Method for predicating whether user has malicious behavior and calculation device
The invention discloses a method for predicating whether a user has a malicious behavior based on a user relation graph. The method is suitable for being executed in a calculation device. The user relation graph comprises nodes and edges for connecting associated nodes. The method comprises the foll...
Saved in:
Main Author | |
---|---|
Format | Patent |
Language | Chinese English |
Published |
03.10.2017
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The invention discloses a method for predicating whether a user has a malicious behavior based on a user relation graph. The method is suitable for being executed in a calculation device. The user relation graph comprises nodes and edges for connecting associated nodes. The method comprises the following steps: obtaining user data of a user; updating the user relation graph according to the obtained user data; according to the user relation graph, judging whether the user is matched with preset abnormal modes; according to the matched abnormal mode and a probability value corresponding to the abnormal mode, calculating malicious probability of the user; and predicating that the user, the malicious probability of which is within a preset value interval, has the malicious behavior. The invention also discloses the corresponding calculation device and a computer readable storage medium.
本发明公开了种基于用户关系图来预测用户是否存在恶意行为的方法,适于在计算设备中执行,用户关系图包括节点和连接关联节点的边,该方法包括步骤:获取用户的用户数据;根据所获取的用户数据来更新用户关系图;根据用户关系图,判断用户是否与预置的异常模式相匹配;根据所 |
---|---|
AbstractList | The invention discloses a method for predicating whether a user has a malicious behavior based on a user relation graph. The method is suitable for being executed in a calculation device. The user relation graph comprises nodes and edges for connecting associated nodes. The method comprises the following steps: obtaining user data of a user; updating the user relation graph according to the obtained user data; according to the user relation graph, judging whether the user is matched with preset abnormal modes; according to the matched abnormal mode and a probability value corresponding to the abnormal mode, calculating malicious probability of the user; and predicating that the user, the malicious probability of which is within a preset value interval, has the malicious behavior. The invention also discloses the corresponding calculation device and a computer readable storage medium.
本发明公开了种基于用户关系图来预测用户是否存在恶意行为的方法,适于在计算设备中执行,用户关系图包括节点和连接关联节点的边,该方法包括步骤:获取用户的用户数据;根据所获取的用户数据来更新用户关系图;根据用户关系图,判断用户是否与预置的异常模式相匹配;根据所 |
Author | CAI ZIBIN |
Author_xml | – fullname: CAI ZIBIN |
BookMark | eNqNi00KwjAQRrPQhX93GA8g2IpIl1IUNwqC-zJOpmYgJiFJ6_XNwgO4-R483jdXE-cdz9T9ytl4Db2PECJrIcziXvAxxXOEIZUxmOCNVkj8kODJBkcpPToNhJYGWz7egeZRiJdq2qNNvPpxodbn06O9bDj4jlNAYse5a2_V9lDXTbOvjrt_mi8hVDmq |
ContentType | Patent |
DBID | EVB |
DatabaseName | esp@cenet |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: EVB name: esp@cenet url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP sourceTypes: Open Access Repository |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Medicine Chemistry Sciences Physics |
DocumentTitleAlternate | 预测用户是否存在恶意行为的方法和计算设备 |
ExternalDocumentID | CN107229951A |
GroupedDBID | EVB |
ID | FETCH-epo_espacenet_CN107229951A3 |
IEDL.DBID | EVB |
IngestDate | Fri Jul 19 14:51:26 EDT 2024 |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Language | Chinese English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-epo_espacenet_CN107229951A3 |
Notes | Application Number: CN201710398236 |
OpenAccessLink | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20171003&DB=EPODOC&CC=CN&NR=107229951A |
ParticipantIDs | epo_espacenet_CN107229951A |
PublicationCentury | 2000 |
PublicationDate | 20171003 |
PublicationDateYYYYMMDD | 2017-10-03 |
PublicationDate_xml | – month: 10 year: 2017 text: 20171003 day: 03 |
PublicationDecade | 2010 |
PublicationYear | 2017 |
RelatedCompanies | BEIJING KNOWN CHUANGYU INFORMATION TECHNOLOGY CO., LTD |
RelatedCompanies_xml | – name: BEIJING KNOWN CHUANGYU INFORMATION TECHNOLOGY CO., LTD |
Score | 3.2058191 |
Snippet | The invention discloses a method for predicating whether a user has a malicious behavior based on a user relation graph. The method is suitable for being... |
SourceID | epo |
SourceType | Open Access Repository |
SubjectTerms | CALCULATING COMPUTING COUNTING DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES HANDLING RECORD CARRIERS PHYSICS PRESENTATION OF DATA RECOGNITION OF DATA RECORD CARRIERS SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR |
Title | Method for predicating whether user has malicious behavior and calculation device |
URI | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20171003&DB=EPODOC&locale=&CC=CN&NR=107229951A |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1bS8MwFD7MeX3Tqui8EEH6Vux62dqHIi5tGUK7KVP2Ntosowp2Za0M_PWehNb5oq8JhOSEc_Il-c53AG6d1OXoQ1zr8wXXLMZMDXGzrblukrgmdxxXCphGcW_4Yj1O7WkL3ptcGKkTupbiiOhRDP29kvG62Dxi-ZJbWd6lb9i0vA8nnq_Wt-Ou0KoxVX_gBeORP6IqpR6N1fhZ1FY1MPLa3Yct2BYwWujsB68DkZVS_D5SwkPYGeNoeXUEra9MgX3aVF5TYC-qP7wV2JUMTVZiY-2F5TE8RbLsM0G8SYqV_GkR5GWyzmT2LhEPDyRLSvKBIJsJkitpsvFJks8Jbgurq3aROReh4gRuwmBChxrOcvZjkhmNNwsyT6GdL3N-BsTQe4mjmwjSFnhxs_opt7jNdO4yZjNu2OfQ-Xuczn-dF3AgzCtpbOYltKvVJ7_C47hKr6UdvwHDD496 |
link.rule.ids | 230,309,786,891,25594,76906 |
linkProvider | European Patent Office |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3fS8MwED7m_DHftCo6f0WQvhW7td3ahyIu3Zi6dlOq7G20WUYV7MZaGfjXewmt80VfEwjJhbt8Sb77DuDajh2OPsS1Np9xzWTM0BA3W5rjRJFjcNt2pICpH7T6L-bD2BpX4L3MhZE6oSspjogexdDfcxmvF-tHLE9yK7Ob-A2b5re90PXU4nbcEFo1hup13O5o6A2pSqlLAzV4FrVVmxh5rcbdBmy2hTqvgE6vHZGVsvh9pPT2YGuEo6X5PlS-EgVqtKy8psCOX3x4K7AtGZosw8bCC7MDePJl2WeCeJMslvKnRZCXySqR2btEPDyQJMrIB4JsJkiupMzGJ1E6JbgtrKjaRaZchIpDuOp1Q9rXcJaTH5NMaLBekHEE1XSe8mMgTb0V2bqBIG2GFzezHXOTW0znDmMW403rBOp_j1P_r_MSav3QH0wG98HjKewKU0tKm3EG1Xz5yc_xaM7jC2nTb6I1kmc |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=Method+for+predicating+whether+user+has+malicious+behavior+and+calculation+device&rft.inventor=CAI+ZIBIN&rft.date=2017-10-03&rft.externalDBID=A&rft.externalDocID=CN107229951A |