CN117118717A - User information threat analysis method and system - Google Patents

User information threat analysis method and system Download PDF

Info

Publication number
CN117118717A
CN117118717A CN202311119479.6A CN202311119479A CN117118717A CN 117118717 A CN117118717 A CN 117118717A CN 202311119479 A CN202311119479 A CN 202311119479A CN 117118717 A CN117118717 A CN 117118717A
Authority
CN
China
Prior art keywords
information
threat
user
data transmission
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311119479.6A
Other languages
Chinese (zh)
Other versions
CN117118717B (en
Inventor
段玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei Shun'an Weiye Technology Co ltd
Original Assignee
Hubei Shun'an Weiye Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei Shun'an Weiye Technology Co ltd filed Critical Hubei Shun'an Weiye Technology Co ltd
Priority to CN202311119479.6A priority Critical patent/CN117118717B/en
Publication of CN117118717A publication Critical patent/CN117118717A/en
Application granted granted Critical
Publication of CN117118717B publication Critical patent/CN117118717B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/165Combined use of TCP and UDP protocols; selection criteria therefor

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a user information threat analysis method and a system, wherein the method comprises the following steps: the terminal obtains basic information of a digital product, and the digital product runs on the terminal; after the user registers the digital product, the digital product feeds back advanced information to the terminal; the terminal allocates a data transmission channel based on the basic information and the advanced information; acquiring activity information from a data transmission channel, and extracting behavior data from the activity information; and establishing an analysis model, analyzing the behavior data, and determining whether the current behavior has network threat or not.

Description

User information threat analysis method and system
Technical Field
The application relates to the technical field of threat analysis, in particular to a user information threat analysis method and system.
Background
The arrival of the digital age brings great convenience to the work and life of people. In work, the office mode of new generation business such as digital office, digital conference can break the traditional office limitation, and the office efficiency and the intelligent degree are obviously improved. In life, virtual reality games and digital space entertainment can bring brand new immersive sensory experience to people. Also for this reason, more and more users are beginning to use digitized products, and thus, user information security problems of some columns are also brought about. For example, the problems of user information loss, illegal information access, service data theft and the like are endless, and the user information security of the digital product is difficult to monitor at present.
Disclosure of Invention
Aiming at the prior art, the application aims to provide a user information threat analysis method, which mainly solves the technical problem of how to improve the installation efficiency of a motor and equipment ends.
In order to achieve the above object, the technical solution of the embodiment of the present application is as follows: the first aspect of the present application provides a method for threat analysis of user information, the method comprising the steps of:
the terminal obtains basic information of a digital product, and the digital product runs on the terminal;
after the user registers the digital product, the digital product feeds back advanced information to the terminal;
the terminal allocates a data transmission channel based on the basic information and the advanced information;
acquiring activity information from a data transmission channel, and extracting behavior data from the activity information;
and establishing an analysis model, analyzing the behavior data, and determining whether the current behavior has network threat or not.
Optionally, the basic information of the digitized product includes: name, description, icon, screenshot, category, version number, supported operating system version and supported language for different digitized products.
Optionally, the advanced information includes: the user performs a registration operation, the inputted ID, age, and user name obtained after the registration has passed.
Optionally, the terminal allocates a data transmission channel based on the basic information and the advanced information, and specifically includes: the terminal sets a first channel set based on basic information, wherein the first channel set comprises a plurality of first channels, and a specific first channel is selected as a data transmission channel based on advanced information.
Optionally, activity information is obtained from a data transmission channel, and behavior data is extracted from the activity information, which specifically includes: when a user operates through the digital product, the user performs data transmission through a corresponding first channel, acquires a data packet from the first channel as activity information, performs inverse reduction on the data packet to form a reduction result, and extracts behavior data from the reduction result.
Optionally, performing inverse reduction on the data packet to form a reduction result, which specifically includes: and carrying out IP fragment recombination of the data packet according to the network layer protocol IP, and then carrying out TCP/UDP protocol recombination to extract text content from the recombination result to form a restoration result.
Optionally, extracting behavior data from the reduction result specifically includes: the behavior data comprise operation behavior data and destination IP.
Optionally, an analysis model is built, the behavior data is analyzed, and whether the current behavior has a network threat or not is determined, which specifically includes:
comparing the obtained operation behavior data with preset threat operation behaviors, determining the threat level of the operation behaviors, and giving out a first evaluation score;
comparing the obtained target IP with a preset dangerous IP, determining the threat level of the target IP, and giving out a second evaluation score;
and based on the first evaluation score and the second evaluation score, obtaining the comprehensive evaluation score by adopting a combined weighting method.
A second aspect of the present application provides a user information threat analysis system for implementing the user information threat analysis method of any preceding claim, the system comprising a first acquisition module, a second acquisition module, a distribution module, an extraction module, an analysis module,
the first acquisition module is used for acquiring basic information of the digital product;
the second acquisition module is used for acquiring advanced information of the digital product;
the distribution module is used for distributing a data transmission channel based on the basic information and the advanced information; the method comprises the steps of carrying out a first treatment on the surface of the
The extraction module is used for obtaining activity information from the data transmission channel and extracting behavior data from the activity information;
the analysis module is used for establishing an analysis model, analyzing the behavior data and determining whether the current behavior has network threat or not.
The application has the beneficial effects that: according to the user information threat analysis method provided by the application, different data transmission channels are allocated for different users of different digital products, and data packets are extracted from the data transmission channels and behavior data are extracted for analysis, so that whether the current behavior has network threat is determined.
Drawings
FIG. 1 is a flowchart of a method for threat analysis of user information in an embodiment of the application;
FIG. 2 is a flowchart of a user information threat analysis system according to an embodiment of the application:
101 a first acquisition module, 102 a second acquisition module, 103 a distribution module, 104 an extraction module, 105 an analysis module.
Detailed Description
The technical scheme of the application is further elaborated below by referring to the drawings in the specification and the specific embodiments. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein in the description of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. In the following description, reference is made to the expression "some embodiments" which describe a subset of all possible embodiments, but it should be understood that "some embodiments" may be the same subset or a different subset of all possible embodiments and may be combined with each other without conflict.
It will be further understood that when an element is referred to as being "fixed to" another element, it can be directly on the other element or intervening elements may also be present. When an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may also be present. The terms "vertical," "horizontal," "inner," "outer," "left," "right," and the like are used herein for illustrative purposes only and are not meant to be the only embodiment.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. As used herein, the term "and/or" includes any and all combinations of the associated listed items.
Referring to fig. 1 in combination, a first aspect of the present application provides a method for analyzing threat of user information, the method comprising the following steps:
s1, a terminal acquires basic information of a digital product, wherein the digital product runs on the terminal;
specifically, the digital product in the application comprises various types of application programs, and the basic information comprises: name, description, icon, screenshot, category, version number, supported operating system version and supported language for different digitized products.
S2, after the user registers the digital product, the digital product feeds back advanced information to the terminal;
specifically, the advanced information in the present application includes: the user inputs the ID, age, and user name in the application program obtained after the registration is passed when performing the registration operation of the application program.
S3, the terminal allocates a data transmission channel based on the basic information and the advanced information;
specifically, the terminal sets a first channel set based on basic information, wherein the first channel set comprises a plurality of first channels, and a specific first channel is selected as a data transmission channel based on advanced information. For example, the user performs a registration operation in the application program a, which obtains the user a in the application program a, and the application program a sends the basic information and the advanced information to the terminal, and uses the first channel a as a data transmission channel of the user a in the application program a.
In some embodiments of the present application, another user performs a registration operation in the application a, which obtains the user B in the application a, where the application a sends basic information and advanced information to the terminal, and the first channel B is used as a data transmission channel of the user B in the application a, and further, the first channel a may also be used as a data transmission channel of the user B in the application a.
In some embodiments of the present application, the user performs a registration operation in the application B, which obtains the user C in the application B, and the application B sends the basic information and the advanced information to the terminal, and uses the first channel C as a data transmission channel of the user C in the application B.
The above embodiments are merely illustrative of the present application, and a person skilled in the art may freely determine a combination manner and a data transmission channel according to the technical ideas set forth in the present application.
S4, acquiring activity information from a data transmission channel, and extracting behavior data from the activity information;
when a user operates through the digital product, the user performs data transmission through a corresponding first channel, acquires a data packet from the first channel as activity information, performs inverse reduction on the data packet to form a reduction result, and extracts behavior data from the reduction result.
Performing inverse reduction on the data packet to form a reduction result, which specifically comprises the following steps: and carrying out IP fragment recombination of the data packet according to the network layer protocol IP, and then carrying out TCP/UDP protocol recombination to extract text content from the recombination result to form a restoration result.
Further, extracting behavior data from the reduction result specifically includes: the behavior data comprise operation behavior data and destination IP.
S5, establishing an analysis model, analyzing the behavior data, and determining whether the current behavior has network threat or not.
Specifically, comparing the obtained operation behavior data with preset threat operation behaviors, determining the threat level of the operation behaviors, and giving a first evaluation score;
comparing the obtained target IP with a preset dangerous IP, determining the threat level of the target IP, and giving out a second evaluation score;
and based on the first evaluation score and the second evaluation score, obtaining the comprehensive evaluation score by adopting a combined weighting method. Illustratively, the initial weights of the first and second rating scores are preset, which are calculated by: total evaluation score = first evaluation score x weight 1+ second evaluation score x weight 2.
Referring to fig. 2, a second aspect of the present application provides a user information threat analysis system for implementing the user information threat analysis method of any of the preceding claims, the system comprising a first acquisition module 101, a second acquisition module 102, an allocation module 103, an extraction module 104, an analysis module 105,
the first obtaining module 101 is configured to obtain basic information of a digitized product;
the second obtaining module 102 is configured to obtain advanced information of the digitized product;
the allocation module 103 is configured to allocate a data transmission channel based on the basic information and the advanced information;
the extracting module 104 is configured to obtain activity information from a data transmission channel, and extract behavior data from the activity information.
The analysis module 105 is configured to build an analysis model, analyze the behavior data, and determine whether a current behavior has a network threat.
The foregoing is merely illustrative embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about variations or substitutions within the technical scope of the present application, and the application should be covered. The scope of the application is to be determined by the appended claims.

Claims (9)

1. A method for threat analysis of user information, the method comprising the steps of:
the terminal obtains basic information of a digital product, and the digital product runs on the terminal;
after the user registers the digital product, the digital product feeds back advanced information to the terminal;
the terminal allocates a data transmission channel based on the basic information and the advanced information;
acquiring activity information from a data transmission channel, and extracting behavior data from the activity information;
and establishing an analysis model, analyzing the behavior data, and determining whether the current behavior has network threat or not.
2. The user information threat analysis method of claim 1, wherein the basic information of the digitized product comprises: name, description, icon, screenshot, category, version number, supported operating system version and supported language for different digitized products.
3. The method of claim 1, wherein the advanced information comprises: the user performs a registration operation, the inputted ID, age, and user name obtained after the registration has passed.
4. The method for analyzing threat of user information according to claim 1, wherein the terminal allocates a data transmission channel based on basic information and advanced information, specifically comprising: the terminal sets a first channel set based on basic information, wherein the first channel set comprises a plurality of first channels, and a specific first channel is selected as a data transmission channel based on advanced information.
5. The method for analyzing threat of user information according to claim 1, wherein the activity information is obtained from a data transmission channel, and the behavior data is extracted from the activity information, specifically comprising: when a user operates through the digital product, the user performs data transmission through a corresponding first channel, acquires a data packet from the first channel as activity information, performs inverse reduction on the data packet to form a reduction result, and extracts behavior data from the reduction result.
6. The method for analyzing threat of user information of claim 5, wherein performing inverse reduction on the data packet to form a reduction result specifically comprises: and carrying out IP fragment recombination of the data packet according to the network layer protocol IP, and then carrying out TCP/UDP protocol recombination to extract text content from the recombination result to form a restoration result.
7. The method for analyzing threat of user information according to claim 6, wherein extracting behavior data from the restored result comprises: the behavior data comprise operation behavior data and destination IP.
8. The method for analyzing threat of user information according to claim 7, wherein establishing an analysis model, analyzing the behavior data, and determining whether a current behavior has a network threat comprises:
comparing the obtained operation behavior data with preset threat operation behaviors, determining the threat level of the operation behaviors, and giving out a first evaluation score;
comparing the obtained target IP with a preset dangerous IP, determining the threat level of the target IP, and giving out a second evaluation score;
and based on the first evaluation score and the second evaluation score, obtaining the comprehensive evaluation score by adopting a combined weighting method.
9. A user information threat analysis system for implementing a user information threat analysis method in accordance with any of claims 1-8, the system comprising a first acquisition module, a second acquisition module, an allocation module, an extraction module, an analysis module,
the first acquisition module is used for acquiring basic information of the digital product;
the second acquisition module is used for acquiring advanced information of the digital product;
the distribution module is used for distributing a data transmission channel based on the basic information and the advanced information;
the extraction module is used for obtaining activity information from the data transmission channel and extracting behavior data from the activity information;
the analysis module is used for establishing an analysis model, analyzing the behavior data and determining whether the current behavior has network threat or not.
CN202311119479.6A 2023-09-01 2023-09-01 User information threat analysis method and system Active CN117118717B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311119479.6A CN117118717B (en) 2023-09-01 2023-09-01 User information threat analysis method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311119479.6A CN117118717B (en) 2023-09-01 2023-09-01 User information threat analysis method and system

Publications (2)

Publication Number Publication Date
CN117118717A true CN117118717A (en) 2023-11-24
CN117118717B CN117118717B (en) 2024-05-31

Family

ID=88805317

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311119479.6A Active CN117118717B (en) 2023-09-01 2023-09-01 User information threat analysis method and system

Country Status (1)

Country Link
CN (1) CN117118717B (en)

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1889430A (en) * 2006-06-21 2007-01-03 南京联创网络科技有限公司 Safety identification control method based on 802.1 X terminal wideband switching-in
CN101599963A (en) * 2009-06-10 2009-12-09 电子科技大学 Suspected network threat information screener and Screening Treatment method
CN102196440A (en) * 2010-03-01 2011-09-21 李青山 Method and system for network audit and intrusion detection
US20140101259A1 (en) * 2012-10-05 2014-04-10 Opera Solutions, Llc System and Method for Threat Assessment
US20150178496A1 (en) * 2013-12-19 2015-06-25 Tobias M. Kohlenberg Protection system including machine learning snapshot evaluation
US20160156655A1 (en) * 2010-07-21 2016-06-02 Seculert Ltd. System and methods for malware detection using log analytics for channels and super channels
KR101813798B1 (en) * 2016-08-03 2018-01-02 서동진 System for providing the using information of field experience learning place and method thereof
CN109474586A (en) * 2018-10-31 2019-03-15 施勇 A kind of advanced duration threat analysis method based on user behavior analysis
CN109995740A (en) * 2018-01-02 2019-07-09 国家电网公司 Threat detection method based on depth protocal analysis
CN111639033A (en) * 2020-06-03 2020-09-08 厦门力含信息技术服务有限公司 Software security threat analysis method and system
CN111800412A (en) * 2020-07-01 2020-10-20 中国移动通信集团有限公司 Advanced sustainable threat tracing method, system, computer equipment and storage medium
CN112671800A (en) * 2021-01-12 2021-04-16 江苏天翼安全技术有限公司 Method for threat quantification enterprise risk value
CN112738118A (en) * 2020-12-30 2021-04-30 北京天融信网络安全技术有限公司 Network threat detection method, device, system, electronic equipment and storage medium
KR20210083936A (en) * 2019-12-27 2021-07-07 주식회사 디플랫폼 System for collecting cyber threat information
CN114499957A (en) * 2021-12-24 2022-05-13 广州电力设计院有限公司 Network information security dynamic evaluation system and method thereof
CN115168895A (en) * 2022-07-08 2022-10-11 哈尔滨汇谷科技有限公司 User information threat analysis method and server combined with artificial intelligence
CN115694994A (en) * 2022-10-31 2023-02-03 北京天融信网络安全技术有限公司 Threat analysis method and device based on multi-level information fusion

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1889430A (en) * 2006-06-21 2007-01-03 南京联创网络科技有限公司 Safety identification control method based on 802.1 X terminal wideband switching-in
CN101599963A (en) * 2009-06-10 2009-12-09 电子科技大学 Suspected network threat information screener and Screening Treatment method
CN102196440A (en) * 2010-03-01 2011-09-21 李青山 Method and system for network audit and intrusion detection
US20160156655A1 (en) * 2010-07-21 2016-06-02 Seculert Ltd. System and methods for malware detection using log analytics for channels and super channels
US20140101259A1 (en) * 2012-10-05 2014-04-10 Opera Solutions, Llc System and Method for Threat Assessment
US20150178496A1 (en) * 2013-12-19 2015-06-25 Tobias M. Kohlenberg Protection system including machine learning snapshot evaluation
KR101813798B1 (en) * 2016-08-03 2018-01-02 서동진 System for providing the using information of field experience learning place and method thereof
CN109995740A (en) * 2018-01-02 2019-07-09 国家电网公司 Threat detection method based on depth protocal analysis
CN109474586A (en) * 2018-10-31 2019-03-15 施勇 A kind of advanced duration threat analysis method based on user behavior analysis
KR20210083936A (en) * 2019-12-27 2021-07-07 주식회사 디플랫폼 System for collecting cyber threat information
CN111639033A (en) * 2020-06-03 2020-09-08 厦门力含信息技术服务有限公司 Software security threat analysis method and system
CN111800412A (en) * 2020-07-01 2020-10-20 中国移动通信集团有限公司 Advanced sustainable threat tracing method, system, computer equipment and storage medium
CN112738118A (en) * 2020-12-30 2021-04-30 北京天融信网络安全技术有限公司 Network threat detection method, device, system, electronic equipment and storage medium
CN112671800A (en) * 2021-01-12 2021-04-16 江苏天翼安全技术有限公司 Method for threat quantification enterprise risk value
CN114499957A (en) * 2021-12-24 2022-05-13 广州电力设计院有限公司 Network information security dynamic evaluation system and method thereof
CN115168895A (en) * 2022-07-08 2022-10-11 哈尔滨汇谷科技有限公司 User information threat analysis method and server combined with artificial intelligence
CN115694994A (en) * 2022-10-31 2023-02-03 北京天融信网络安全技术有限公司 Threat analysis method and device based on multi-level information fusion

Also Published As

Publication number Publication date
CN117118717B (en) 2024-05-31

Similar Documents

Publication Publication Date Title
CN106686395B (en) live illegal video detection method and system
CN102185856B (en) Team organizing video method, device and system used in team organizing game
CN104965695B (en) The method and apparatus of analog subscriber real-time operation
CN104615658B (en) A kind of method for determining user identity
CN102185862A (en) Communication method, device and system of online game system
CN109218390A (en) User's screening technique and device
CN105577670B (en) A kind of warning system hitting library attack
CN105607997A (en) Background service test method, apparatus and system for software product
CN111026969A (en) Content recommendation method and device, storage medium and server
CN108388388A (en) Interaction content display methods and device
CN109847340A (en) A kind of information processing method, device, equipment and medium
CN107256276A (en) A kind of mobile App content safeties acquisition methods and equipment based on cloud platform
CN104967698B (en) A kind of method and apparatus crawling network data
CN104184656B (en) A kind of method for information display and application server
CN117118717B (en) User information threat analysis method and system
CN105871989A (en) Live broadcast video obtaining method and device
CN107844562B (en) Intelligent consultation service method
CN108270753A (en) The method and device of logging off users account
CN103530087A (en) Plot command executing method and device
CN106549856B (en) A kind of method and apparatus sending feedback data
CN108335401A (en) Share lottery system based on social software platform
CN106604309A (en) Method and system for hiding SSID of wireless access device
CN116567609A (en) User information association backfill method, device, equipment and storage medium
CN111714899A (en) Real-time game fighting system and method
CN105553982A (en) Security detection method and system for router and router

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant