CN115168848B - Interception feedback processing method based on big data analysis interception - Google Patents
Interception feedback processing method based on big data analysis interception Download PDFInfo
- Publication number
- CN115168848B CN115168848B CN202211093209.8A CN202211093209A CN115168848B CN 115168848 B CN115168848 B CN 115168848B CN 202211093209 A CN202211093209 A CN 202211093209A CN 115168848 B CN115168848 B CN 115168848B
- Authority
- CN
- China
- Prior art keywords
- decision
- interception
- decision tree
- sub
- semantics
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
技术领域technical field
本发明涉及人工智能技术领域,尤其涉及一种基于大数据分析拦截的拦截反馈处理方法、装置、电子设备及计算机可读存储介质。The present invention relates to the technical field of artificial intelligence, in particular to an interception feedback processing method, device, electronic equipment and computer-readable storage medium based on big data analysis and interception.
背景技术Background technique
随着大数据时代的到来,大数据所涉及的领域越来越广泛,但为了大数据所处的网络环境具有安全性,提高网络安全的可靠性,需要对网络中的非法信息进行拦截,以保证网络安全。With the advent of the era of big data, the fields involved in big data are becoming more and more extensive. However, in order to ensure the security of the network environment where big data resides and improve the reliability of network security, it is necessary to intercept illegal information in the network to Ensure network security.
现有的信息拦截技术多为基于防火墙对信息进行拦截,例如,需要拦截的访问活动,包括攻击访问活动,隐私访问活动等。实际应用中,并不是每次的拦截决策都是满足实际业务场景需求的,仅考虑固定的拦截决策,可能导致不能对信息进行及时拦截,从而对进行信息拦截时的准确度较低。Existing information interception technologies mostly intercept information based on firewalls, for example, access activities that need to be intercepted, including attack access activities, privacy access activities, and the like. In practical applications, not every interception decision meets the needs of actual business scenarios. Only considering fixed interception decisions may lead to failure to intercept information in time, resulting in low accuracy when intercepting information.
发明内容Contents of the invention
本发明提供一种基于大数据分析拦截的拦截反馈处理方法、装置及计算机可读存储介质,其主要目的在于解决进行信息拦截时的准确度较低的问题。The present invention provides an interception feedback processing method, device and computer-readable storage medium based on big data analysis interception, the main purpose of which is to solve the problem of low accuracy in information interception.
为实现上述目的,本发明提供的一种基于大数据分析拦截的拦截反馈处理方法,包括:In order to achieve the above object, the present invention provides an interception feedback processing method based on big data analysis interception, including:
S1、基于由业务服务系统进行目标拦截的拦截日志,获取所述业务服务系统的拦截决策依据;S1. Obtain the interception decision basis of the business service system based on the interception log of the target interception by the business service system;
S2、对所述拦截决策依据进行向量转换,得到向量拦截决策依据,根据所述向量拦截决策依据提取所述拦截决策依据的核心决策语义;S2. Perform vector conversion on the interception decision basis to obtain a vector interception decision basis, and extract core decision semantics of the interception decision basis according to the vector interception decision basis;
S3、根据所述核心决策语义构建第一子决策树集群,并将所述第一子决策树集群聚合为决策树模型;S3. Construct a first sub-decision tree cluster according to the core decision semantics, and aggregate the first sub-decision tree cluster into a decision tree model;
S4、实时获取所述业务服务系统的访问主体的访问信息,利用所述决策树模型对所述访问信息进行拦截评分,其中所述利用所述决策树模型对所述访问信息进行拦截评分,包括:S4. Obtain the access information of the access subject of the business service system in real time, and use the decision tree model to intercept and score the access information, wherein the use of the decision tree model to intercept and score the access information includes: :
S41、将预获取的训练数据集输入至所述决策树模型中,得到得分数据集;S41. Input the pre-acquired training data set into the decision tree model to obtain a score data set;
S42、根据所述得分数据集和预设的损失函数计算所述决策树模型的损失值,其中所述预设的损失函数包括:S42. Calculate the loss value of the decision tree model according to the score data set and a preset loss function, wherein the preset loss function includes:
其中,为损失值,为所述得分数据集中的得分数据,为预设的真实得分数据,为决策树的棵数,为反余弦函数,为对数函数;in, is the loss value, is the score data in the score dataset, is the preset real score data, is the number of decision trees, is the inverse cosine function, is a logarithmic function;
S43、当所述损失值大于或等于预设的损失阈值时,对所述决策树模型进行决策树添加处理操作,直到所述损失值小于所述损失阈值时,输出当前的决策树模型为拦截评分模型;S43. When the loss value is greater than or equal to the preset loss threshold, perform a decision tree addition processing operation on the decision tree model until the loss value is less than the loss threshold, output the current decision tree model as intercept scoring model;
S44、将所述访问信息输入至所述拦截评分模型中,得到所述访问信息的拦截评分;S44. Input the access information into the intercept scoring model to obtain the intercept score of the access information;
S5、对所述拦截评分大于预设评分阈值的访问信息进行拦截,并提取拦截评分大于预设评分阈值的访问信息的核心信息语义;S5. Intercept the access information whose interception score is greater than the preset scoring threshold, and extract the core information semantics of the access information whose interception score is greater than the preset scoring threshold;
S6、利用所述核心信息语义构建第二子决策树集群,并利用所述第二子决策树集群对所述决策树模型进行反馈调整。S6. Construct a second sub-decision tree cluster by using the semantics of the core information, and use the second sub-decision tree cluster to perform feedback adjustment on the decision tree model.
可选地,所述获取所述业务服务系统的拦截决策依据,包括:Optionally, the acquisition of the interception decision basis of the business service system includes:
提取所述拦截日志中的拦截参数;extracting interception parameters in the interception log;
根据所述拦截参数生成所述业务服务系统的拦截决策依据。An interception decision basis of the business service system is generated according to the interception parameters.
可选地,所述根据所述向量拦截决策依据提取所述拦截决策依据的核心决策语义,包括:Optionally, the extracting the core decision semantics of the interception decision basis according to the vector interception decision basis includes:
利用预设的Bert模型提取所述向量拦截决策依据中每个决策词向量的第一注意力权重;Utilize the preset Bert model to extract the first attention weight of each decision word vector in the vector intercept decision basis;
根据每个决策词向量的位置编码将相同决策词向量的所述第一注意力权重进行相加,得到第二注意力权重;According to the position coding of each decision word vector, the first attention weight of the same decision word vector is added to obtain the second attention weight;
选取第二注意力权重最高的决策词向量为核心决策语义。Select the decision word vector with the highest second attention weight as the core decision semantics.
可选地,所述根据所述核心决策语义构建第一子决策树集群,包括:Optionally, the constructing the first sub-decision tree cluster according to the core decision semantics includes:
对所述核心决策语义进行分类标注,得到所述核心决策语义对应的决策标注;Classifying and labeling the core decision semantics to obtain the decision label corresponding to the core decision semantics;
逐一选取所述决策标注作为第一根节点,在所述第一根节点上分裂第一左节点和第一右节点;Selecting the decision labels one by one as the first root node, splitting the first left node and the first right node on the first root node;
将所述核心决策语义分配至所述第一左节点和所述第一右节点,得到子决策树;assigning the core decision semantics to the first left node and the first right node to obtain a sub-decision tree;
汇集所述子决策树为所述第一子决策树集群。Aggregating the sub-decision trees into the first cluster of sub-decision trees.
可选地,所述将所述第一子决策树集群聚合为决策树模型,包括:Optionally, the aggregating the first sub-decision tree cluster into a decision tree model includes:
利用如下的信息增益算法计算所述第一子决策树集群中子决策树根节点对应决策标注的第一信息增益:Using the following information gain algorithm to calculate the first information gain corresponding to the decision label of the sub-decision tree root node in the first sub-decision tree cluster:
其中,为所述第一信息增益,为第类决策标注所占的比例,为对数函数,为所述核心决策语义的决策语义样本数量,为第类决策标注中决策语义样本数量,为所述决策标注对应属性的数量;in, is the first information gain, for the first The proportion of class decision labels, is a logarithmic function, is the number of decision semantic samples of the core decision semantics, for the first The number of decision semantic samples in class decision annotation, Annotate the number of attributes corresponding to the decision;
选取所述第一信息增益最大的第一决策标注作为所述决策树模型的第二根节点,在所述第一决策标注对应的属性上分裂出第一左节点和第二右节点;Selecting the first decision label with the largest first information gain as the second root node of the decision tree model, splitting the first left node and the second right node on the attribute corresponding to the first decision label;
逐一在未被选取的决策标注中选取所述第一信息增益最大的第二决策标注分配至所述第一左节点和所述第二右节点中;Selecting the second decision label with the largest information gain from the unselected decision labels one by one and assigning them to the first left node and the second right node;
当所述决策标注均被选取,得到所述决策树模型。When the decision labels are all selected, the decision tree model is obtained.
可选地,所述对所述拦截评分大于预设评分阈值的访问信息进行拦截,包括:Optionally, the intercepting the access information whose interception score is greater than a preset score threshold includes:
提取所述访问信息的访问参数;Extracting access parameters of the access information;
利用预设的拦截器对所述访问参数进行拦截。The access parameter is intercepted by using a preset interceptor.
可选地,利用所述第二子决策树集群对所述决策树模型进行反馈调整,包括:Optionally, using the second sub-decision tree cluster to perform feedback adjustment on the decision tree model includes:
计算所述第二子决策树集群中第二决策标注的第二信息增益;calculating a second information gain for a second decision label in the second sub-decision tree cluster;
选取所述第一信息增益和所述第二信息增益中最大的信息增益对应的决策标注为所述决策树模型的第三根节点,在所述第三根节点对应的属性上分裂出属性节点;Select the decision label corresponding to the largest information gain among the first information gain and the second information gain as the third root node of the decision tree model, and split the attribute node on the attribute corresponding to the third root node ;
利用如下的分裂算法确定所述属性节点的最佳分裂节点:Utilize the following splitting algorithm to determine the optimal splitting node of the attribute node:
其中,为所述最佳分裂节点的增益值,为划分搭配左子树中所有样本的梯度之和,为划分搭配右子树中所有样本的梯度之和,为划分搭配左子树中所有样本的二阶导数之和,为划分搭配右子树中所有样本的二阶导数之和,为正则化常数;in, is the gain value of the best split node, is the sum of the gradients of all samples in the left subtree for the partition collocation, is the sum of the gradients of all samples in the right subtree of the partition collocation, is the sum of the second derivatives of all samples in the left subtree of the partition collocation, is the sum of the second derivatives of all samples in the right subtree of the partition collocation, is a regularization constant;
将所述第一决策标注对应的第一信息增益和所述第二决策标注对应的第二信息增益的最大值分配至所述最佳分裂节点中;Allocating the maximum value of the first information gain corresponding to the first decision label and the second information gain corresponding to the second decision label to the optimal split node;
当所述第一子决策树和所述第二子决策树中有未被选取的决策标注时,对所述决策树模型进行迭代,直到所述决策标注均被选取,完成所述决策树模型的反馈调整。When there are unselected decision labels in the first sub-decision tree and the second sub-decision tree, iterate the decision tree model until all the decision labels are selected, and complete the decision tree model feedback adjustments.
本发明实施例通过业务服务系统的拦截日志,进而根据拦截日志获取拦截决策依据,有利于对信息拦截提供拦截依据,使对目标拦截更准确;提取拦截决策依据中的核心决策语义,根据核心决策语义构建决策树,有利于对业务系统的访问信息进行评分,进而根据评分结果判断是否要拦截访问信息;当拦截评分值大于评分阈值时,对访问信息进行拦截,并提取访问信息的核心信息语义,根据核心信息语义对决策树进行反馈调整,可以得到更准确的决策树模型,可更准确的实现对访问信息的拦截判断,保证了业务服务系统的安全。因此本发明提出的基于大数据分析拦截的拦截反馈处理方法、装置、电子设备及计算机可读存储介质,可以解决进行信息拦截时的准确度较低的问题。The embodiment of the present invention uses the interception log of the business service system, and then obtains the interception decision-making basis according to the interception log, which is beneficial to provide interception basis for information interception, and makes the target interception more accurate; extracts the core decision semantics in the interception decision-making basis, and according to the core decision-making Semantic construction of a decision tree is conducive to scoring the access information of the business system, and then judging whether to intercept the access information according to the scoring result; when the intercept score value is greater than the scoring threshold, intercept the access information and extract the core information semantics of the access information , according to the core information semantics, the decision tree can be adjusted by feedback, and a more accurate decision tree model can be obtained, which can more accurately realize the interception and judgment of access information, and ensure the security of the business service system. Therefore, the interception feedback processing method, device, electronic equipment, and computer-readable storage medium proposed by the present invention based on big data analysis and interception can solve the problem of low accuracy in information interception.
附图说明Description of drawings
图1为本发明一实施例提供的基于大数据分析拦截的拦截反馈处理方法的流程示意图;FIG. 1 is a schematic flow diagram of an interception feedback processing method based on big data analysis interception provided by an embodiment of the present invention;
图2为本发明一实施例提供的提取核心决策语义的流程示意图;FIG. 2 is a schematic flow diagram of extracting core decision semantics provided by an embodiment of the present invention;
图3为本发明一实施例提供的构建第一子决策树集群的流程示意图;Fig. 3 is a schematic flow chart of constructing the first sub-decision tree cluster provided by an embodiment of the present invention;
图4为本发明一实施例提供的基于大数据分析的拦截反馈处理装置的功能模块图;FIG. 4 is a functional block diagram of an interception feedback processing device based on big data analysis provided by an embodiment of the present invention;
图5为本发明一实施例提供的实现所述基于大数据分析拦截的拦截反馈处理方法的电子设备的结构示意图。FIG. 5 is a schematic structural diagram of an electronic device implementing the interception feedback processing method based on big data analysis interception provided by an embodiment of the present invention.
本发明目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。The realization of the purpose of the present invention, functional characteristics and advantages will be further described in conjunction with the embodiments and with reference to the accompanying drawings.
具体实施方式detailed description
应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
本申请实施例提供一种基于大数据分析拦截的拦截反馈处理方法。所述基于大数据分析拦截的拦截反馈处理方法的执行主体包括但不限于服务端、终端等能够被配置为执行本申请实施例提供的该方法的电子设备中的至少一种。换言之,所述基于大数据分析拦截的拦截反馈处理方法可以由安装在终端设备或服务端设备的软件或硬件来执行,所述软件可以是区块链平台。所述服务端包括但不限于:单台服务器、服务器集群、云端服务器或云端服务器集群等。所述服务器可以是独立的服务器,也可以是提供云服务、云数据库、云计算、云函数、云存储、网络服务、云通信、中间件服务、域名服务、安全服务、内容分发网络(Content Delivery Network,CDN)、以及大数据和人工智能平台等基础云计算服务的云服务器。An embodiment of the present application provides an interception feedback processing method based on big data analysis interception. The subject of execution of the interception feedback processing method based on big data analysis interception includes but is not limited to at least one of electronic devices such as a server end and a terminal that can be configured to execute the method provided by the embodiment of the present application. In other words, the interception feedback processing method based on big data analysis interception can be executed by software or hardware installed on the terminal device or server device, and the software can be a block chain platform. The server includes, but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like. The server can be an independent server, or it can provide cloud service, cloud database, cloud computing, cloud function, cloud storage, network service, cloud communication, middleware service, domain name service, security service, content distribution network (Content Delivery Network) Network, CDN), and cloud servers for basic cloud computing services such as big data and artificial intelligence platforms.
参照图1所示,为本发明一实施例提供的基于大数据分析拦截的拦截反馈处理方法的流程示意图。在本实施例中,所述基于大数据分析拦截的拦截反馈处理方法包括:Referring to FIG. 1 , it is a schematic flowchart of an interception feedback processing method based on big data analysis interception provided by an embodiment of the present invention. In this embodiment, the interception feedback processing method based on big data analysis interception includes:
S1、基于由业务服务系统进行目标拦截的拦截日志,获取所述业务服务系统的拦截决策依据;S1. Obtain the interception decision basis of the business service system based on the interception log of the target interception by the business service system;
本发明其中一个实际应用场景中,在业务服务系统中都会有非法访问请求,为了保证业务服务系统的安全,就需要对非法访问请求进行拦截,如若存在访问请求的参数包含有预设密码文件的文件名,表示该请求参数为异常数据,就需要对此访问请求进行拦截,并将对目标进行拦截所获得的访问请求记录在拦截日志中,在下一次出现同样情况的时候根据拦截的请求参数直接会该访问请求进行拦截。In one of the actual application scenarios of the present invention, there will be illegal access requests in the business service system. In order to ensure the security of the business service system, it is necessary to intercept the illegal access requests. If the parameters of the access requests contain preset password files The name of the file, indicating that the request parameter is abnormal data, it is necessary to intercept the access request, and record the access request obtained by intercepting the target in the interception log. When the same situation occurs next time, the intercepted request parameter will be directly The access request will be intercepted.
本发明实施例中,所述拦截日志是当业务服务系统存在访问异常,将该访问请求进行目标拦截后记录与系统日志中,以得到拦截日志。In the embodiment of the present invention, the interception log is when there is an access exception in the business service system, the access request is intercepted by the target and recorded in the system log to obtain the interception log.
本发明实施例中,所述获取所述业务服务系统的拦截决策依据,包括:In the embodiment of the present invention, the acquisition of the interception decision-making basis of the business service system includes:
提取所述拦截日志中的拦截参数;extracting interception parameters in the interception log;
根据所述拦截参数生成所述业务服务系统的拦截决策依据。An interception decision basis of the business service system is generated according to the interception parameters.
详细地,可利用脚本代码提取拦截日志中的拦截参数,则拦截参数就是与进行攻击事件关联的攻击参数,其中,脚本代码为运维人员针对漏洞风险拦截规则所预先编写的自动化代码逻辑。In detail, script codes can be used to extract the interception parameters in the interception log, and the interception parameters are the attack parameters associated with the attack event, wherein the script code is the automated code logic pre-written by the operation and maintenance personnel for the vulnerability risk interception rules.
具体地,拦截日志中的拦截参数包括请求访问业务服务系统的内部业务系统的地址信息及请求访问实现业务服务系统的系统功能信息等。例如请求访问实现业务服务系统的系统功能信息可以是读取任一客户银存款的存款金额等以及请求查询存款记录等。Specifically, the interception parameters in the interception log include the address information of the internal business system that requests access to the business service system and the system function information that requests access to the business service system. For example, the request to access the system function information of the business service system may be to read the deposit amount of any customer's bank deposit and request to inquire about the deposit record.
进一步地,根据所述拦截参数生成所述业务服务系统的拦截决策依据,即当请求访问的访问参数与拦截日志中的拦截参数一致时,就会对该访问请求进行拦截,若在后续有访问请求对业务服务系统进行访问,就会依据所述拦截决策依据对该访问请求的访问参数与拦截日志中的拦截参数进行匹配,若匹配成功则表明该访问请求为非法访问,就需要对访问请求进行拦截。Further, the interception decision-making basis of the business service system is generated according to the interception parameters, that is, when the access parameters of the requested access are consistent with the interception parameters in the interception log, the access request will be intercepted. When requesting access to the business service system, the access parameters of the access request will be matched with the interception parameters in the interception log according to the interception decision basis. If the match is successful, it indicates that the access request is an illegal access, and the access request needs to be to intercept.
示例性地,若拦截日志中的第一拦截参数为包含业务服务系统的系统安全配置文件的存储路径的地址信息,则就会把所述第一拦截参数作为一个拦截决策依据;若拦截日志中的第二拦截参数为与敏感字词关联的正则表达式,则会把所述第二拦截参数也会作为一个拦截决策依据,根据拦截决策数据对后续请求访问的访问参数做出判断,进而根据判断结果决定是否对访问参数进行拦截。Exemplarily, if the first interception parameter in the interception log is the address information containing the storage path of the system security configuration file of the business service system, then the first interception parameter will be used as a basis for interception decision; if the interception log in If the second interception parameter is a regular expression associated with sensitive words, the second interception parameter will also be used as a basis for interception decisions, and the access parameters for subsequent requests will be judged based on the interception decision data, and then based on The judgment result determines whether to intercept the access parameters.
S2、对所述拦截决策依据进行向量转换,得到向量拦截决策依据,根据所述向量拦截决策依据提取所述拦截决策依据的核心决策语义;S2. Perform vector conversion on the interception decision basis to obtain a vector interception decision basis, and extract core decision semantics of the interception decision basis according to the vector interception decision basis;
本发明实施例中,所述向量拦截决策依据是对所述拦截决策进行向量化,使所述向量拦截决策依据作为Bert模型的输入,用于经过Bert模型提取所述拦截决策依据的核心决策语义。In the embodiment of the present invention, the vector interception decision-making basis is to vectorize the interception decision-making, so that the vector interception decision-making basis is used as the input of the Bert model, and is used to extract the core decision semantics of the interception decision-making basis through the Bert model .
详细地,本发明实施例中,可通过预设的向量转换模型对所述拦截决策依据进行向量转换,得到向量拦截决策依据,所述向量转换模型是Bert模型。其中Bert模型中引入位置编码(position encoding)来描述序列位置信息,对于序列中的每一个元素给定一个随机初始化词向量,以记录元素在该序列中的位置信息。In detail, in the embodiment of the present invention, the interception decision-making basis may be vector-transformed through a preset vector-transformation model to obtain the vector-intercepting decision-making basis, and the vector transformation model is a Bert model. Among them, the Bert model introduces position encoding (position encoding) to describe the position information of the sequence, and a random initialization word vector is given for each element in the sequence to record the position information of the element in the sequence.
本发明实施例中,所述核心决策语义是指能够反映拦截决策依据的关键语义,即能体现所述拦截决策依据的特征信息。In the embodiment of the present invention, the core decision semantics refers to the key semantics that can reflect the basis of the interception decision, that is, feature information that can reflect the basis of the interception decision.
本发明实施例中,参图2所示,所述根据所述向量拦截决策依据提取所述拦截决策依据的核心决策语义,包括:In the embodiment of the present invention, as shown in FIG. 2, the core decision semantics of the interception decision-making basis extracted according to the vector interception decision-making basis include:
S21、利用预设的Bert模型提取所述向量拦截决策依据中每个决策词向量的第一注意力权重;S21. Using the preset Bert model to extract the first attention weight of each decision word vector in the vector intercept decision basis;
S22、根据每个决策词向量的位置编码将相同决策词向量的所述第一注意力权重进行相加,得到第二注意力权重;S22. Add the first attention weights of the same decision word vector according to the position code of each decision word vector to obtain a second attention weight;
S23、选取第二注意力权重最高的决策词向量为核心决策语义。S23. Select the decision word vector with the highest second attention weight as the core decision semantics.
详细地,在Bert模型中每个对所述拦截决策依据进行向量转换,且每个决策词向量都具有注意力权重,根据Bert模型中的最后一层编码器生成所述决策词向量的注意力权重。在Bert模型中具有注意力机制(self-Attention),注意力机制的核心逻辑是从关注整体到关注重点,当面对一个场景时,往往会根据需要观察注意特定的一部分,Bert模型使用自注意力机制关注自身序列的表达。In detail, in the Bert model, each vector conversion is performed on the interception decision basis, and each decision word vector has an attention weight, and the attention of the decision word vector is generated according to the last layer of encoder in the Bert model Weights. There is an attention mechanism (self-Attention) in the Bert model. The core logic of the attention mechanism is from focusing on the whole to focusing on the focus. When facing a scene, it often observes and pays attention to a specific part as needed. The Bert model uses self-attention The force mechanism is concerned with the expression of its own sequence.
具体地,在BERT模型不同层编码其生成的文档编码表示中,最后一层编码器输出的向量化表示相对其他层编码器输出具备更高层次的语义、语法等信息,因而最后一层编码器生成的词向量注意力权重矩阵相对其他层更符合语义上的相似度。由于BERT模型中的自注意力机制使用了多头注意力方法,每个头都会生成一个注意力权重矩阵,因此最后一层编码器会生成多个注意力权重矩阵,每个注意力权重矩阵代表对应头捕获的词向量之间相似度,从每个头对应的注意力权重矩阵中抽取“[CLS]”标记对应的行,该行代表该头捕捉到的“[CLS]”标记对文档中所有位置上的词向量的注意力权重。Specifically, in the document encoding representations generated by different layers of the BERT model, the vectorized representation output by the last layer of encoders has higher-level semantics, syntax, and other information than the outputs of other layer encoders, so the last layer of encoders The generated word vector attention weight matrix is more in line with the semantic similarity than other layers. Since the self-attention mechanism in the BERT model uses a multi-head attention method, each head will generate an attention weight matrix, so the last layer of encoder will generate multiple attention weight matrices, and each attention weight matrix represents the corresponding head. The similarity between the captured word vectors, extract the row corresponding to the "[CLS]" tag from the attention weight matrix corresponding to each head, which represents the pair of "[CLS]" tags captured by the head at all positions in the document The attention weights of the word vectors of .
示例性地,当所述拦截决策依据为系统安全配置文件存储路径的地址信息、用户密码的地址信息时,其注意力权重分别为:“系统”:0.1,“文件”:0.2,“存储”:0.3,“路径”:0.3,“地址”:0.3,“信息”:0.1,“用户”:0.1,“密码”:0.5,“地址”:0.3,“信息”:0.1时,将相同的决策词向量的注意力权重进行相加,即“地址”:0.6,“地址”:0.2,则在所述拦截决策依据中核心决策语义为地址、密码。Exemplarily, when the interception decision is based on the address information of the storage path of the system security configuration file and the address information of the user password, the attention weights are: "system": 0.1, "file": 0.2, "storage" :0.3, "path": 0.3, "address": 0.3, "info": 0.1, "user": 0.1, "password": 0.5, "address": 0.3, "info": 0.1, same decision The attention weights of the word vectors are added, that is, "address": 0.6, "address": 0.2, then the core decision semantics in the interception decision basis are address and password.
S3、根据所述核心决策语义构建第一子决策树集群,并将所述第一子决策树集群聚合为决策树模型;S3. Construct a first sub-decision tree cluster according to the core decision semantics, and aggregate the first sub-decision tree cluster into a decision tree model;
本发明实施例中,所述第一子决策树集群是根据所述核心决策语义构建的多个子决策树的集合,决策树是一种树形结构,在决策树的每个内部节点表示一个属性上的测试,每个分支代表一个测试输出,每个叶节点代表一种类别。决策树是一个预测模型,代表的是对象属性与对象值之间的一种映射关系。In the embodiment of the present invention, the first sub-decision tree cluster is a set of multiple sub-decision trees constructed according to the core decision semantics, the decision tree is a tree structure, and each internal node of the decision tree represents an attribute In the test on , each branch represents a test output, and each leaf node represents a category. A decision tree is a predictive model that represents a mapping relationship between object attributes and object values.
本发明实施例中,参图3所示,所述根据所述核心决策语义构建第一子决策树集群,包括:In the embodiment of the present invention, as shown in FIG. 3, the construction of the first sub-decision tree cluster according to the core decision semantics includes:
S31、对所述核心决策语义进行分类标注,得到所述核心决策语义对应的决策标注;S31. Classify and label the core decision semantics to obtain decision labels corresponding to the core decision semantics;
S32、逐一选取所述决策标注作为第一根节点,在所述第一根节点上分裂第一左节点和第一右节点;S32. Select the decision labels one by one as the first root node, and split the first left node and the first right node on the first root node;
S33、将所述核心决策语义分配至所述第一左节点和所述第一右节点,得到子决策树;S33. Assign the core decision semantics to the first left node and the first right node to obtain a sub-decision tree;
S34、汇集所述子决策树为所述第一子决策树集群。S34. Gather the sub-decision trees into the first sub-decision tree cluster.
详细地,对所述决策语义进行分类标注,是因为决策树学习的关键是对属性进行分类,一般在分类的过程中,希望决策树的分支节点所包含的样本尽可能属于同一类别。例如,在银行业务系统服务中,所述核心决策语义中包含的核心语义有账户、会计、应计等,则根据账户进行分类标注有账户密码、账户余额、账户代码;根据会计进行分类标注有交易记录、会计代码;根据应计进行分类标注有应计费用、应计利息,应计制贷款金额。In detail, the classification and labeling of the decision semantics is because the key to decision tree learning is to classify attributes. Generally, in the process of classification, it is hoped that the samples contained in the branch nodes of the decision tree belong to the same category as much as possible. For example, in banking system services, if the core semantics contained in the core decision semantics include account, accounting, and accrual, etc., then according to the classification of the account, it is marked with account password, account balance, and account code; according to the classification of accounting, it is marked with Transaction records, accounting codes; classified according to accruals and marked with accrued expenses, accrued interest, and accrued loan amount.
具体地,当对银行业务系统中的所述核心决策语义进行分类标注后,可得到账户、会计、应计三种决策标注,逐一选取账户、会计、应计作为根节点,将账户所对应核心决策语义中的账户属性分配至账户作为根节点的左节点和右节点中,即将账户密码、账户余额、账户代码分配至账户作为根节点的左节点和右节点中,将会计所对应核心决策语义中的会计属性分配至会计作为根节点的左节点和右节点中,即将交易记录、会计代码分配至会计作为根节点的左节点和右节点中;将应计所对应核心决策语义中的应计属性分配至应计作为根节点的左节点和右节点中,即将应计费用、应计利息,应计制贷款金额分配至应计作为根节点的左节点和右节点中,并将三个子决策树汇集在一起,得到第一子决策树集群。Specifically, after classifying and annotating the core decision semantics in the banking system, three decision annotations of account, accounting, and accrual can be obtained, and account, accounting, and accrual are selected as root nodes one by one, and the corresponding core The account attributes in the decision semantics are assigned to the left and right nodes of the account as the root node, that is, the account password, account balance, and account code are assigned to the left and right nodes of the account as the root node, and the core decision semantics corresponding to the accounting office The accounting attributes in the accountant are assigned to the left node and the right node of the accountant as the root node, that is, the transaction records and accounting codes are assigned to the left node and the right node of the accountant as the root node; The attribute is assigned to the left node and the right node of the accrual as the root node, that is, the accrual fee, the accrual interest, and the accrual loan amount are assigned to the left node and the right node of the accrual as the root node, and the three child The decision trees are pooled together to obtain the first sub-cluster of decision trees.
本发明实施例中,所述决策树模型就是由一个个决策组成的树状决策集合,通过决策树模型可以对事件进行预测,得到一个合理的预测结果。In the embodiment of the present invention, the decision tree model is a tree-like decision set composed of individual decisions, and events can be predicted through the decision tree model, and a reasonable prediction result can be obtained.
本发明实施例中,所述将所述第一子决策树集群聚合为决策树模型,包括:In the embodiment of the present invention, the aggregating the first sub-decision tree cluster into a decision tree model includes:
利用如下的信息增益算法计算所述第一子决策树集群中子决策树根节点对应决策标注的第一信息增益:Using the following information gain algorithm to calculate the first information gain corresponding to the decision label of the sub-decision tree root node in the first sub-decision tree cluster:
其中,为所述第一信息增益,为第类决策标注所占的比例,为对数函数,为所述核心决策语义的决策语义样本数量,为第类决策标注中决策语义样本数量,为所述决策标注对应属性的数量;in, is the first information gain, for the first The proportion of class decision labels, is a logarithmic function, is the number of decision semantic samples of the core decision semantics, for the first The number of decision semantic samples in class decision annotation, Annotate the number of attributes corresponding to the decision;
选取所述第一信息增益最大的第一决策标注作为所述决策树模型的第二根节点,在所述第一决策标注对应的属性上分裂出第一左节点和第二右节点;Selecting the first decision label with the largest first information gain as the second root node of the decision tree model, splitting the first left node and the second right node on the attribute corresponding to the first decision label;
逐一在未被选取的决策标注中选取所述第一信息增益最大的第二决策标注分配至所述第一左节点和所述第二右节点中;Selecting the second decision label with the largest information gain from the unselected decision labels one by one and assigning them to the first left node and the second right node;
当所述决策标注均被选取,得到所述决策树模型。When the decision labels are all selected, the decision tree model is obtained.
详细地,根据所述信息增益算法可以确定节点的纯度,即在分支节点是否都属于同一类别,有利于生成的决策树更能准确的对信息拦截做出预测。当账户的第一信息增益为0.918,会计的第一信息增益为0.722,应计的第一信息增益为0.998,则根据第一信息增益可选择应计为所述决策树模型的根节点,将应计属性对应的子决策树作为主要子决策树,在未被选取的决策标注中,账户的信息增益最大,即将账户所对应的子决策树聚合至应计属性分裂出的左节点中,将会计所对应的子决策树聚合至应计属性分裂出的右节点中。In detail, according to the information gain algorithm, the purity of the nodes can be determined, that is, whether the branch nodes belong to the same category, which is beneficial for the generated decision tree to more accurately predict information interception. When the first information gain of the account is 0.918, the first information gain of accounting is 0.722, and the first information gain of accrual is 0.998, then according to the first information gain, it can be selected as the root node of the decision tree model, and the The sub-decision tree corresponding to the accrual attribute is used as the main sub-decision tree. Among the unselected decision labels, the information gain of the account is the largest, that is, the sub-decision tree corresponding to the account is aggregated into the left node split by the accrual attribute, and the The sub-decision tree corresponding to accounting is aggregated into the right node split from the accrual attribute.
具体地,当所有的决策标注均被选取,表述决策树已经聚合完成,即得到所述决策树模型。Specifically, when all decision labels are selected, it indicates that the decision tree has been aggregated, that is, the decision tree model is obtained.
S4、实时获取所述业务服务系统的访问主体的访问信息,利用所述决策树模型对所述访问信息进行拦截评分;S4. Obtain the access information of the access subject of the business service system in real time, and use the decision tree model to intercept and score the access information;
本发明实施例中,所述访问主体是指一个主动的实体,包括用户、用户组、终端、主机或一个应用,主体可以访问客体,客体是一个被动的实体,对客体的访问要受控。所述访问信息是指访问主体在业务系统中所进行的一系列访问操作,根据访问主体进行的访问操作可以利用决策树模型进行评分,从而根据评分结果进行下一步操作。In the embodiment of the present invention, the access subject refers to an active entity, including a user, a user group, a terminal, a host or an application, the subject can access the object, and the object is a passive entity whose access to the object should be controlled. The access information refers to a series of access operations performed by the access subject in the business system. According to the access operations performed by the access subject, the decision tree model can be used to score, so that the next step can be performed according to the scoring results.
详细地,可利用业务服务系统中的监听器(Listener)或者根据业务服务系统中的访问日志实时获取所述业务系统的访问主体的访问信息。In detail, the access information of the access subject of the business system can be obtained in real time by using a listener (Listener) in the business service system or according to the access log in the business service system.
本发明实施例中,对所述访问信息进行拦截评分,可根据拦截评分判断是否要对该访问信息进行拦截,当所述拦截评分大于评分阈值时,需要对访问信息进行拦截;当所述拦截评分小于评分阈值时,则访问主体可正常对业务服务系统进行访问。In the embodiment of the present invention, the interception score is performed on the access information, and it can be judged whether to intercept the access information according to the interception score. When the interception score is greater than the scoring threshold, the access information needs to be intercepted; when the interception When the score is less than the score threshold, the access subject can normally access the business service system.
本发明实施例中,所述利用所述决策树模型对所述访问信息进行拦截评分,包括:In the embodiment of the present invention, the use of the decision tree model to intercept and score the access information includes:
将预获取的训练数据集输入至所述决策树模型中,得到得分数据集;Input the pre-acquired training data set into the decision tree model to obtain a score data set;
根据所述得分数据集和预设的损失函数计算所述决策树模型的损失值,其中所述预设的损失函数包括:Calculate the loss value of the decision tree model according to the score data set and a preset loss function, wherein the preset loss function includes:
其中,为损失值,为所述得分数据集中的得分数据,为预设的真实得分数据,为决策树的棵数,为反余弦函数,为对数函数;in, is the loss value, is the score data in the score dataset, is the preset real score data, is the number of decision trees, is the inverse cosine function, is a logarithmic function;
当所述损失值大于或等于预设的损失阈值时,对所述决策树模型进行决策树添加处理操作,直到所述损失值小于所述损失阈值时,输出当前的决策树模型为拦截评分模型;When the loss value is greater than or equal to the preset loss threshold, add a decision tree to the decision tree model until the loss value is less than the loss threshold, output the current decision tree model as an intercept scoring model ;
将所述访问信息输入至所述拦截评分模型中,得到所述访问信息的拦截评分。The access information is input into the interception score model to obtain the interception score of the access information.
详细地,所述训练数据集是基于访问信息的训练数据,根据决策树模型对训练数据集进行训练,可得到决策树模型对于访问信息的拦截评分的预测。In detail, the training data set is based on access information, and the training data set is trained according to the decision tree model to obtain a prediction of the interception score of the decision tree model for the access information.
具体地,所述拦截评分模型为随机森林模型,其中,所述随机森林模型指的是利用多棵树对样本进行训练并预测的一种分类器,具有较高的预测能力。Specifically, the intercept scoring model is a random forest model, wherein the random forest model refers to a classifier that uses multiple trees to train and predict samples, and has a high predictive ability.
利用损失函数对拦截评分模型进行参数调整,降低真实值与预测值之间的损失,使拦截评分模型生成的预测值往真实方向靠拢,从而达到学习的目的。The loss function is used to adjust the parameters of the interception scoring model to reduce the loss between the real value and the predicted value, so that the predicted value generated by the interception scoring model is closer to the real direction, so as to achieve the purpose of learning.
S5、对所述拦截评分大于预设评分阈值的访问信息进行拦截,并提取拦截评分大于预设评分阈值的访问信息的核心信息语义;S5. Intercept the access information whose interception score is greater than the preset scoring threshold, and extract the core information semantics of the access information whose interception score is greater than the preset scoring threshold;
本发明实施例中,当所述拦截评分大于预设评分阈值时,需要对访问信息进行拦截,即拦截评分大于评分阈值时,表示此访问信息具有非安全性,要是让此访问信息继续访问,可能会使业务服务系统出现故障,因此需要对此访问信息进行拦截。In the embodiment of the present invention, when the interception score is greater than the preset scoring threshold, the access information needs to be intercepted, that is, when the interception score is greater than the scoring threshold, it means that the access information is not safe. If the access information is allowed to continue to be accessed, It may cause the business service system to fail, so this access information needs to be intercepted.
本发明实施例中,所述对所述拦截评分大于预设评分阈值的访问信息进行拦截,包括:In the embodiment of the present invention, the intercepting the access information whose interception score is greater than the preset scoring threshold includes:
提取所述访问信息的访问参数;Extracting access parameters of the access information;
利用预设的拦截器对所述访问参数进行拦截。The access parameter is intercepted by using a preset interceptor.
详细地,可具有参数提取功能的计算机语句(如Python语句,JAVA语句)提取所述访问信息的访问参数,其中,所述访问信息的访问参数包括统一定位符(url),请求访问的服务信息,访问时长等。In detail, a computer statement (such as a Python statement, a JAVA statement) with a parameter extraction function can extract the access parameters of the access information, wherein the access parameters of the access information include a uniform locator (url), and the service information requested to be accessed , access duration, etc.
具体地,当所述拦截评分大于预设评分阈值时,获取所述访问信息的访问请求,可利用拦截器(Interceptor)对所述访问参数进行拦截,从而对所述访问信息进行拦截。其中,Interceptor拦截器主要完成请求参数的解析、将页面表单参数赋值给栈中相应属性、执行功能检验、程序异常调试等,可以对所述访问参数进行解析,可得知访问参数为非法参数,即利用拦截器对所述访问参数终止请求访问,从而对访问参数进行拦截。Specifically, when the interception score is greater than a preset score threshold, an interceptor (Interceptor) may be used to intercept the access parameter of the access request for obtaining the access information, thereby intercepting the access information. Among them, the Interceptor interceptor mainly completes the analysis of request parameters, assigns page form parameters to corresponding attributes in the stack, performs function inspection, program exception debugging, etc., can analyze the access parameters, and can know that the access parameters are illegal parameters, That is, the interceptor is used to terminate the request access to the access parameter, thereby intercepting the access parameter.
示例性地,当所述访问信息的拦截评分为80分,所述评分阈值为60分,则访问信息的拦截评分大于评分阈值,就需要对此访问信息进行拦截,若访问信息为对业务服务系统的数据库进行访问,则会根据访问信息生成访问请求,即根据访问请求对业务服务系统进行访问,但对数据库的访问的拦截评分大于评分阈值,就需要对数据库的访问进行拦截,即使用过滤器对此访问请求进行拦截,使业务服务系统处于安全状态。Exemplarily, when the interception score of the access information is 80 points, and the scoring threshold is 60 points, then the interception score of the access information is greater than the scoring threshold, and the access information needs to be intercepted. If the access information is for business services When the database of the system is accessed, an access request will be generated according to the access information, that is, the business service system is accessed according to the access request, but the interception score of the database access is greater than the scoring threshold, and the database access needs to be intercepted, that is, the filter The server intercepts this access request, so that the business service system is in a safe state.
本发明实施例中,所述核心信息语义是指能够反映访问信息的关键语义,即能体现所述访问信息的特征信息,可通过访问信息的核心信息语义对要进行拦截的访问信息进行拦截,当出现核心信息语义时,系统就会得到此访问信息是非法信息,不能让其访问信息进行访问,就需要对此访问信息进行拦截。In the embodiment of the present invention, the core information semantics refers to the key semantics that can reflect the access information, that is, can reflect the characteristic information of the access information, and the access information to be intercepted can be intercepted through the core information semantics of the access information, When the core information semantics appears, the system will get that the access information is illegal information, and it cannot allow it to access the access information, so it needs to intercept the access information.
本发明实施例中,所述提取拦截评分大于预设评分阈值的访问信息的核心信息语义与S2中提取所述拦截决策依据的核心决策语义的步骤一致,在此不再赘述。In the embodiment of the present invention, the extraction of the core information semantics of the access information whose interception score is greater than the preset score threshold is consistent with the step of extracting the core decision semantics of the interception decision basis in S2, and will not be repeated here.
S6、利用所述核心信息语义构建第二子决策树集群,并利用所述第二子决策树集群对所述决策树模型进行反馈调整。S6. Construct a second sub-decision tree cluster by using the semantics of the core information, and use the second sub-decision tree cluster to perform feedback adjustment on the decision tree model.
本发明实施例中,所述第二子决策树集群是根据所述核心信息语义构建的多个子决策树的集合,将所述核心信息语义进行分类,得到多个子决策树,汇集多个子决策树得到第二子决策树集群。In the embodiment of the present invention, the second sub-decision tree cluster is a collection of multiple sub-decision trees constructed according to the semantics of the core information, classify the semantics of the core information to obtain multiple sub-decision trees, and assemble multiple sub-decision trees Get the second sub-decision tree cluster.
详细地,所述利用所述核心信息语义构建第二子决策树集群与S3中所述根据所述核心决策语义构建第一子决策树集群的步骤一致,在此不再赘述。In detail, the construction of the second sub-decision tree cluster by using the core information semantics is consistent with the step of constructing the first sub-decision tree cluster according to the core decision semantics in S3, and will not be repeated here.
本发明实施例中,对访问信息进行拦截后,会记录被拦截的访问信息是非法信息,根据提取访问信息的核心语义信息进一步对决策树模型进行反馈调整,使决策树模型能够更准确的预测访问信息的拦截评分,进而更准确的对非法的访问信息进行拦截。In the embodiment of the present invention, after the access information is intercepted, it will be recorded that the intercepted access information is illegal information, and the decision tree model is further adjusted according to the core semantic information of the extracted access information, so that the decision tree model can predict more accurately Intercept scoring of access information, and then more accurately intercept illegal access information.
本发明实施例中,利用所述第二子决策树集群对所述决策树模型进行反馈调整,包括:In the embodiment of the present invention, using the second sub-decision tree cluster to perform feedback adjustment on the decision tree model includes:
计算所述第二子决策树集群中第二决策标注的第二信息增益;calculating a second information gain for a second decision label in the second sub-decision tree cluster;
选取所述第一信息增益和所述第二信息增益中最大的信息增益对应的决策标注为所述决策树模型的第三根节点,在所述第三根节点对应的属性上分裂出属性节点;Select the decision mark corresponding to the largest information gain among the first information gain and the second information gain as the third root node of the decision tree model, and split the attribute node on the attribute corresponding to the third root node ;
利用如下的分裂算法确定所述属性节点的最佳分裂节点:Utilize the following splitting algorithm to determine the optimal splitting node of the attribute node:
其中,为所述最佳分裂节点的增益值,为划分搭配左子树中所有样本的梯度之和,为划分搭配右子树中所有样本的梯度之和,为划分搭配左子树中所有样本的二阶导数之和,为划分搭配右子树中所有样本的二阶导数之和,为正则化常数;in, is the gain value of the best split node, is the sum of the gradients of all samples in the left subtree for the partition collocation, is the sum of the gradients of all samples in the right subtree of the partition collocation, is the sum of the second derivatives of all samples in the left subtree of the partition collocation, is the sum of the second derivatives of all samples in the right subtree of the partition collocation, is a regularization constant;
将所述第一决策标注对应的第一信息增益和所述第二决策标注对应的第二信息增益的最大值分配至所述最佳分裂节点中;Allocating the maximum value of the first information gain corresponding to the first decision label and the second information gain corresponding to the second decision label to the optimal split node;
当所述第一子决策树和所述第二子决策树中有未被选取的决策标注时,对所述决策树模型进行迭代,直到所述决策标注均被选取,完成所述决策树模型的反馈调整。When there are unselected decision labels in the first sub-decision tree and the second sub-decision tree, iterate the decision tree model until all the decision labels are selected, and complete the decision tree model feedback adjustments.
详细地,所述分裂算法针对数据划分前后的增益值最大的算法,根据增益值最大确定最佳分裂点,会依次计算每一个分裂点的增益值,并在最后整合所有的分裂点的增益值最后得到增益值最大的分裂点。In detail, the splitting algorithm aims at the algorithm with the largest gain value before and after data division, determines the best splitting point according to the largest gain value, calculates the gain value of each split point in turn, and finally integrates the gain values of all split points Finally, the split point with the largest gain value is obtained.
具体地,根据核心信息语义的特征属性对核心信息语义进行划分,将核心信息语义划分为2个或多个子信息语义集,并反复会子信息语义集迭代,直到达到决策树生长的停止条件,则到达叶子节点,叶子节点便是分类的结果,叶子节点不再对子信息语义集进行划分。Specifically, the core information semantics is divided according to the characteristic attributes of the core information semantics, and the core information semantics is divided into two or more sub-information semantic sets, and the sub-information semantic sets are iterated repeatedly until the stopping condition of the decision tree growth is reached. Then it reaches the leaf node, which is the result of the classification, and the leaf node no longer divides the sub-information semantic set.
示例性地,当所述第二子决策树集群中包含的子决策树为,所述第一子决策集群中包含的子决策树为,并且每个子决策树都包含自身的属性特征,如子决策树包含自身的属性特征,通过计算和中每个子决策树对应的决策标注,选取最大的决策标注为所述决策树模型的根节点,当对应的决策标注的增益值是所有子决策树中最大值,则选取为所述决策树模型的根节点,中包含自身的属性,则在分裂出的节点中,选取最佳分裂点,将除之外的信息增益最大的子决策树分配至分裂出的节点中,依次将未被选取的子决策树对应决策标注的增益值最大值分配至上一个子决策树分裂的最佳分裂点中,直到所有的子决策树均被选取,就完成所述决策树的反馈调整,根据调整之后的决策树模型能更加准确地预测出访问信息的拦截评分,进而对于访问信息的拦截更加精准,使业务服务系统处于一个安全的环境中。Exemplarily, when the sub-decision trees included in the second sub-decision tree cluster are , the sub-decision tree contained in the first sub-decision cluster is , and each sub-decision tree contains its own attribute features, such as The sub-decision tree contains its own attribute characteristics, calculated by with The decision label corresponding to each sub-decision tree in , select the largest decision label as the root node of the decision tree model, when The gain value of the corresponding decision label is the maximum value in all sub-decision trees, then select is the root node of the decision tree model, Include its own attributes in the Among the split nodes, select the best split point, and divide The sub-decision tree with the largest information gain is assigned to Among the split nodes, the maximum value of the gain value corresponding to the decision label of the unselected sub-decision tree is assigned to the best split point of the previous sub-decision tree in turn, until all the sub-decision trees are selected, and the whole process is completed. According to the feedback adjustment of the above decision tree, according to the adjusted decision tree model, the interception score of access information can be predicted more accurately, and the interception of access information is more accurate, so that the business service system is in a safe environment.
本发明实施例通过业务服务系统的拦截日志,进而根据拦截日志获取拦截决策依据,有利于对信息拦截提供拦截依据,使对目标拦截更准确;提取拦截决策依据中的核心决策语义,根据核心决策语义构建决策树,有利于对业务系统的访问信息进行评分,进而根据评分结果判断是否要拦截访问信息;当拦截评分值大于评分阈值时,对访问信息进行拦截,并提取访问信息的核心信息语义,根据核心信息语义对决策树进行反馈调整,可以得到更准确的决策树模型,可更准确的实现对访问信息的拦截判断,保证了业务服务系统的安全。因此本发明提出的基于大数据分析拦截的拦截反馈处理方法、装置、电子设备及计算机可读存储介质,可以解决进行信息拦截时的准确度较低的问题。The embodiment of the present invention uses the interception log of the business service system, and then obtains the interception decision-making basis according to the interception log, which is beneficial to provide interception basis for information interception, and makes the target interception more accurate; extracts the core decision semantics in the interception decision-making basis, and according to the core decision-making Semantic construction of a decision tree is conducive to scoring the access information of the business system, and then judging whether to intercept the access information according to the scoring result; when the intercept score value is greater than the scoring threshold, intercept the access information and extract the core information semantics of the access information , according to the core information semantics, the decision tree can be adjusted by feedback, and a more accurate decision tree model can be obtained, which can more accurately realize the interception and judgment of access information, and ensure the security of the business service system. Therefore, the interception feedback processing method, device, electronic equipment, and computer-readable storage medium proposed by the present invention based on big data analysis and interception can solve the problem of low accuracy in information interception.
如图4所示,是本发明一实施例提供的基于大数据分析的拦截反馈处理装置的功能模块图。As shown in FIG. 4 , it is a functional block diagram of an interception feedback processing device based on big data analysis provided by an embodiment of the present invention.
本发明所述基于大数据分析的拦截反馈处理装置100可以安装于电子设备中。根据实现的功能,所述基于大数据分析的拦截反馈处理装置100可以包括拦截决策依据获取模块101、核心决策语义提取模块102、决策树模型聚合模块103、拦截评分确定模块104、访问信息拦截模块105及决策树模型反馈调整模块106。本发明所述模块也可以称之为单元,是指一种能够被电子设备处理器所执行,并且能够完成固定功能的一系列计算机程序段,其存储在电子设备的存储器中。The interception
在本实施例中,关于各模块/单元的功能如下:In this embodiment, the functions of each module/unit are as follows:
所述拦截决策依据获取模块101,用于基于由业务服务系统进行目标拦截的拦截日志,获取所述业务服务系统的拦截决策依据;The interception decision-making
所述核心决策语义提取模块102,用于对所述拦截决策依据进行向量转换,得到向量拦截决策依据,根据所述向量拦截决策依据提取所述拦截决策依据的核心决策语义;The core decision
所述决策树模型聚合模块103,用于根据所述核心决策语义构建第一子决策树集群,并将所述第一子决策树集群聚合为决策树模型;The decision tree
所述拦截评分确定模块104,用于实时获取所述业务服务系统的访问主体的访问信息,利用所述决策树模型对所述访问信息进行拦截评分;The interception scoring
所述访问信息拦截模块105,用于对所述拦截评分大于预设评分阈值的访问信息进行拦截,并提取拦截评分大于预设评分阈值的访问信息的核心信息语义;The access
所述决策树模型反馈调整模块106,用于利用所述核心信息语义构建第二子决策树集群,并利用所述第二子决策树集群对所述决策树模型进行反馈调整。The decision tree model
详细地,本发明实施例中所述基于大数据分析的拦截反馈处理装置100中所述的各模块在使用时采用与上述图1至图3中所述的基于大数据分析拦截的拦截反馈处理方法一样的技术手段,并能够产生相同的技术效果,这里不再赘述。In detail, each module described in the interception
如图5所示,是本发明一实施例提供的实现基于大数据分析拦截的拦截反馈处理方法的电子设备的结构示意图。As shown in FIG. 5 , it is a schematic structural diagram of an electronic device implementing an interception feedback processing method based on big data analysis interception provided by an embodiment of the present invention.
所述电子设备1可以包括处理器10、存储器11、通信总线12以及通信接口13,还可以包括存储在所述存储器11中并可在所述处理器10上运行的计算机程序,如基于大数据分析的拦截反馈处理程序。The electronic device 1 may include a
其中,所述处理器10在一些实施例中可以由集成电路组成,例如可以由单个封装的集成电路所组成,也可以是由多个相同功能或不同功能封装的集成电路所组成,包括一个或者多个中央处理器(Central Processing unit,CPU)、微处理器、数字处理芯片、图形处理器及各种控制芯片的组合等。所述处理器10是所述电子设备的控制核心(ControlUnit),利用各种接口和线路连接整个电子设备的各个部件,通过运行或执行存储在所述存储器11内的程序或者模块(例如执行基于大数据分析的拦截反馈处理程序等),以及调用存储在所述存储器11内的数据,以执行电子设备的各种功能和处理数据。Wherein, the
所述存储器11至少包括一种类型的可读存储介质,所述可读存储介质包括闪存、移动硬盘、多媒体卡、卡型存储器(例如:SD或DX存储器等)、磁性存储器、磁盘、光盘等。所述存储器11在一些实施例中可以是电子设备的内部存储单元,例如该电子设备的移动硬盘。所述存储器11在另一些实施例中也可以是电子设备的外部存储设备,例如电子设备上配备的插接式移动硬盘、智能存储卡(Smart Media Card, SMC)、安全数字(Secure Digital,SD)卡、闪存卡(Flash Card)等。进一步地,所述存储器11还可以既包括电子设备的内部存储单元也包括外部存储设备。所述存储器11不仅可以用于存储安装于电子设备的应用软件及各类数据,例如基于大数据分析的拦截反馈处理程序的代码等,还可以用于暂时地存储已经输出或者将要输出的数据。The
所述通信总线12可以是外设部件互连标准(peripheral componentinterconnect,简称PCI)总线或扩展工业标准结构(extended industry standardarchitecture,简称EISA)总线等。该总线可以分为地址总线、数据总线、控制总线等。所述总线被设置为实现所述存储器11以及至少一个处理器10等之间的连接通信。The
所述通信接口13用于上述电子设备与其他设备之间的通信,包括网络接口和用户接口。可选地,所述网络接口可以包括有线接口和/或无线接口(如WI-FI接口、蓝牙接口等),通常用于在该电子设备与其他电子设备之间建立通信连接。所述用户接口可以是显示器(Display)、输入单元(比如键盘(Keyboard)),可选地,用户接口还可以是标准的有线接口、无线接口。可选地,在一些实施例中,显示器可以是LED显示器、液晶显示器、触控式液晶显示器以及OLED(Organic Light-Emitting Diode,有机发光二极管)触摸器等。其中,显示器也可以适当的称为显示屏或显示单元,用于显示在电子设备中处理的信息以及用于显示可视化的用户界面。The
图中仅示出了具有部件的电子设备,本领域技术人员可以理解的是,图中示出的结构并不构成对所述电子设备的限定,可以包括比图示更少或者更多的部件,或者组合某些部件,或者不同的部件布置。The figure only shows an electronic device with components, and those skilled in the art can understand that the structure shown in the figure does not constitute a limitation on the electronic device, and may include fewer or more components than those shown in the figure , or combinations of certain components, or different arrangements of components.
例如,尽管未示出,所述电子设备还可以包括给各个部件供电的电源(比如电池),优选地,电源可以通过电源管理装置与所述至少一个处理器10逻辑相连,从而通过电源管理装置实现充电管理、放电管理、以及功耗管理等功能。电源还可以包括一个或一个以上的直流或交流电源、再充电装置、电源故障检测电路、电源转换器或者逆变器、电源状态指示器等任意组件。所述电子设备还可以包括多种传感器、蓝牙模块、Wi-Fi模块等,在此不再赘述。For example, although not shown, the electronic device may also include a power supply (such as a battery) for supplying power to various components. Preferably, the power supply may be logically connected to the at least one
应该了解,所述实施例仅为说明之用,在专利申请范围上并不受此结构的限制。It should be understood that the embodiments are only for illustration, and are not limited by the structure in terms of the scope of the patent application.
所述电子设备1中的所述存储器11存储的基于大数据分析的拦截反馈处理程序是多个指令的组合,在所述处理器10中运行时,可以实现:The interception feedback processing program based on big data analysis stored in the
基于由业务服务系统进行目标拦截的拦截日志,获取所述业务服务系统的拦截决策依据;Based on the interception log of the target interception by the business service system, the interception decision basis of the business service system is obtained;
对所述拦截决策依据进行向量转换,得到向量拦截决策依据,根据所述向量拦截决策依据提取所述拦截决策依据的核心决策语义;Performing vector conversion on the interception decision basis to obtain the vector interception decision basis, and extracting the core decision semantics of the interception decision basis according to the vector interception decision basis;
根据所述核心决策语义构建第一子决策树集群,并将所述第一子决策树集群聚合为决策树模型;Constructing a first sub-decision tree cluster according to the core decision semantics, and aggregating the first sub-decision tree cluster into a decision tree model;
实时获取所述业务服务系统的访问主体的访问信息,利用所述决策树模型对所述访问信息进行拦截评分;Obtaining the access information of the access subject of the business service system in real time, and using the decision tree model to intercept and score the access information;
对所述拦截评分大于预设评分阈值的访问信息进行拦截,并提取拦截评分大于预设评分阈值的访问信息的核心信息语义;Intercepting the access information whose interception score is greater than the preset scoring threshold, and extracting the core information semantics of the access information whose interception score is greater than the preset scoring threshold;
利用所述核心信息语义构建第二子决策树集群,并利用所述第二子决策树集群对所述决策树模型进行反馈调整。Using the semantics of the core information to construct a second sub-decision tree cluster, and using the second sub-decision tree cluster to perform feedback adjustment on the decision tree model.
具体地,所述处理器10对上述指令的具体实现方法可参考附图对应实施例中相关步骤的描述,在此不赘述。Specifically, for the specific implementation method of the above instructions by the
进一步地,所述电子设备1集成的模块/单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读存储介质中。所述计算机可读存储介质可以是易失性的,也可以是非易失性的。例如,所述计算机可读介质可以包括:能够携带所述计算机程序代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROM,Read-Only Memory)。Further, if the integrated modules/units of the electronic device 1 are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium. The computer-readable storage medium may be volatile or non-volatile. For example, the computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, U disk, removable hard disk, magnetic disk, optical disk, computer memory, read-only memory (ROM, Read-Only Memory).
本发明还提供一种计算机可读存储介质,所述可读存储介质存储有计算机程序,所述计算机程序在被电子设备的处理器所执行时,可以实现:The present invention also provides a computer-readable storage medium, the readable storage medium stores a computer program, and when the computer program is executed by a processor of an electronic device, it can realize:
基于由业务服务系统进行目标拦截的拦截日志,获取所述业务服务系统的拦截决策依据;Based on the interception log of the target interception by the business service system, the interception decision basis of the business service system is obtained;
对所述拦截决策依据进行向量转换,得到向量拦截决策依据,根据所述向量拦截决策依据提取所述拦截决策依据的核心决策语义;Performing vector conversion on the interception decision basis to obtain the vector interception decision basis, and extracting the core decision semantics of the interception decision basis according to the vector interception decision basis;
根据所述核心决策语义构建第一子决策树集群,并将所述第一子决策树集群聚合为决策树模型;Constructing a first sub-decision tree cluster according to the core decision semantics, and aggregating the first sub-decision tree cluster into a decision tree model;
实时获取所述业务服务系统的访问主体的访问信息,利用所述决策树模型对所述访问信息进行拦截评分;Obtaining the access information of the access subject of the business service system in real time, and using the decision tree model to intercept and score the access information;
对所述拦截评分大于预设评分阈值的访问信息进行拦截,并提取拦截评分大于预设评分阈值的访问信息的核心信息语义;Intercepting the access information whose interception score is greater than the preset scoring threshold, and extracting the core information semantics of the access information whose interception score is greater than the preset scoring threshold;
利用所述核心信息语义构建第二子决策树集群,并利用所述第二子决策树集群对所述决策树模型进行反馈调整。Using the semantics of the core information to construct a second sub-decision tree cluster, and using the second sub-decision tree cluster to perform feedback adjustment on the decision tree model.
在本发明所提供的几个实施例中,应该理解到,所揭露的设备,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。In the several embodiments provided by the present invention, it should be understood that the disclosed devices, devices and methods can be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the modules is only a logical function division, and there may be other division methods in actual implementation.
所述作为分离部件说明的模块可以是或者也可以不是物理上分开的,作为模块显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。The modules described as separate components may or may not be physically separated, and the components shown as modules may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
另外,在本发明各个实施例中的各功能模块可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能模块的形式实现。In addition, each functional module in each embodiment of the present invention may be integrated into one processing unit, or each unit may physically exist separately, or two or more units may be integrated into one unit. The above-mentioned integrated units can be implemented in the form of hardware, or in the form of hardware plus software function modules.
对于本领域技术人员而言,显然本发明不限于上述示范性实施例的细节,而且在不背离本发明的精神或基本特征的情况下,能够以其他的具体形式实现本发明。It will be apparent to those skilled in the art that the invention is not limited to the details of the above-described exemplary embodiments, but that the invention can be embodied in other specific forms without departing from the spirit or essential characteristics of the invention.
因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本发明的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本发明内。不应将权利要求中的任何附关联图标记视为限制所涉及的权利要求。Accordingly, the embodiments should be regarded in all points of view as exemplary and not restrictive, the scope of the invention being defined by the appended claims rather than the foregoing description, and it is therefore intended that the scope of the invention be defined by the appended claims rather than by the foregoing description. All changes within the meaning and range of equivalents of the elements are embraced in the present invention. Any reference sign in a claim should not be construed as limiting the claim concerned.
本申请实施例可以基于人工智能技术对相关的数据进行获取和处理。其中,人工智能(Artificial Intelligence,AI)是利用数字计算机或者数字计算机控制的机器模拟、延伸和扩展人的智能,感知环境、获取知识并使用知识获得最佳结果的理论、方法、技术及应用系统。The embodiments of the present application may acquire and process relevant data based on artificial intelligence technology. Among them, artificial intelligence (AI) is a theory, method, technology and application system that uses digital computers or machines controlled by digital computers to simulate, extend and expand human intelligence, perceive the environment, acquire knowledge and use knowledge to obtain the best results. .
此外,显然“包括”一词不排除其他单元或步骤,单数不排除复数。系统权利要求中陈述的多个单元或装置也可以由一个单元或装置通过软件或者硬件来实现。第一、第二等词语用来表示名称,而并不表示任何特定的顺序。In addition, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or devices stated in the system claims may also be realized by one unit or device through software or hardware. The terms first, second, etc. are used to denote names and do not imply any particular order.
最后应说明的是,以上实施例仅用以说明本发明的技术方案而非限制,尽管参照较佳实施例对本发明进行了详细说明,本领域的普通技术人员应当理解,可以对本发明的技术方案进行修改或等同替换,而不脱离本发明技术方案的精神和范围。Finally, it should be noted that the above embodiments are only used to illustrate the technical solutions of the present invention without limitation. Although the present invention has been described in detail with reference to the preferred embodiments, those of ordinary skill in the art should understand that the technical solutions of the present invention can be Modifications or equivalent replacements can be made without departing from the spirit and scope of the technical solutions of the present invention.
Claims (7)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202211093209.8A CN115168848B (en) | 2022-09-08 | 2022-09-08 | Interception feedback processing method based on big data analysis interception |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202211093209.8A CN115168848B (en) | 2022-09-08 | 2022-09-08 | Interception feedback processing method based on big data analysis interception |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN115168848A CN115168848A (en) | 2022-10-11 |
| CN115168848B true CN115168848B (en) | 2022-12-16 |
Family
ID=83482076
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202211093209.8A Active CN115168848B (en) | 2022-09-08 | 2022-09-08 | Interception feedback processing method based on big data analysis interception |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN115168848B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116693163B (en) * | 2023-07-21 | 2023-12-05 | 耀昶嵘相变材料科技(广东)有限公司 | Control method, terminal and system of sludge drying system |
Citations (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107404473A (en) * | 2017-06-06 | 2017-11-28 | 西安电子科技大学 | Based on Mshield machine learning multi-mode Web application means of defences |
| CN108616498A (en) * | 2018-02-24 | 2018-10-02 | 国家计算机网络与信息安全管理中心 | A kind of web access exceptions detection method and device |
| CN108733966A (en) * | 2017-04-14 | 2018-11-02 | 国网重庆市电力公司 | A kind of multidimensional electric energy meter field thermodynamic state verification method based on decision woodlot |
| CN108764273A (en) * | 2018-04-09 | 2018-11-06 | 中国平安人寿保险股份有限公司 | A kind of method, apparatus of data processing, terminal device and storage medium |
| CN109978650A (en) * | 2017-12-28 | 2019-07-05 | 北京京东尚科信息技术有限公司 | Construct the method and system of decision tree |
| CN110311902A (en) * | 2019-06-21 | 2019-10-08 | 北京奇艺世纪科技有限公司 | A kind of recognition methods of abnormal behaviour, device and electronic equipment |
| CN110602137A (en) * | 2019-09-25 | 2019-12-20 | 光通天下网络科技股份有限公司 | Malicious IP and malicious URL intercepting method, device, equipment and medium |
| EP3869374A2 (en) * | 2020-10-30 | 2021-08-25 | Beijing Baidu Netcom Science And Technology Co., Ltd. | Method, apparatus and electronic device for processing user request and storage medium |
| CN113364788A (en) * | 2021-06-11 | 2021-09-07 | 广州洪昇软件和信息技术有限公司 | Protection configuration updating method based on big data and AI and big data defense system |
| CN113468539A (en) * | 2021-06-15 | 2021-10-01 | 江苏大学 | Attack program identification method based on vulnerability attack database and decision tree |
| CN113658002A (en) * | 2021-08-17 | 2021-11-16 | 中国平安财产保险股份有限公司 | Decision tree-based transaction result generation method and device, electronic equipment and medium |
| CN113706322A (en) * | 2021-08-31 | 2021-11-26 | 康键信息技术(深圳)有限公司 | Service distribution method, device, equipment and storage medium based on data analysis |
| WO2021249086A1 (en) * | 2020-06-12 | 2021-12-16 | 深圳前海微众银行股份有限公司 | Multi-party joint decision tree construction method, device and readable storage medium |
| CN114117079A (en) * | 2021-12-07 | 2022-03-01 | 宁安市伟恒互联网信息服务有限公司 | Interception feedback processing method and information interception system based on big data analysis interception |
| CN114462625A (en) * | 2022-02-25 | 2022-05-10 | 北京百度网讯科技有限公司 | Method, device, electronic device and program product for generating decision tree |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8966074B1 (en) * | 2013-09-13 | 2015-02-24 | Network Kinetix, LLC | System and method for real-time analysis of network traffic |
| US9565203B2 (en) * | 2014-11-13 | 2017-02-07 | Cyber-Ark Software Ltd. | Systems and methods for detection of anomalous network behavior |
-
2022
- 2022-09-08 CN CN202211093209.8A patent/CN115168848B/en active Active
Patent Citations (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108733966A (en) * | 2017-04-14 | 2018-11-02 | 国网重庆市电力公司 | A kind of multidimensional electric energy meter field thermodynamic state verification method based on decision woodlot |
| CN107404473A (en) * | 2017-06-06 | 2017-11-28 | 西安电子科技大学 | Based on Mshield machine learning multi-mode Web application means of defences |
| CN109978650A (en) * | 2017-12-28 | 2019-07-05 | 北京京东尚科信息技术有限公司 | Construct the method and system of decision tree |
| CN108616498A (en) * | 2018-02-24 | 2018-10-02 | 国家计算机网络与信息安全管理中心 | A kind of web access exceptions detection method and device |
| CN108764273A (en) * | 2018-04-09 | 2018-11-06 | 中国平安人寿保险股份有限公司 | A kind of method, apparatus of data processing, terminal device and storage medium |
| CN110311902A (en) * | 2019-06-21 | 2019-10-08 | 北京奇艺世纪科技有限公司 | A kind of recognition methods of abnormal behaviour, device and electronic equipment |
| CN110602137A (en) * | 2019-09-25 | 2019-12-20 | 光通天下网络科技股份有限公司 | Malicious IP and malicious URL intercepting method, device, equipment and medium |
| WO2021249086A1 (en) * | 2020-06-12 | 2021-12-16 | 深圳前海微众银行股份有限公司 | Multi-party joint decision tree construction method, device and readable storage medium |
| EP3869374A2 (en) * | 2020-10-30 | 2021-08-25 | Beijing Baidu Netcom Science And Technology Co., Ltd. | Method, apparatus and electronic device for processing user request and storage medium |
| CN113364788A (en) * | 2021-06-11 | 2021-09-07 | 广州洪昇软件和信息技术有限公司 | Protection configuration updating method based on big data and AI and big data defense system |
| CN113468539A (en) * | 2021-06-15 | 2021-10-01 | 江苏大学 | Attack program identification method based on vulnerability attack database and decision tree |
| CN113658002A (en) * | 2021-08-17 | 2021-11-16 | 中国平安财产保险股份有限公司 | Decision tree-based transaction result generation method and device, electronic equipment and medium |
| CN113706322A (en) * | 2021-08-31 | 2021-11-26 | 康键信息技术(深圳)有限公司 | Service distribution method, device, equipment and storage medium based on data analysis |
| CN114117079A (en) * | 2021-12-07 | 2022-03-01 | 宁安市伟恒互联网信息服务有限公司 | Interception feedback processing method and information interception system based on big data analysis interception |
| CN114462625A (en) * | 2022-02-25 | 2022-05-10 | 北京百度网讯科技有限公司 | Method, device, electronic device and program product for generating decision tree |
Non-Patent Citations (3)
| Title |
|---|
| Closed-Loop Restoration Approach to Blurry Images Based on Machine Learning and Feedback Optimization;Saqib Yousaf 等;《 IEEE Transactions on Image Processing》;20151019;第24卷(第12期);5928-5941 * |
| 基于决策属性挑选策略的改进的决策树算法;周艳等;《沈阳师范大学学报(自然科学版)》;20110115;第29卷(第01期);66-70 * |
| 自适应软件的策略自动生成与演化;林华山 等;《计算机科学》;20171130;第44卷(第11期);9-14 * |
Also Published As
| Publication number | Publication date |
|---|---|
| CN115168848A (en) | 2022-10-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11190562B2 (en) | Generic event stream processing for machine learning | |
| US10089384B2 (en) | Machine learning-derived universal connector | |
| US20170109657A1 (en) | Machine Learning-Based Model for Identifying Executions of a Business Process | |
| CN110855648B (en) | Early warning control method and device for network attack | |
| US11042581B2 (en) | Unstructured data clustering of information technology service delivery actions | |
| US20170109676A1 (en) | Generation of Candidate Sequences Using Links Between Nonconsecutively Performed Steps of a Business Process | |
| US20170109667A1 (en) | Automaton-Based Identification of Executions of a Business Process | |
| US20170109668A1 (en) | Model for Linking Between Nonconsecutively Performed Steps in a Business Process | |
| US20170109636A1 (en) | Crowd-Based Model for Identifying Executions of a Business Process | |
| CN112732567B (en) | Mock data testing method and device based on ip, electronic equipment and storage medium | |
| US20170109639A1 (en) | General Model for Linking Between Nonconsecutively Performed Steps in Business Processes | |
| US20210150631A1 (en) | Machine learning approach to automatically disambiguate ambiguous electronic transaction labels | |
| US20170109638A1 (en) | Ensemble-Based Identification of Executions of a Business Process | |
| CN114756669A (en) | Intelligent analysis method and device for problem intention, electronic equipment and storage medium | |
| CN114844792A (en) | Dynamic monitoring method, device, equipment and storage medium based on LUA language | |
| US20170109640A1 (en) | Generation of Candidate Sequences Using Crowd-Based Seeds of Commonly-Performed Steps of a Business Process | |
| CN115168848B (en) | Interception feedback processing method based on big data analysis interception | |
| CN110572402B (en) | Internet hosting website detection method and system based on network access behavior analysis and readable storage medium | |
| US20170109637A1 (en) | Crowd-Based Model for Identifying Nonconsecutive Executions of a Business Process | |
| CN114610980A (en) | Network public opinion based black product identification method, device, equipment and storage medium | |
| US20170109670A1 (en) | Crowd-Based Patterns for Identifying Executions of Business Processes | |
| CN114518993A (en) | System performance monitoring method, device, equipment and medium based on business characteristics | |
| CN116155628A (en) | Network security detection method, training device, electronic equipment and medium | |
| CN115237941A (en) | Data reporting method and device, electronic equipment and computer readable storage medium | |
| CN114625755A (en) | Script checking method and device, electronic equipment and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: Intercept feedback processing method based on big data analysis interception Granted publication date: 20221216 Pledgee: Bank of Beijing Limited by Share Ltd. Nanjing branch Pledgor: Nanjing Dingshan Information Technology Co.,Ltd. Registration number: Y2025980004736 |
|
| PE01 | Entry into force of the registration of the contract for pledge of patent right |