device
CN112163008A (en) * 2020-09-28 2021-01-01 邓燕平 Big data analysis-based user behavior data processing method and cloud computing platform
CN112527748A (en) * 2020-12-24 2021-03-19 北京百度网讯科技有限公司 Method, device, equipment and storage medium for analyzing user operation behaviors
CN113821815A (en) * 2021-10-19 2021-12-21 广州酷风技术开发有限公司 Big data protection method based on user behavior and server
CN114553587A (en) * 2022-03-07 2022-05-27 南昌厚中科技有限公司 Big data analysis method and server for dealing with cloud service threat
CN114547254A (en) * 2022-03-04 2022-05-27 九江市杰南科技有限公司 Risk identification method based on big data topic analysis and server

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10673880B1 (en) * 2016-09-26 2020-06-02 Splunk Inc. Anomaly detection to identify security threats
CN109474586A (en) * 2018-10-31 2019-03-15 施勇 A kind of advanced duration threat analysis method based on user behavior analysis
CN111092889A (en) * 2019-12-18 2020-05-01 贾海芳 Distributed data node abnormal behavior detection method and device and server
CN111291015A (en) * 2020-04-28 2020-06-16 国网电子商务有限公司 User behavior abnormity detection method and device
CN112163008A (en) * 2020-09-28 2021-01-01 邓燕平 Big data analysis-based user behavior data processing method and cloud computing platform
CN112037052A (en) * 2020-11-04 2020-12-04 上海冰鉴信息科技有限公司 User behavior detection method and device
CN112527748A (en) * 2020-12-24 2021-03-19 北京百度网讯科技有限公司 Method, device, equipment and storage medium for analyzing user operation behaviors
CN113821815A (en) * 2021-10-19 2021-12-21 广州酷风技术开发有限公司 Big data protection method based on user behavior and server
CN114547254A (en) * 2022-03-04 2022-05-27 九江市杰南科技有限公司 Risk identification method based on big data topic analysis and server
CN114553587A (en) * 2022-03-07 2022-05-27 南昌厚中科技有限公司 Big data analysis method and server for dealing with cloud service threat

Also Published As

Publication number Publication date
CN115168917A (en) 2022-10-11

Similar Documents

Publication Publication Date Title
CN106656536A (en) Method and device for processing service invocation information
CN105095048A (en) Processing method for alarm correlation of monitoring system based on business rules
CN115048370B (en) Artificial intelligence processing method for big data cleaning and big data cleaning system
WO2022142918A1 (en) Multi-target tracking system and method
CN113949577A (en) Data attack analysis method applied to cloud service and server
CN116414948A (en) Abnormal data mining method and software product based on cloud data and artificial intelligence
CN116349211A (en) Distributed Trajectory Anomaly Detection Based on Self-Attention Deep Learning
CN113961425B (en) Method, device and equipment for processing alarm message
CN115455429A (en) Vulnerability analysis method and system based on big data
Hwang et al. Fixme: Enhance software reliability with hybrid approaches in cloud
CN113691556A (en) Big data processing method and server applied to information protection detection
Wang et al. Tbdetector: Transformer-based detector for advanced persistent threats with provenance graph
CN115168917B (en) A cloud computing service abnormal user behavior processing method and server
CN115168868A (en) Business vulnerability analysis method and server applied to artificial intelligence
CN117932233B (en) User behavior model fine-tuning method, system and medium based on similar abnormal behaviors
CN117539739B (en) User continuous behavior abnormality monitoring method based on dual features
CN119051935A (en) APT attack detection method based on malicious intent characterization graph
CN118606086A (en) A root cause location method and device based on indicator data repair model
CN115801306B (en) Data processing method and server applied to artificial intelligence
CN114978765B (en) Big data processing method for information attack defense and AI attack defense system
CN117478354A (en) APT attack detection method and system based on autoencoder model
Nagar et al. Building golden signal based signatures for log anomaly detection
CN114785579A (en) Network attack analysis method and server applied to cloud side computing
CN115563657B (en) Data information security processing method, system and cloud platform
CN116048883B (en) Big data disaster recovery analysis method and server adopting artificial intelligence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20230103

Address after: No. 22, Wenchang Street, Shuangcheng, Harbin, Heilongjiang 150100

Applicant after: Sun Xiaowei

Address before: No. 6, Xing'an Branch Road, Shinan District, Qingdao City, Shandong Province, 266000

Applicant before: Qingdao Antaide Technology Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230831

Address after: 274000 No. 1788, Dongting Road, development zone, Heze City, Shandong Province (south of new century science and technology city)

Applicant after: Datang Zhichuang (Shandong) Technology Co.,Ltd.

Address before: No. 22, Wenchang Street, Shuangcheng, Harbin, Heilongjiang 150100

Applicant before: Sun Xiaowei

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A method and server for handling abnormal user behavior in cloud computing services

Granted publication date: 20230922

Pledgee: Heze rural commercial bank Limited by Share Ltd.

Pledgor: Datang Zhichuang (Shandong) Technology Co.,Ltd.

Registration number: Y2024980043561

PE01 Entry into force of the registration of the contract for pledge of patent right