Netinfo Security ›› 2017, Vol. 17 ›› Issue (7): 18-24.doi: 10.3969/j.issn.1671-1122.2017.07.003

• Orginal Article • Previous Articles     Next Articles

Anomaly Detection Model Based on User Portrait

Gang ZHAO(), Xingren YAO   

  1. School of Information Management, Beijing Information Science & Technology University, Beijing 100192, China
  • Received:2017-06-10 Online:2017-07-20 Published:2020-05-12

Abstract:

In view of the lack of data processing capability, the manual operation restriction of the rule extraction and the improper positioning ability of the intruderin the current big data environment, cannot meet the new security vulnerabilities and the emergence of the attack means in the new era. The author puts forward the intrusion detection model based on user portraits to realize the refinement of the intrusion detection granularity. In this paper, the intrusion detection model based on user portraits is introduced, and the intrusion detection model based on user image is introduced. To varying degrees, to improve the intrusion detection technology on the measurement of the evaluation results, and to a certain degree of practicality. In addition, as an emerging big data technology, the user portrait technology was introduced from the business areas such as precise marketing into the field of network security, which not only extending the applications of user portrait technology, exploring its potential research and practical value, but also making the intrusion detection technology has big data technology features, that meets the actual needs of the era of big data, and provides a new way to improve the intrusion detection technology at the same time.

Key words: user portrait, anomaly detection, pattern matching, PrefixSpan algorithm, AC_BM algorithm

CLC Number: