[go: up one dir, main page]

CN115168848B - Interception feedback processing method based on big data analysis interception - Google Patents

Interception feedback processing method based on big data analysis interception Download PDF

Info

Publication number
CN115168848B
CN115168848B CN202211093209.8A CN202211093209A CN115168848B CN 115168848 B CN115168848 B CN 115168848B CN 202211093209 A CN202211093209 A CN 202211093209A CN 115168848 B CN115168848 B CN 115168848B
Authority
CN
China
Prior art keywords
decision
interception
decision tree
sub
semantics
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211093209.8A
Other languages
Chinese (zh)
Other versions
CN115168848A (en
Inventor
周江锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Dingshan Information Technology Co ltd
Original Assignee
Nanjing Dingshan Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Dingshan Information Technology Co ltd filed Critical Nanjing Dingshan Information Technology Co ltd
Priority to CN202211093209.8A priority Critical patent/CN115168848B/en
Publication of CN115168848A publication Critical patent/CN115168848A/en
Application granted granted Critical
Publication of CN115168848B publication Critical patent/CN115168848B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to an artificial intelligence technology, and discloses an interception feedback processing method based on big data analysis interception, which comprises the following steps: acquiring an interception decision basis based on an interception log of a business service system; extracting core decision semantics of an interception decision basis according to the vector interception decision basis; constructing a first sub-decision tree cluster according to the core decision semantics, and aggregating the first sub-decision tree cluster into a decision tree model; acquiring access information in real time, and performing interception scoring on the access information by using a decision tree model; intercepting the access information with the interception score larger than the score threshold, and extracting the core information semantics of the access information with the interception score larger than the score threshold; and constructing a second sub-decision tree cluster by utilizing the core information semantics, and performing feedback adjustment on the decision tree model by utilizing the second sub-decision tree cluster. The invention also provides an interception feedback processing device based on big data analysis, electronic equipment and a storage medium. The invention can improve the information interception accuracy.

Description

基于大数据分析拦截的拦截反馈处理方法Interception feedback processing method based on big data analysis interception

技术领域technical field

本发明涉及人工智能技术领域,尤其涉及一种基于大数据分析拦截的拦截反馈处理方法、装置、电子设备及计算机可读存储介质。The present invention relates to the technical field of artificial intelligence, in particular to an interception feedback processing method, device, electronic equipment and computer-readable storage medium based on big data analysis and interception.

背景技术Background technique

随着大数据时代的到来,大数据所涉及的领域越来越广泛,但为了大数据所处的网络环境具有安全性,提高网络安全的可靠性,需要对网络中的非法信息进行拦截,以保证网络安全。With the advent of the era of big data, the fields involved in big data are becoming more and more extensive. However, in order to ensure the security of the network environment where big data resides and improve the reliability of network security, it is necessary to intercept illegal information in the network to Ensure network security.

现有的信息拦截技术多为基于防火墙对信息进行拦截,例如,需要拦截的访问活动,包括攻击访问活动,隐私访问活动等。实际应用中,并不是每次的拦截决策都是满足实际业务场景需求的,仅考虑固定的拦截决策,可能导致不能对信息进行及时拦截,从而对进行信息拦截时的准确度较低。Existing information interception technologies mostly intercept information based on firewalls, for example, access activities that need to be intercepted, including attack access activities, privacy access activities, and the like. In practical applications, not every interception decision meets the needs of actual business scenarios. Only considering fixed interception decisions may lead to failure to intercept information in time, resulting in low accuracy when intercepting information.

发明内容Contents of the invention

本发明提供一种基于大数据分析拦截的拦截反馈处理方法、装置及计算机可读存储介质,其主要目的在于解决进行信息拦截时的准确度较低的问题。The present invention provides an interception feedback processing method, device and computer-readable storage medium based on big data analysis interception, the main purpose of which is to solve the problem of low accuracy in information interception.

为实现上述目的,本发明提供的一种基于大数据分析拦截的拦截反馈处理方法,包括:In order to achieve the above object, the present invention provides an interception feedback processing method based on big data analysis interception, including:

S1、基于由业务服务系统进行目标拦截的拦截日志,获取所述业务服务系统的拦截决策依据;S1. Obtain the interception decision basis of the business service system based on the interception log of the target interception by the business service system;

S2、对所述拦截决策依据进行向量转换,得到向量拦截决策依据,根据所述向量拦截决策依据提取所述拦截决策依据的核心决策语义;S2. Perform vector conversion on the interception decision basis to obtain a vector interception decision basis, and extract core decision semantics of the interception decision basis according to the vector interception decision basis;

S3、根据所述核心决策语义构建第一子决策树集群,并将所述第一子决策树集群聚合为决策树模型;S3. Construct a first sub-decision tree cluster according to the core decision semantics, and aggregate the first sub-decision tree cluster into a decision tree model;

S4、实时获取所述业务服务系统的访问主体的访问信息,利用所述决策树模型对所述访问信息进行拦截评分,其中所述利用所述决策树模型对所述访问信息进行拦截评分,包括:S4. Obtain the access information of the access subject of the business service system in real time, and use the decision tree model to intercept and score the access information, wherein the use of the decision tree model to intercept and score the access information includes: :

S41、将预获取的训练数据集输入至所述决策树模型中,得到得分数据集;S41. Input the pre-acquired training data set into the decision tree model to obtain a score data set;

S42、根据所述得分数据集和预设的损失函数计算所述决策树模型的损失值,其中所述预设的损失函数包括:S42. Calculate the loss value of the decision tree model according to the score data set and a preset loss function, wherein the preset loss function includes:

Figure 313683DEST_PATH_IMAGE001
Figure 313683DEST_PATH_IMAGE001

其中,

Figure 637086DEST_PATH_IMAGE002
为损失值,
Figure 398369DEST_PATH_IMAGE003
为所述得分数据集中的得分数据,
Figure 583363DEST_PATH_IMAGE004
为预设的真实得分数据,
Figure 543228DEST_PATH_IMAGE005
为决策树的棵数,
Figure 398052DEST_PATH_IMAGE006
为反余弦函数,
Figure 708947DEST_PATH_IMAGE007
为对数函数;in,
Figure 637086DEST_PATH_IMAGE002
is the loss value,
Figure 398369DEST_PATH_IMAGE003
is the score data in the score dataset,
Figure 583363DEST_PATH_IMAGE004
is the preset real score data,
Figure 543228DEST_PATH_IMAGE005
is the number of decision trees,
Figure 398052DEST_PATH_IMAGE006
is the inverse cosine function,
Figure 708947DEST_PATH_IMAGE007
is a logarithmic function;

S43、当所述损失值大于或等于预设的损失阈值时,对所述决策树模型进行决策树添加处理操作,直到所述损失值小于所述损失阈值时,输出当前的决策树模型为拦截评分模型;S43. When the loss value is greater than or equal to the preset loss threshold, perform a decision tree addition processing operation on the decision tree model until the loss value is less than the loss threshold, output the current decision tree model as intercept scoring model;

S44、将所述访问信息输入至所述拦截评分模型中,得到所述访问信息的拦截评分;S44. Input the access information into the intercept scoring model to obtain the intercept score of the access information;

S5、对所述拦截评分大于预设评分阈值的访问信息进行拦截,并提取拦截评分大于预设评分阈值的访问信息的核心信息语义;S5. Intercept the access information whose interception score is greater than the preset scoring threshold, and extract the core information semantics of the access information whose interception score is greater than the preset scoring threshold;

S6、利用所述核心信息语义构建第二子决策树集群,并利用所述第二子决策树集群对所述决策树模型进行反馈调整。S6. Construct a second sub-decision tree cluster by using the semantics of the core information, and use the second sub-decision tree cluster to perform feedback adjustment on the decision tree model.

可选地,所述获取所述业务服务系统的拦截决策依据,包括:Optionally, the acquisition of the interception decision basis of the business service system includes:

提取所述拦截日志中的拦截参数;extracting interception parameters in the interception log;

根据所述拦截参数生成所述业务服务系统的拦截决策依据。An interception decision basis of the business service system is generated according to the interception parameters.

可选地,所述根据所述向量拦截决策依据提取所述拦截决策依据的核心决策语义,包括:Optionally, the extracting the core decision semantics of the interception decision basis according to the vector interception decision basis includes:

利用预设的Bert模型提取所述向量拦截决策依据中每个决策词向量的第一注意力权重;Utilize the preset Bert model to extract the first attention weight of each decision word vector in the vector intercept decision basis;

根据每个决策词向量的位置编码将相同决策词向量的所述第一注意力权重进行相加,得到第二注意力权重;According to the position coding of each decision word vector, the first attention weight of the same decision word vector is added to obtain the second attention weight;

选取第二注意力权重最高的决策词向量为核心决策语义。Select the decision word vector with the highest second attention weight as the core decision semantics.

可选地,所述根据所述核心决策语义构建第一子决策树集群,包括:Optionally, the constructing the first sub-decision tree cluster according to the core decision semantics includes:

对所述核心决策语义进行分类标注,得到所述核心决策语义对应的决策标注;Classifying and labeling the core decision semantics to obtain the decision label corresponding to the core decision semantics;

逐一选取所述决策标注作为第一根节点,在所述第一根节点上分裂第一左节点和第一右节点;Selecting the decision labels one by one as the first root node, splitting the first left node and the first right node on the first root node;

将所述核心决策语义分配至所述第一左节点和所述第一右节点,得到子决策树;assigning the core decision semantics to the first left node and the first right node to obtain a sub-decision tree;

汇集所述子决策树为所述第一子决策树集群。Aggregating the sub-decision trees into the first cluster of sub-decision trees.

可选地,所述将所述第一子决策树集群聚合为决策树模型,包括:Optionally, the aggregating the first sub-decision tree cluster into a decision tree model includes:

利用如下的信息增益算法计算所述第一子决策树集群中子决策树根节点对应决策标注的第一信息增益:Using the following information gain algorithm to calculate the first information gain corresponding to the decision label of the sub-decision tree root node in the first sub-decision tree cluster:

Figure 182785DEST_PATH_IMAGE008
Figure 182785DEST_PATH_IMAGE008

其中,

Figure 200420DEST_PATH_IMAGE009
为所述第一信息增益,
Figure 881937DEST_PATH_IMAGE010
为第
Figure 414549DEST_PATH_IMAGE011
类决策标注所占的比例,
Figure 816712DEST_PATH_IMAGE012
为对数函数,
Figure 62754DEST_PATH_IMAGE013
为所述核心决策语义的决策语义样本数量,
Figure 587277DEST_PATH_IMAGE014
为第
Figure 544868DEST_PATH_IMAGE011
类决策标注中决策语义样本数量,
Figure 547459DEST_PATH_IMAGE015
为所述决策标注对应属性的数量;in,
Figure 200420DEST_PATH_IMAGE009
is the first information gain,
Figure 881937DEST_PATH_IMAGE010
for the first
Figure 414549DEST_PATH_IMAGE011
The proportion of class decision labels,
Figure 816712DEST_PATH_IMAGE012
is a logarithmic function,
Figure 62754DEST_PATH_IMAGE013
is the number of decision semantic samples of the core decision semantics,
Figure 587277DEST_PATH_IMAGE014
for the first
Figure 544868DEST_PATH_IMAGE011
The number of decision semantic samples in class decision annotation,
Figure 547459DEST_PATH_IMAGE015
Annotate the number of attributes corresponding to the decision;

选取所述第一信息增益最大的第一决策标注作为所述决策树模型的第二根节点,在所述第一决策标注对应的属性上分裂出第一左节点和第二右节点;Selecting the first decision label with the largest first information gain as the second root node of the decision tree model, splitting the first left node and the second right node on the attribute corresponding to the first decision label;

逐一在未被选取的决策标注中选取所述第一信息增益最大的第二决策标注分配至所述第一左节点和所述第二右节点中;Selecting the second decision label with the largest information gain from the unselected decision labels one by one and assigning them to the first left node and the second right node;

当所述决策标注均被选取,得到所述决策树模型。When the decision labels are all selected, the decision tree model is obtained.

可选地,所述对所述拦截评分大于预设评分阈值的访问信息进行拦截,包括:Optionally, the intercepting the access information whose interception score is greater than a preset score threshold includes:

提取所述访问信息的访问参数;Extracting access parameters of the access information;

利用预设的拦截器对所述访问参数进行拦截。The access parameter is intercepted by using a preset interceptor.

可选地,利用所述第二子决策树集群对所述决策树模型进行反馈调整,包括:Optionally, using the second sub-decision tree cluster to perform feedback adjustment on the decision tree model includes:

计算所述第二子决策树集群中第二决策标注的第二信息增益;calculating a second information gain for a second decision label in the second sub-decision tree cluster;

选取所述第一信息增益和所述第二信息增益中最大的信息增益对应的决策标注为所述决策树模型的第三根节点,在所述第三根节点对应的属性上分裂出属性节点;Select the decision label corresponding to the largest information gain among the first information gain and the second information gain as the third root node of the decision tree model, and split the attribute node on the attribute corresponding to the third root node ;

利用如下的分裂算法确定所述属性节点的最佳分裂节点:Utilize the following splitting algorithm to determine the optimal splitting node of the attribute node:

Figure 398741DEST_PATH_IMAGE016
Figure 398741DEST_PATH_IMAGE016

其中,

Figure 94164DEST_PATH_IMAGE017
为所述最佳分裂节点的增益值,
Figure 273473DEST_PATH_IMAGE018
为划分搭配左子树中所有样本的梯度之和,
Figure 79755DEST_PATH_IMAGE019
为划分搭配右子树中所有样本的梯度之和,
Figure 801854DEST_PATH_IMAGE020
为划分搭配左子树中所有样本的二阶导数之和,
Figure 402600DEST_PATH_IMAGE021
为划分搭配右子树中所有样本的二阶导数之和,
Figure 334784DEST_PATH_IMAGE022
为正则化常数;in,
Figure 94164DEST_PATH_IMAGE017
is the gain value of the best split node,
Figure 273473DEST_PATH_IMAGE018
is the sum of the gradients of all samples in the left subtree for the partition collocation,
Figure 79755DEST_PATH_IMAGE019
is the sum of the gradients of all samples in the right subtree of the partition collocation,
Figure 801854DEST_PATH_IMAGE020
is the sum of the second derivatives of all samples in the left subtree of the partition collocation,
Figure 402600DEST_PATH_IMAGE021
is the sum of the second derivatives of all samples in the right subtree of the partition collocation,
Figure 334784DEST_PATH_IMAGE022
is a regularization constant;

将所述第一决策标注对应的第一信息增益和所述第二决策标注对应的第二信息增益的最大值分配至所述最佳分裂节点中;Allocating the maximum value of the first information gain corresponding to the first decision label and the second information gain corresponding to the second decision label to the optimal split node;

当所述第一子决策树和所述第二子决策树中有未被选取的决策标注时,对所述决策树模型进行迭代,直到所述决策标注均被选取,完成所述决策树模型的反馈调整。When there are unselected decision labels in the first sub-decision tree and the second sub-decision tree, iterate the decision tree model until all the decision labels are selected, and complete the decision tree model feedback adjustments.

本发明实施例通过业务服务系统的拦截日志,进而根据拦截日志获取拦截决策依据,有利于对信息拦截提供拦截依据,使对目标拦截更准确;提取拦截决策依据中的核心决策语义,根据核心决策语义构建决策树,有利于对业务系统的访问信息进行评分,进而根据评分结果判断是否要拦截访问信息;当拦截评分值大于评分阈值时,对访问信息进行拦截,并提取访问信息的核心信息语义,根据核心信息语义对决策树进行反馈调整,可以得到更准确的决策树模型,可更准确的实现对访问信息的拦截判断,保证了业务服务系统的安全。因此本发明提出的基于大数据分析拦截的拦截反馈处理方法、装置、电子设备及计算机可读存储介质,可以解决进行信息拦截时的准确度较低的问题。The embodiment of the present invention uses the interception log of the business service system, and then obtains the interception decision-making basis according to the interception log, which is beneficial to provide interception basis for information interception, and makes the target interception more accurate; extracts the core decision semantics in the interception decision-making basis, and according to the core decision-making Semantic construction of a decision tree is conducive to scoring the access information of the business system, and then judging whether to intercept the access information according to the scoring result; when the intercept score value is greater than the scoring threshold, intercept the access information and extract the core information semantics of the access information , according to the core information semantics, the decision tree can be adjusted by feedback, and a more accurate decision tree model can be obtained, which can more accurately realize the interception and judgment of access information, and ensure the security of the business service system. Therefore, the interception feedback processing method, device, electronic equipment, and computer-readable storage medium proposed by the present invention based on big data analysis and interception can solve the problem of low accuracy in information interception.

附图说明Description of drawings

图1为本发明一实施例提供的基于大数据分析拦截的拦截反馈处理方法的流程示意图;FIG. 1 is a schematic flow diagram of an interception feedback processing method based on big data analysis interception provided by an embodiment of the present invention;

图2为本发明一实施例提供的提取核心决策语义的流程示意图;FIG. 2 is a schematic flow diagram of extracting core decision semantics provided by an embodiment of the present invention;

图3为本发明一实施例提供的构建第一子决策树集群的流程示意图;Fig. 3 is a schematic flow chart of constructing the first sub-decision tree cluster provided by an embodiment of the present invention;

图4为本发明一实施例提供的基于大数据分析的拦截反馈处理装置的功能模块图;FIG. 4 is a functional block diagram of an interception feedback processing device based on big data analysis provided by an embodiment of the present invention;

图5为本发明一实施例提供的实现所述基于大数据分析拦截的拦截反馈处理方法的电子设备的结构示意图。FIG. 5 is a schematic structural diagram of an electronic device implementing the interception feedback processing method based on big data analysis interception provided by an embodiment of the present invention.

本发明目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。The realization of the purpose of the present invention, functional characteristics and advantages will be further described in conjunction with the embodiments and with reference to the accompanying drawings.

具体实施方式detailed description

应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

本申请实施例提供一种基于大数据分析拦截的拦截反馈处理方法。所述基于大数据分析拦截的拦截反馈处理方法的执行主体包括但不限于服务端、终端等能够被配置为执行本申请实施例提供的该方法的电子设备中的至少一种。换言之,所述基于大数据分析拦截的拦截反馈处理方法可以由安装在终端设备或服务端设备的软件或硬件来执行,所述软件可以是区块链平台。所述服务端包括但不限于:单台服务器、服务器集群、云端服务器或云端服务器集群等。所述服务器可以是独立的服务器,也可以是提供云服务、云数据库、云计算、云函数、云存储、网络服务、云通信、中间件服务、域名服务、安全服务、内容分发网络(Content Delivery Network,CDN)、以及大数据和人工智能平台等基础云计算服务的云服务器。An embodiment of the present application provides an interception feedback processing method based on big data analysis interception. The subject of execution of the interception feedback processing method based on big data analysis interception includes but is not limited to at least one of electronic devices such as a server end and a terminal that can be configured to execute the method provided by the embodiment of the present application. In other words, the interception feedback processing method based on big data analysis interception can be executed by software or hardware installed on the terminal device or server device, and the software can be a block chain platform. The server includes, but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like. The server can be an independent server, or it can provide cloud service, cloud database, cloud computing, cloud function, cloud storage, network service, cloud communication, middleware service, domain name service, security service, content distribution network (Content Delivery Network) Network, CDN), and cloud servers for basic cloud computing services such as big data and artificial intelligence platforms.

参照图1所示,为本发明一实施例提供的基于大数据分析拦截的拦截反馈处理方法的流程示意图。在本实施例中,所述基于大数据分析拦截的拦截反馈处理方法包括:Referring to FIG. 1 , it is a schematic flowchart of an interception feedback processing method based on big data analysis interception provided by an embodiment of the present invention. In this embodiment, the interception feedback processing method based on big data analysis interception includes:

S1、基于由业务服务系统进行目标拦截的拦截日志,获取所述业务服务系统的拦截决策依据;S1. Obtain the interception decision basis of the business service system based on the interception log of the target interception by the business service system;

本发明其中一个实际应用场景中,在业务服务系统中都会有非法访问请求,为了保证业务服务系统的安全,就需要对非法访问请求进行拦截,如若存在访问请求的参数包含有预设密码文件的文件名,表示该请求参数为异常数据,就需要对此访问请求进行拦截,并将对目标进行拦截所获得的访问请求记录在拦截日志中,在下一次出现同样情况的时候根据拦截的请求参数直接会该访问请求进行拦截。In one of the actual application scenarios of the present invention, there will be illegal access requests in the business service system. In order to ensure the security of the business service system, it is necessary to intercept the illegal access requests. If the parameters of the access requests contain preset password files The name of the file, indicating that the request parameter is abnormal data, it is necessary to intercept the access request, and record the access request obtained by intercepting the target in the interception log. When the same situation occurs next time, the intercepted request parameter will be directly The access request will be intercepted.

本发明实施例中,所述拦截日志是当业务服务系统存在访问异常,将该访问请求进行目标拦截后记录与系统日志中,以得到拦截日志。In the embodiment of the present invention, the interception log is when there is an access exception in the business service system, the access request is intercepted by the target and recorded in the system log to obtain the interception log.

本发明实施例中,所述获取所述业务服务系统的拦截决策依据,包括:In the embodiment of the present invention, the acquisition of the interception decision-making basis of the business service system includes:

提取所述拦截日志中的拦截参数;extracting interception parameters in the interception log;

根据所述拦截参数生成所述业务服务系统的拦截决策依据。An interception decision basis of the business service system is generated according to the interception parameters.

详细地,可利用脚本代码提取拦截日志中的拦截参数,则拦截参数就是与进行攻击事件关联的攻击参数,其中,脚本代码为运维人员针对漏洞风险拦截规则所预先编写的自动化代码逻辑。In detail, script codes can be used to extract the interception parameters in the interception log, and the interception parameters are the attack parameters associated with the attack event, wherein the script code is the automated code logic pre-written by the operation and maintenance personnel for the vulnerability risk interception rules.

具体地,拦截日志中的拦截参数包括请求访问业务服务系统的内部业务系统的地址信息及请求访问实现业务服务系统的系统功能信息等。例如请求访问实现业务服务系统的系统功能信息可以是读取任一客户银存款的存款金额等以及请求查询存款记录等。Specifically, the interception parameters in the interception log include the address information of the internal business system that requests access to the business service system and the system function information that requests access to the business service system. For example, the request to access the system function information of the business service system may be to read the deposit amount of any customer's bank deposit and request to inquire about the deposit record.

进一步地,根据所述拦截参数生成所述业务服务系统的拦截决策依据,即当请求访问的访问参数与拦截日志中的拦截参数一致时,就会对该访问请求进行拦截,若在后续有访问请求对业务服务系统进行访问,就会依据所述拦截决策依据对该访问请求的访问参数与拦截日志中的拦截参数进行匹配,若匹配成功则表明该访问请求为非法访问,就需要对访问请求进行拦截。Further, the interception decision-making basis of the business service system is generated according to the interception parameters, that is, when the access parameters of the requested access are consistent with the interception parameters in the interception log, the access request will be intercepted. When requesting access to the business service system, the access parameters of the access request will be matched with the interception parameters in the interception log according to the interception decision basis. If the match is successful, it indicates that the access request is an illegal access, and the access request needs to be to intercept.

示例性地,若拦截日志中的第一拦截参数为包含业务服务系统的系统安全配置文件的存储路径的地址信息,则就会把所述第一拦截参数作为一个拦截决策依据;若拦截日志中的第二拦截参数为与敏感字词关联的正则表达式,则会把所述第二拦截参数也会作为一个拦截决策依据,根据拦截决策数据对后续请求访问的访问参数做出判断,进而根据判断结果决定是否对访问参数进行拦截。Exemplarily, if the first interception parameter in the interception log is the address information containing the storage path of the system security configuration file of the business service system, then the first interception parameter will be used as a basis for interception decision; if the interception log in If the second interception parameter is a regular expression associated with sensitive words, the second interception parameter will also be used as a basis for interception decisions, and the access parameters for subsequent requests will be judged based on the interception decision data, and then based on The judgment result determines whether to intercept the access parameters.

S2、对所述拦截决策依据进行向量转换,得到向量拦截决策依据,根据所述向量拦截决策依据提取所述拦截决策依据的核心决策语义;S2. Perform vector conversion on the interception decision basis to obtain a vector interception decision basis, and extract core decision semantics of the interception decision basis according to the vector interception decision basis;

本发明实施例中,所述向量拦截决策依据是对所述拦截决策进行向量化,使所述向量拦截决策依据作为Bert模型的输入,用于经过Bert模型提取所述拦截决策依据的核心决策语义。In the embodiment of the present invention, the vector interception decision-making basis is to vectorize the interception decision-making, so that the vector interception decision-making basis is used as the input of the Bert model, and is used to extract the core decision semantics of the interception decision-making basis through the Bert model .

详细地,本发明实施例中,可通过预设的向量转换模型对所述拦截决策依据进行向量转换,得到向量拦截决策依据,所述向量转换模型是Bert模型。其中Bert模型中引入位置编码(position encoding)来描述序列位置信息,对于序列中的每一个元素给定一个随机初始化词向量,以记录元素在该序列中的位置信息。In detail, in the embodiment of the present invention, the interception decision-making basis may be vector-transformed through a preset vector-transformation model to obtain the vector-intercepting decision-making basis, and the vector transformation model is a Bert model. Among them, the Bert model introduces position encoding (position encoding) to describe the position information of the sequence, and a random initialization word vector is given for each element in the sequence to record the position information of the element in the sequence.

本发明实施例中,所述核心决策语义是指能够反映拦截决策依据的关键语义,即能体现所述拦截决策依据的特征信息。In the embodiment of the present invention, the core decision semantics refers to the key semantics that can reflect the basis of the interception decision, that is, feature information that can reflect the basis of the interception decision.

本发明实施例中,参图2所示,所述根据所述向量拦截决策依据提取所述拦截决策依据的核心决策语义,包括:In the embodiment of the present invention, as shown in FIG. 2, the core decision semantics of the interception decision-making basis extracted according to the vector interception decision-making basis include:

S21、利用预设的Bert模型提取所述向量拦截决策依据中每个决策词向量的第一注意力权重;S21. Using the preset Bert model to extract the first attention weight of each decision word vector in the vector intercept decision basis;

S22、根据每个决策词向量的位置编码将相同决策词向量的所述第一注意力权重进行相加,得到第二注意力权重;S22. Add the first attention weights of the same decision word vector according to the position code of each decision word vector to obtain a second attention weight;

S23、选取第二注意力权重最高的决策词向量为核心决策语义。S23. Select the decision word vector with the highest second attention weight as the core decision semantics.

详细地,在Bert模型中每个对所述拦截决策依据进行向量转换,且每个决策词向量都具有注意力权重,根据Bert模型中的最后一层编码器生成所述决策词向量的注意力权重。在Bert模型中具有注意力机制(self-Attention),注意力机制的核心逻辑是从关注整体到关注重点,当面对一个场景时,往往会根据需要观察注意特定的一部分,Bert模型使用自注意力机制关注自身序列的表达。In detail, in the Bert model, each vector conversion is performed on the interception decision basis, and each decision word vector has an attention weight, and the attention of the decision word vector is generated according to the last layer of encoder in the Bert model Weights. There is an attention mechanism (self-Attention) in the Bert model. The core logic of the attention mechanism is from focusing on the whole to focusing on the focus. When facing a scene, it often observes and pays attention to a specific part as needed. The Bert model uses self-attention The force mechanism is concerned with the expression of its own sequence.

具体地,在BERT模型不同层编码其生成的文档编码表示中,最后一层编码器输出的向量化表示相对其他层编码器输出具备更高层次的语义、语法等信息,因而最后一层编码器生成的词向量注意力权重矩阵相对其他层更符合语义上的相似度。由于BERT模型中的自注意力机制使用了多头注意力方法,每个头都会生成一个注意力权重矩阵,因此最后一层编码器会生成多个注意力权重矩阵,每个注意力权重矩阵代表对应头捕获的词向量之间相似度,从每个头对应的注意力权重矩阵中抽取“[CLS]”标记对应的行,该行代表该头捕捉到的“[CLS]”标记对文档中所有位置上的词向量的注意力权重。Specifically, in the document encoding representations generated by different layers of the BERT model, the vectorized representation output by the last layer of encoders has higher-level semantics, syntax, and other information than the outputs of other layer encoders, so the last layer of encoders The generated word vector attention weight matrix is more in line with the semantic similarity than other layers. Since the self-attention mechanism in the BERT model uses a multi-head attention method, each head will generate an attention weight matrix, so the last layer of encoder will generate multiple attention weight matrices, and each attention weight matrix represents the corresponding head. The similarity between the captured word vectors, extract the row corresponding to the "[CLS]" tag from the attention weight matrix corresponding to each head, which represents the pair of "[CLS]" tags captured by the head at all positions in the document The attention weights of the word vectors of .

示例性地,当所述拦截决策依据为系统安全配置文件存储路径的地址信息、用户密码的地址信息时,其注意力权重分别为:“系统”:0.1,“文件”:0.2,“存储”:0.3,“路径”:0.3,“地址”:0.3,“信息”:0.1,“用户”:0.1,“密码”:0.5,“地址”:0.3,“信息”:0.1时,将相同的决策词向量的注意力权重进行相加,即“地址”:0.6,“地址”:0.2,则在所述拦截决策依据中核心决策语义为地址、密码。Exemplarily, when the interception decision is based on the address information of the storage path of the system security configuration file and the address information of the user password, the attention weights are: "system": 0.1, "file": 0.2, "storage" :0.3, "path": 0.3, "address": 0.3, "info": 0.1, "user": 0.1, "password": 0.5, "address": 0.3, "info": 0.1, same decision The attention weights of the word vectors are added, that is, "address": 0.6, "address": 0.2, then the core decision semantics in the interception decision basis are address and password.

S3、根据所述核心决策语义构建第一子决策树集群,并将所述第一子决策树集群聚合为决策树模型;S3. Construct a first sub-decision tree cluster according to the core decision semantics, and aggregate the first sub-decision tree cluster into a decision tree model;

本发明实施例中,所述第一子决策树集群是根据所述核心决策语义构建的多个子决策树的集合,决策树是一种树形结构,在决策树的每个内部节点表示一个属性上的测试,每个分支代表一个测试输出,每个叶节点代表一种类别。决策树是一个预测模型,代表的是对象属性与对象值之间的一种映射关系。In the embodiment of the present invention, the first sub-decision tree cluster is a set of multiple sub-decision trees constructed according to the core decision semantics, the decision tree is a tree structure, and each internal node of the decision tree represents an attribute In the test on , each branch represents a test output, and each leaf node represents a category. A decision tree is a predictive model that represents a mapping relationship between object attributes and object values.

本发明实施例中,参图3所示,所述根据所述核心决策语义构建第一子决策树集群,包括:In the embodiment of the present invention, as shown in FIG. 3, the construction of the first sub-decision tree cluster according to the core decision semantics includes:

S31、对所述核心决策语义进行分类标注,得到所述核心决策语义对应的决策标注;S31. Classify and label the core decision semantics to obtain decision labels corresponding to the core decision semantics;

S32、逐一选取所述决策标注作为第一根节点,在所述第一根节点上分裂第一左节点和第一右节点;S32. Select the decision labels one by one as the first root node, and split the first left node and the first right node on the first root node;

S33、将所述核心决策语义分配至所述第一左节点和所述第一右节点,得到子决策树;S33. Assign the core decision semantics to the first left node and the first right node to obtain a sub-decision tree;

S34、汇集所述子决策树为所述第一子决策树集群。S34. Gather the sub-decision trees into the first sub-decision tree cluster.

详细地,对所述决策语义进行分类标注,是因为决策树学习的关键是对属性进行分类,一般在分类的过程中,希望决策树的分支节点所包含的样本尽可能属于同一类别。例如,在银行业务系统服务中,所述核心决策语义中包含的核心语义有账户、会计、应计等,则根据账户进行分类标注有账户密码、账户余额、账户代码;根据会计进行分类标注有交易记录、会计代码;根据应计进行分类标注有应计费用、应计利息,应计制贷款金额。In detail, the classification and labeling of the decision semantics is because the key to decision tree learning is to classify attributes. Generally, in the process of classification, it is hoped that the samples contained in the branch nodes of the decision tree belong to the same category as much as possible. For example, in banking system services, if the core semantics contained in the core decision semantics include account, accounting, and accrual, etc., then according to the classification of the account, it is marked with account password, account balance, and account code; according to the classification of accounting, it is marked with Transaction records, accounting codes; classified according to accruals and marked with accrued expenses, accrued interest, and accrued loan amount.

具体地,当对银行业务系统中的所述核心决策语义进行分类标注后,可得到账户、会计、应计三种决策标注,逐一选取账户、会计、应计作为根节点,将账户所对应核心决策语义中的账户属性分配至账户作为根节点的左节点和右节点中,即将账户密码、账户余额、账户代码分配至账户作为根节点的左节点和右节点中,将会计所对应核心决策语义中的会计属性分配至会计作为根节点的左节点和右节点中,即将交易记录、会计代码分配至会计作为根节点的左节点和右节点中;将应计所对应核心决策语义中的应计属性分配至应计作为根节点的左节点和右节点中,即将应计费用、应计利息,应计制贷款金额分配至应计作为根节点的左节点和右节点中,并将三个子决策树汇集在一起,得到第一子决策树集群。Specifically, after classifying and annotating the core decision semantics in the banking system, three decision annotations of account, accounting, and accrual can be obtained, and account, accounting, and accrual are selected as root nodes one by one, and the corresponding core The account attributes in the decision semantics are assigned to the left and right nodes of the account as the root node, that is, the account password, account balance, and account code are assigned to the left and right nodes of the account as the root node, and the core decision semantics corresponding to the accounting office The accounting attributes in the accountant are assigned to the left node and the right node of the accountant as the root node, that is, the transaction records and accounting codes are assigned to the left node and the right node of the accountant as the root node; The attribute is assigned to the left node and the right node of the accrual as the root node, that is, the accrual fee, the accrual interest, and the accrual loan amount are assigned to the left node and the right node of the accrual as the root node, and the three child The decision trees are pooled together to obtain the first sub-cluster of decision trees.

本发明实施例中,所述决策树模型就是由一个个决策组成的树状决策集合,通过决策树模型可以对事件进行预测,得到一个合理的预测结果。In the embodiment of the present invention, the decision tree model is a tree-like decision set composed of individual decisions, and events can be predicted through the decision tree model, and a reasonable prediction result can be obtained.

本发明实施例中,所述将所述第一子决策树集群聚合为决策树模型,包括:In the embodiment of the present invention, the aggregating the first sub-decision tree cluster into a decision tree model includes:

利用如下的信息增益算法计算所述第一子决策树集群中子决策树根节点对应决策标注的第一信息增益:Using the following information gain algorithm to calculate the first information gain corresponding to the decision label of the sub-decision tree root node in the first sub-decision tree cluster:

Figure 679178DEST_PATH_IMAGE023
Figure 679178DEST_PATH_IMAGE023

其中,

Figure 505051DEST_PATH_IMAGE024
为所述第一信息增益,
Figure 276698DEST_PATH_IMAGE010
为第
Figure 696178DEST_PATH_IMAGE025
类决策标注所占的比例,
Figure 578683DEST_PATH_IMAGE026
为对数函数,
Figure 773910DEST_PATH_IMAGE027
为所述核心决策语义的决策语义样本数量,
Figure 982038DEST_PATH_IMAGE014
为第
Figure 623235DEST_PATH_IMAGE025
类决策标注中决策语义样本数量,
Figure 309431DEST_PATH_IMAGE028
为所述决策标注对应属性的数量;in,
Figure 505051DEST_PATH_IMAGE024
is the first information gain,
Figure 276698DEST_PATH_IMAGE010
for the first
Figure 696178DEST_PATH_IMAGE025
The proportion of class decision labels,
Figure 578683DEST_PATH_IMAGE026
is a logarithmic function,
Figure 773910DEST_PATH_IMAGE027
is the number of decision semantic samples of the core decision semantics,
Figure 982038DEST_PATH_IMAGE014
for the first
Figure 623235DEST_PATH_IMAGE025
The number of decision semantic samples in class decision annotation,
Figure 309431DEST_PATH_IMAGE028
Annotate the number of attributes corresponding to the decision;

选取所述第一信息增益最大的第一决策标注作为所述决策树模型的第二根节点,在所述第一决策标注对应的属性上分裂出第一左节点和第二右节点;Selecting the first decision label with the largest first information gain as the second root node of the decision tree model, splitting the first left node and the second right node on the attribute corresponding to the first decision label;

逐一在未被选取的决策标注中选取所述第一信息增益最大的第二决策标注分配至所述第一左节点和所述第二右节点中;Selecting the second decision label with the largest information gain from the unselected decision labels one by one and assigning them to the first left node and the second right node;

当所述决策标注均被选取,得到所述决策树模型。When the decision labels are all selected, the decision tree model is obtained.

详细地,根据所述信息增益算法可以确定节点的纯度,即在分支节点是否都属于同一类别,有利于生成的决策树更能准确的对信息拦截做出预测。当账户的第一信息增益为0.918,会计的第一信息增益为0.722,应计的第一信息增益为0.998,则根据第一信息增益可选择应计为所述决策树模型的根节点,将应计属性对应的子决策树作为主要子决策树,在未被选取的决策标注中,账户的信息增益最大,即将账户所对应的子决策树聚合至应计属性分裂出的左节点中,将会计所对应的子决策树聚合至应计属性分裂出的右节点中。In detail, according to the information gain algorithm, the purity of the nodes can be determined, that is, whether the branch nodes belong to the same category, which is beneficial for the generated decision tree to more accurately predict information interception. When the first information gain of the account is 0.918, the first information gain of accounting is 0.722, and the first information gain of accrual is 0.998, then according to the first information gain, it can be selected as the root node of the decision tree model, and the The sub-decision tree corresponding to the accrual attribute is used as the main sub-decision tree. Among the unselected decision labels, the information gain of the account is the largest, that is, the sub-decision tree corresponding to the account is aggregated into the left node split by the accrual attribute, and the The sub-decision tree corresponding to accounting is aggregated into the right node split from the accrual attribute.

具体地,当所有的决策标注均被选取,表述决策树已经聚合完成,即得到所述决策树模型。Specifically, when all decision labels are selected, it indicates that the decision tree has been aggregated, that is, the decision tree model is obtained.

S4、实时获取所述业务服务系统的访问主体的访问信息,利用所述决策树模型对所述访问信息进行拦截评分;S4. Obtain the access information of the access subject of the business service system in real time, and use the decision tree model to intercept and score the access information;

本发明实施例中,所述访问主体是指一个主动的实体,包括用户、用户组、终端、主机或一个应用,主体可以访问客体,客体是一个被动的实体,对客体的访问要受控。所述访问信息是指访问主体在业务系统中所进行的一系列访问操作,根据访问主体进行的访问操作可以利用决策树模型进行评分,从而根据评分结果进行下一步操作。In the embodiment of the present invention, the access subject refers to an active entity, including a user, a user group, a terminal, a host or an application, the subject can access the object, and the object is a passive entity whose access to the object should be controlled. The access information refers to a series of access operations performed by the access subject in the business system. According to the access operations performed by the access subject, the decision tree model can be used to score, so that the next step can be performed according to the scoring results.

详细地,可利用业务服务系统中的监听器(Listener)或者根据业务服务系统中的访问日志实时获取所述业务系统的访问主体的访问信息。In detail, the access information of the access subject of the business system can be obtained in real time by using a listener (Listener) in the business service system or according to the access log in the business service system.

本发明实施例中,对所述访问信息进行拦截评分,可根据拦截评分判断是否要对该访问信息进行拦截,当所述拦截评分大于评分阈值时,需要对访问信息进行拦截;当所述拦截评分小于评分阈值时,则访问主体可正常对业务服务系统进行访问。In the embodiment of the present invention, the interception score is performed on the access information, and it can be judged whether to intercept the access information according to the interception score. When the interception score is greater than the scoring threshold, the access information needs to be intercepted; when the interception When the score is less than the score threshold, the access subject can normally access the business service system.

本发明实施例中,所述利用所述决策树模型对所述访问信息进行拦截评分,包括:In the embodiment of the present invention, the use of the decision tree model to intercept and score the access information includes:

将预获取的训练数据集输入至所述决策树模型中,得到得分数据集;Input the pre-acquired training data set into the decision tree model to obtain a score data set;

根据所述得分数据集和预设的损失函数计算所述决策树模型的损失值,其中所述预设的损失函数包括:Calculate the loss value of the decision tree model according to the score data set and a preset loss function, wherein the preset loss function includes:

Figure 782000DEST_PATH_IMAGE029
Figure 782000DEST_PATH_IMAGE029

其中,

Figure 957767DEST_PATH_IMAGE030
为损失值,
Figure 148577DEST_PATH_IMAGE003
为所述得分数据集中的得分数据,
Figure 576147DEST_PATH_IMAGE031
为预设的真实得分数据,
Figure 168802DEST_PATH_IMAGE032
为决策树的棵数,
Figure 531782DEST_PATH_IMAGE033
为反余弦函数,
Figure 209888DEST_PATH_IMAGE034
为对数函数;in,
Figure 957767DEST_PATH_IMAGE030
is the loss value,
Figure 148577DEST_PATH_IMAGE003
is the score data in the score dataset,
Figure 576147DEST_PATH_IMAGE031
is the preset real score data,
Figure 168802DEST_PATH_IMAGE032
is the number of decision trees,
Figure 531782DEST_PATH_IMAGE033
is the inverse cosine function,
Figure 209888DEST_PATH_IMAGE034
is a logarithmic function;

当所述损失值大于或等于预设的损失阈值时,对所述决策树模型进行决策树添加处理操作,直到所述损失值小于所述损失阈值时,输出当前的决策树模型为拦截评分模型;When the loss value is greater than or equal to the preset loss threshold, add a decision tree to the decision tree model until the loss value is less than the loss threshold, output the current decision tree model as an intercept scoring model ;

将所述访问信息输入至所述拦截评分模型中,得到所述访问信息的拦截评分。The access information is input into the interception score model to obtain the interception score of the access information.

详细地,所述训练数据集是基于访问信息的训练数据,根据决策树模型对训练数据集进行训练,可得到决策树模型对于访问信息的拦截评分的预测。In detail, the training data set is based on access information, and the training data set is trained according to the decision tree model to obtain a prediction of the interception score of the decision tree model for the access information.

具体地,所述拦截评分模型为随机森林模型,其中,所述随机森林模型指的是利用多棵树对样本进行训练并预测的一种分类器,具有较高的预测能力。Specifically, the intercept scoring model is a random forest model, wherein the random forest model refers to a classifier that uses multiple trees to train and predict samples, and has a high predictive ability.

利用损失函数对拦截评分模型进行参数调整,降低真实值与预测值之间的损失,使拦截评分模型生成的预测值往真实方向靠拢,从而达到学习的目的。The loss function is used to adjust the parameters of the interception scoring model to reduce the loss between the real value and the predicted value, so that the predicted value generated by the interception scoring model is closer to the real direction, so as to achieve the purpose of learning.

S5、对所述拦截评分大于预设评分阈值的访问信息进行拦截,并提取拦截评分大于预设评分阈值的访问信息的核心信息语义;S5. Intercept the access information whose interception score is greater than the preset scoring threshold, and extract the core information semantics of the access information whose interception score is greater than the preset scoring threshold;

本发明实施例中,当所述拦截评分大于预设评分阈值时,需要对访问信息进行拦截,即拦截评分大于评分阈值时,表示此访问信息具有非安全性,要是让此访问信息继续访问,可能会使业务服务系统出现故障,因此需要对此访问信息进行拦截。In the embodiment of the present invention, when the interception score is greater than the preset scoring threshold, the access information needs to be intercepted, that is, when the interception score is greater than the scoring threshold, it means that the access information is not safe. If the access information is allowed to continue to be accessed, It may cause the business service system to fail, so this access information needs to be intercepted.

本发明实施例中,所述对所述拦截评分大于预设评分阈值的访问信息进行拦截,包括:In the embodiment of the present invention, the intercepting the access information whose interception score is greater than the preset scoring threshold includes:

提取所述访问信息的访问参数;Extracting access parameters of the access information;

利用预设的拦截器对所述访问参数进行拦截。The access parameter is intercepted by using a preset interceptor.

详细地,可具有参数提取功能的计算机语句(如Python语句,JAVA语句)提取所述访问信息的访问参数,其中,所述访问信息的访问参数包括统一定位符(url),请求访问的服务信息,访问时长等。In detail, a computer statement (such as a Python statement, a JAVA statement) with a parameter extraction function can extract the access parameters of the access information, wherein the access parameters of the access information include a uniform locator (url), and the service information requested to be accessed , access duration, etc.

具体地,当所述拦截评分大于预设评分阈值时,获取所述访问信息的访问请求,可利用拦截器(Interceptor)对所述访问参数进行拦截,从而对所述访问信息进行拦截。其中,Interceptor拦截器主要完成请求参数的解析、将页面表单参数赋值给栈中相应属性、执行功能检验、程序异常调试等,可以对所述访问参数进行解析,可得知访问参数为非法参数,即利用拦截器对所述访问参数终止请求访问,从而对访问参数进行拦截。Specifically, when the interception score is greater than a preset score threshold, an interceptor (Interceptor) may be used to intercept the access parameter of the access request for obtaining the access information, thereby intercepting the access information. Among them, the Interceptor interceptor mainly completes the analysis of request parameters, assigns page form parameters to corresponding attributes in the stack, performs function inspection, program exception debugging, etc., can analyze the access parameters, and can know that the access parameters are illegal parameters, That is, the interceptor is used to terminate the request access to the access parameter, thereby intercepting the access parameter.

示例性地,当所述访问信息的拦截评分为80分,所述评分阈值为60分,则访问信息的拦截评分大于评分阈值,就需要对此访问信息进行拦截,若访问信息为对业务服务系统的数据库进行访问,则会根据访问信息生成访问请求,即根据访问请求对业务服务系统进行访问,但对数据库的访问的拦截评分大于评分阈值,就需要对数据库的访问进行拦截,即使用过滤器对此访问请求进行拦截,使业务服务系统处于安全状态。Exemplarily, when the interception score of the access information is 80 points, and the scoring threshold is 60 points, then the interception score of the access information is greater than the scoring threshold, and the access information needs to be intercepted. If the access information is for business services When the database of the system is accessed, an access request will be generated according to the access information, that is, the business service system is accessed according to the access request, but the interception score of the database access is greater than the scoring threshold, and the database access needs to be intercepted, that is, the filter The server intercepts this access request, so that the business service system is in a safe state.

本发明实施例中,所述核心信息语义是指能够反映访问信息的关键语义,即能体现所述访问信息的特征信息,可通过访问信息的核心信息语义对要进行拦截的访问信息进行拦截,当出现核心信息语义时,系统就会得到此访问信息是非法信息,不能让其访问信息进行访问,就需要对此访问信息进行拦截。In the embodiment of the present invention, the core information semantics refers to the key semantics that can reflect the access information, that is, can reflect the characteristic information of the access information, and the access information to be intercepted can be intercepted through the core information semantics of the access information, When the core information semantics appears, the system will get that the access information is illegal information, and it cannot allow it to access the access information, so it needs to intercept the access information.

本发明实施例中,所述提取拦截评分大于预设评分阈值的访问信息的核心信息语义与S2中提取所述拦截决策依据的核心决策语义的步骤一致,在此不再赘述。In the embodiment of the present invention, the extraction of the core information semantics of the access information whose interception score is greater than the preset score threshold is consistent with the step of extracting the core decision semantics of the interception decision basis in S2, and will not be repeated here.

S6、利用所述核心信息语义构建第二子决策树集群,并利用所述第二子决策树集群对所述决策树模型进行反馈调整。S6. Construct a second sub-decision tree cluster by using the semantics of the core information, and use the second sub-decision tree cluster to perform feedback adjustment on the decision tree model.

本发明实施例中,所述第二子决策树集群是根据所述核心信息语义构建的多个子决策树的集合,将所述核心信息语义进行分类,得到多个子决策树,汇集多个子决策树得到第二子决策树集群。In the embodiment of the present invention, the second sub-decision tree cluster is a collection of multiple sub-decision trees constructed according to the semantics of the core information, classify the semantics of the core information to obtain multiple sub-decision trees, and assemble multiple sub-decision trees Get the second sub-decision tree cluster.

详细地,所述利用所述核心信息语义构建第二子决策树集群与S3中所述根据所述核心决策语义构建第一子决策树集群的步骤一致,在此不再赘述。In detail, the construction of the second sub-decision tree cluster by using the core information semantics is consistent with the step of constructing the first sub-decision tree cluster according to the core decision semantics in S3, and will not be repeated here.

本发明实施例中,对访问信息进行拦截后,会记录被拦截的访问信息是非法信息,根据提取访问信息的核心语义信息进一步对决策树模型进行反馈调整,使决策树模型能够更准确的预测访问信息的拦截评分,进而更准确的对非法的访问信息进行拦截。In the embodiment of the present invention, after the access information is intercepted, it will be recorded that the intercepted access information is illegal information, and the decision tree model is further adjusted according to the core semantic information of the extracted access information, so that the decision tree model can predict more accurately Intercept scoring of access information, and then more accurately intercept illegal access information.

本发明实施例中,利用所述第二子决策树集群对所述决策树模型进行反馈调整,包括:In the embodiment of the present invention, using the second sub-decision tree cluster to perform feedback adjustment on the decision tree model includes:

计算所述第二子决策树集群中第二决策标注的第二信息增益;calculating a second information gain for a second decision label in the second sub-decision tree cluster;

选取所述第一信息增益和所述第二信息增益中最大的信息增益对应的决策标注为所述决策树模型的第三根节点,在所述第三根节点对应的属性上分裂出属性节点;Select the decision mark corresponding to the largest information gain among the first information gain and the second information gain as the third root node of the decision tree model, and split the attribute node on the attribute corresponding to the third root node ;

利用如下的分裂算法确定所述属性节点的最佳分裂节点:Utilize the following splitting algorithm to determine the optimal splitting node of the attribute node:

Figure 175570DEST_PATH_IMAGE035
Figure 175570DEST_PATH_IMAGE035

其中,

Figure 622732DEST_PATH_IMAGE017
为所述最佳分裂节点的增益值,
Figure 405880DEST_PATH_IMAGE036
为划分搭配左子树中所有样本的梯度之和,
Figure 571282DEST_PATH_IMAGE019
为划分搭配右子树中所有样本的梯度之和,
Figure 340655DEST_PATH_IMAGE037
为划分搭配左子树中所有样本的二阶导数之和,
Figure 376744DEST_PATH_IMAGE038
为划分搭配右子树中所有样本的二阶导数之和,
Figure 268477DEST_PATH_IMAGE022
为正则化常数;in,
Figure 622732DEST_PATH_IMAGE017
is the gain value of the best split node,
Figure 405880DEST_PATH_IMAGE036
is the sum of the gradients of all samples in the left subtree for the partition collocation,
Figure 571282DEST_PATH_IMAGE019
is the sum of the gradients of all samples in the right subtree of the partition collocation,
Figure 340655DEST_PATH_IMAGE037
is the sum of the second derivatives of all samples in the left subtree of the partition collocation,
Figure 376744DEST_PATH_IMAGE038
is the sum of the second derivatives of all samples in the right subtree of the partition collocation,
Figure 268477DEST_PATH_IMAGE022
is a regularization constant;

将所述第一决策标注对应的第一信息增益和所述第二决策标注对应的第二信息增益的最大值分配至所述最佳分裂节点中;Allocating the maximum value of the first information gain corresponding to the first decision label and the second information gain corresponding to the second decision label to the optimal split node;

当所述第一子决策树和所述第二子决策树中有未被选取的决策标注时,对所述决策树模型进行迭代,直到所述决策标注均被选取,完成所述决策树模型的反馈调整。When there are unselected decision labels in the first sub-decision tree and the second sub-decision tree, iterate the decision tree model until all the decision labels are selected, and complete the decision tree model feedback adjustments.

详细地,所述分裂算法针对数据划分前后的增益值最大的算法,根据增益值最大确定最佳分裂点,会依次计算每一个分裂点的增益值,并在最后整合所有的分裂点的增益值最后得到增益值最大的分裂点。In detail, the splitting algorithm aims at the algorithm with the largest gain value before and after data division, determines the best splitting point according to the largest gain value, calculates the gain value of each split point in turn, and finally integrates the gain values of all split points Finally, the split point with the largest gain value is obtained.

具体地,根据核心信息语义的特征属性对核心信息语义进行划分,将核心信息语义划分为2个或多个子信息语义集,并反复会子信息语义集迭代,直到达到决策树生长的停止条件,则到达叶子节点,叶子节点便是分类的结果,叶子节点不再对子信息语义集进行划分。Specifically, the core information semantics is divided according to the characteristic attributes of the core information semantics, and the core information semantics is divided into two or more sub-information semantic sets, and the sub-information semantic sets are iterated repeatedly until the stopping condition of the decision tree growth is reached. Then it reaches the leaf node, which is the result of the classification, and the leaf node no longer divides the sub-information semantic set.

示例性地,当所述第二子决策树集群中包含的子决策树为

Figure 232759DEST_PATH_IMAGE039
,所述第一子决策集群中包含的子决策树为
Figure 602561DEST_PATH_IMAGE040
,并且每个子决策树都包含自身的属性特征,如
Figure 961998DEST_PATH_IMAGE041
子决策树包含自身的属性特征,通过计算
Figure 24632DEST_PATH_IMAGE042
Figure 961364DEST_PATH_IMAGE043
中每个子决策树对应的决策标注,选取最大的决策标注为所述决策树模型的根节点,当
Figure 400435DEST_PATH_IMAGE044
对应的决策标注的增益值是所有子决策树中最大值,则选取
Figure 614379DEST_PATH_IMAGE045
为所述决策树模型的根节点,
Figure 847914DEST_PATH_IMAGE046
中包含自身的属性,则在
Figure 22675DEST_PATH_IMAGE047
分裂出的节点中,选取最佳分裂点,将除
Figure 468700DEST_PATH_IMAGE048
之外的信息增益最大的子决策树分配至
Figure 865046DEST_PATH_IMAGE049
分裂出的节点中,依次将未被选取的子决策树对应决策标注的增益值最大值分配至上一个子决策树分裂的最佳分裂点中,直到所有的子决策树均被选取,就完成所述决策树的反馈调整,根据调整之后的决策树模型能更加准确地预测出访问信息的拦截评分,进而对于访问信息的拦截更加精准,使业务服务系统处于一个安全的环境中。Exemplarily, when the sub-decision trees included in the second sub-decision tree cluster are
Figure 232759DEST_PATH_IMAGE039
, the sub-decision tree contained in the first sub-decision cluster is
Figure 602561DEST_PATH_IMAGE040
, and each sub-decision tree contains its own attribute features, such as
Figure 961998DEST_PATH_IMAGE041
The sub-decision tree contains its own attribute characteristics, calculated by
Figure 24632DEST_PATH_IMAGE042
with
Figure 961364DEST_PATH_IMAGE043
The decision label corresponding to each sub-decision tree in , select the largest decision label as the root node of the decision tree model, when
Figure 400435DEST_PATH_IMAGE044
The gain value of the corresponding decision label is the maximum value in all sub-decision trees, then select
Figure 614379DEST_PATH_IMAGE045
is the root node of the decision tree model,
Figure 847914DEST_PATH_IMAGE046
Include its own attributes in the
Figure 22675DEST_PATH_IMAGE047
Among the split nodes, select the best split point, and divide
Figure 468700DEST_PATH_IMAGE048
The sub-decision tree with the largest information gain is assigned to
Figure 865046DEST_PATH_IMAGE049
Among the split nodes, the maximum value of the gain value corresponding to the decision label of the unselected sub-decision tree is assigned to the best split point of the previous sub-decision tree in turn, until all the sub-decision trees are selected, and the whole process is completed. According to the feedback adjustment of the above decision tree, according to the adjusted decision tree model, the interception score of access information can be predicted more accurately, and the interception of access information is more accurate, so that the business service system is in a safe environment.

本发明实施例通过业务服务系统的拦截日志,进而根据拦截日志获取拦截决策依据,有利于对信息拦截提供拦截依据,使对目标拦截更准确;提取拦截决策依据中的核心决策语义,根据核心决策语义构建决策树,有利于对业务系统的访问信息进行评分,进而根据评分结果判断是否要拦截访问信息;当拦截评分值大于评分阈值时,对访问信息进行拦截,并提取访问信息的核心信息语义,根据核心信息语义对决策树进行反馈调整,可以得到更准确的决策树模型,可更准确的实现对访问信息的拦截判断,保证了业务服务系统的安全。因此本发明提出的基于大数据分析拦截的拦截反馈处理方法、装置、电子设备及计算机可读存储介质,可以解决进行信息拦截时的准确度较低的问题。The embodiment of the present invention uses the interception log of the business service system, and then obtains the interception decision-making basis according to the interception log, which is beneficial to provide interception basis for information interception, and makes the target interception more accurate; extracts the core decision semantics in the interception decision-making basis, and according to the core decision-making Semantic construction of a decision tree is conducive to scoring the access information of the business system, and then judging whether to intercept the access information according to the scoring result; when the intercept score value is greater than the scoring threshold, intercept the access information and extract the core information semantics of the access information , according to the core information semantics, the decision tree can be adjusted by feedback, and a more accurate decision tree model can be obtained, which can more accurately realize the interception and judgment of access information, and ensure the security of the business service system. Therefore, the interception feedback processing method, device, electronic equipment, and computer-readable storage medium proposed by the present invention based on big data analysis and interception can solve the problem of low accuracy in information interception.

如图4所示,是本发明一实施例提供的基于大数据分析的拦截反馈处理装置的功能模块图。As shown in FIG. 4 , it is a functional block diagram of an interception feedback processing device based on big data analysis provided by an embodiment of the present invention.

本发明所述基于大数据分析的拦截反馈处理装置100可以安装于电子设备中。根据实现的功能,所述基于大数据分析的拦截反馈处理装置100可以包括拦截决策依据获取模块101、核心决策语义提取模块102、决策树模型聚合模块103、拦截评分确定模块104、访问信息拦截模块105及决策树模型反馈调整模块106。本发明所述模块也可以称之为单元,是指一种能够被电子设备处理器所执行,并且能够完成固定功能的一系列计算机程序段,其存储在电子设备的存储器中。The interception feedback processing device 100 based on big data analysis of the present invention can be installed in an electronic device. According to the functions realized, the interception feedback processing device 100 based on big data analysis may include an interception decision basis acquisition module 101, a core decision semantics extraction module 102, a decision tree model aggregation module 103, an interception score determination module 104, and an access information interception module 105 and a decision tree model feedback adjustment module 106. The module in the present invention can also be called a unit, which refers to a series of computer program segments that can be executed by the processor of the electronic device and can complete fixed functions, and are stored in the memory of the electronic device.

在本实施例中,关于各模块/单元的功能如下:In this embodiment, the functions of each module/unit are as follows:

所述拦截决策依据获取模块101,用于基于由业务服务系统进行目标拦截的拦截日志,获取所述业务服务系统的拦截决策依据;The interception decision-making basis acquisition module 101 is used to acquire the interception decision-making basis of the business service system based on the interception log of the target interception by the business service system;

所述核心决策语义提取模块102,用于对所述拦截决策依据进行向量转换,得到向量拦截决策依据,根据所述向量拦截决策依据提取所述拦截决策依据的核心决策语义;The core decision semantics extraction module 102 is configured to perform vector conversion on the interception decision basis to obtain a vector interception decision basis, and extract the core decision semantics of the interception decision basis according to the vector interception decision basis;

所述决策树模型聚合模块103,用于根据所述核心决策语义构建第一子决策树集群,并将所述第一子决策树集群聚合为决策树模型;The decision tree model aggregation module 103 is configured to construct a first sub-decision tree cluster according to the core decision semantics, and aggregate the first sub-decision tree cluster into a decision tree model;

所述拦截评分确定模块104,用于实时获取所述业务服务系统的访问主体的访问信息,利用所述决策树模型对所述访问信息进行拦截评分;The interception scoring determination module 104 is configured to obtain access information of the access subject of the business service system in real time, and use the decision tree model to intercept and score the access information;

所述访问信息拦截模块105,用于对所述拦截评分大于预设评分阈值的访问信息进行拦截,并提取拦截评分大于预设评分阈值的访问信息的核心信息语义;The access information interception module 105 is configured to intercept the access information whose interception score is greater than the preset score threshold, and extract the core information semantics of the access information whose interception score is greater than the preset score threshold;

所述决策树模型反馈调整模块106,用于利用所述核心信息语义构建第二子决策树集群,并利用所述第二子决策树集群对所述决策树模型进行反馈调整。The decision tree model feedback adjustment module 106 is configured to use the core information semantics to construct a second sub-decision tree cluster, and use the second sub-decision tree cluster to perform feedback adjustment on the decision tree model.

详细地,本发明实施例中所述基于大数据分析的拦截反馈处理装置100中所述的各模块在使用时采用与上述图1至图3中所述的基于大数据分析拦截的拦截反馈处理方法一样的技术手段,并能够产生相同的技术效果,这里不再赘述。In detail, each module described in the interception feedback processing device 100 based on big data analysis in the embodiment of the present invention adopts the interception feedback processing based on big data analysis interception described above in FIGS. 1 to 3 . The same technical means as the method can produce the same technical effect, and will not be repeated here.

如图5所示,是本发明一实施例提供的实现基于大数据分析拦截的拦截反馈处理方法的电子设备的结构示意图。As shown in FIG. 5 , it is a schematic structural diagram of an electronic device implementing an interception feedback processing method based on big data analysis interception provided by an embodiment of the present invention.

所述电子设备1可以包括处理器10、存储器11、通信总线12以及通信接口13,还可以包括存储在所述存储器11中并可在所述处理器10上运行的计算机程序,如基于大数据分析的拦截反馈处理程序。The electronic device 1 may include a processor 10, a memory 11, a communication bus 12, and a communication interface 13, and may also include computer programs stored in the memory 11 and operable on the processor 10, such as based on big data Analytical interception feedback handler.

其中,所述处理器10在一些实施例中可以由集成电路组成,例如可以由单个封装的集成电路所组成,也可以是由多个相同功能或不同功能封装的集成电路所组成,包括一个或者多个中央处理器(Central Processing unit,CPU)、微处理器、数字处理芯片、图形处理器及各种控制芯片的组合等。所述处理器10是所述电子设备的控制核心(ControlUnit),利用各种接口和线路连接整个电子设备的各个部件,通过运行或执行存储在所述存储器11内的程序或者模块(例如执行基于大数据分析的拦截反馈处理程序等),以及调用存储在所述存储器11内的数据,以执行电子设备的各种功能和处理数据。Wherein, the processor 10 may be composed of integrated circuits in some embodiments, for example, may be composed of a single packaged integrated circuit, or may be composed of multiple integrated circuits with the same function or different functions packaged, including one or A combination of multiple central processing units (Central Processing unit, CPU), microprocessors, digital processing chips, graphics processors and various control chips, etc. The processor 10 is the control core (ControlUnit) of the electronic device, which uses various interfaces and lines to connect various components of the entire electronic device, and runs or executes programs or modules stored in the memory 11 (for example, executes based on Big data analysis interception feedback processing program, etc.), and call the data stored in the memory 11 to execute various functions of the electronic device and process data.

所述存储器11至少包括一种类型的可读存储介质,所述可读存储介质包括闪存、移动硬盘、多媒体卡、卡型存储器(例如:SD或DX存储器等)、磁性存储器、磁盘、光盘等。所述存储器11在一些实施例中可以是电子设备的内部存储单元,例如该电子设备的移动硬盘。所述存储器11在另一些实施例中也可以是电子设备的外部存储设备,例如电子设备上配备的插接式移动硬盘、智能存储卡(Smart Media Card, SMC)、安全数字(Secure Digital,SD)卡、闪存卡(Flash Card)等。进一步地,所述存储器11还可以既包括电子设备的内部存储单元也包括外部存储设备。所述存储器11不仅可以用于存储安装于电子设备的应用软件及各类数据,例如基于大数据分析的拦截反馈处理程序的代码等,还可以用于暂时地存储已经输出或者将要输出的数据。The memory 11 includes at least one type of readable storage medium, and the readable storage medium includes flash memory, mobile hard disk, multimedia card, card-type memory (for example: SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, etc. . The storage 11 may be an internal storage unit of the electronic device in some embodiments, such as a mobile hard disk of the electronic device. In other embodiments, the memory 11 can also be an external storage device of the electronic device, such as a plug-in mobile hard disk, a smart memory card (Smart Media Card, SMC), a secure digital (Secure Digital, SD ) card, flash memory card (Flash Card), etc. Further, the memory 11 may also include both an internal storage unit of the electronic device and an external storage device. The memory 11 can not only be used to store application software and various data installed in the electronic device, such as the code of the interception feedback processing program based on big data analysis, but also can be used to temporarily store the data that has been output or will be output.

所述通信总线12可以是外设部件互连标准(peripheral componentinterconnect,简称PCI)总线或扩展工业标准结构(extended industry standardarchitecture,简称EISA)总线等。该总线可以分为地址总线、数据总线、控制总线等。所述总线被设置为实现所述存储器11以及至少一个处理器10等之间的连接通信。The communication bus 12 may be a peripheral component interconnect standard (PCI for short) bus or an extended industry standard architecture (EISA for short) bus or the like. The bus can be divided into address bus, data bus, control bus and so on. The bus is configured to realize connection and communication between the memory 11 and at least one processor 10 and the like.

所述通信接口13用于上述电子设备与其他设备之间的通信,包括网络接口和用户接口。可选地,所述网络接口可以包括有线接口和/或无线接口(如WI-FI接口、蓝牙接口等),通常用于在该电子设备与其他电子设备之间建立通信连接。所述用户接口可以是显示器(Display)、输入单元(比如键盘(Keyboard)),可选地,用户接口还可以是标准的有线接口、无线接口。可选地,在一些实施例中,显示器可以是LED显示器、液晶显示器、触控式液晶显示器以及OLED(Organic Light-Emitting Diode,有机发光二极管)触摸器等。其中,显示器也可以适当的称为显示屏或显示单元,用于显示在电子设备中处理的信息以及用于显示可视化的用户界面。The communication interface 13 is used for communication between the electronic device and other devices, including a network interface and a user interface. Optionally, the network interface may include a wired interface and/or a wireless interface (such as a WI-FI interface, a Bluetooth interface, etc.), which are generally used to establish a communication connection between the electronic device and other electronic devices. The user interface may be a display (Display) or an input unit (such as a keyboard (Keyboard)). Optionally, the user interface may also be a standard wired interface or a wireless interface. Optionally, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode, organic light-emitting diode) touch device, and the like. Wherein, the display may also be properly referred to as a display screen or a display unit, and is used for displaying information processed in the electronic device and for displaying a visualized user interface.

图中仅示出了具有部件的电子设备,本领域技术人员可以理解的是,图中示出的结构并不构成对所述电子设备的限定,可以包括比图示更少或者更多的部件,或者组合某些部件,或者不同的部件布置。The figure only shows an electronic device with components, and those skilled in the art can understand that the structure shown in the figure does not constitute a limitation on the electronic device, and may include fewer or more components than those shown in the figure , or combinations of certain components, or different arrangements of components.

例如,尽管未示出,所述电子设备还可以包括给各个部件供电的电源(比如电池),优选地,电源可以通过电源管理装置与所述至少一个处理器10逻辑相连,从而通过电源管理装置实现充电管理、放电管理、以及功耗管理等功能。电源还可以包括一个或一个以上的直流或交流电源、再充电装置、电源故障检测电路、电源转换器或者逆变器、电源状态指示器等任意组件。所述电子设备还可以包括多种传感器、蓝牙模块、Wi-Fi模块等,在此不再赘述。For example, although not shown, the electronic device may also include a power supply (such as a battery) for supplying power to various components. Preferably, the power supply may be logically connected to the at least one processor 10 through a power management device, so that Realize functions such as charge management, discharge management, and power consumption management. The power supply may also include one or more DC or AC power supplies, recharging devices, power failure detection circuits, power converters or inverters, power status indicators and other arbitrary components. The electronic device may also include various sensors, a Bluetooth module, a Wi-Fi module, etc., which will not be repeated here.

应该了解,所述实施例仅为说明之用,在专利申请范围上并不受此结构的限制。It should be understood that the embodiments are only for illustration, and are not limited by the structure in terms of the scope of the patent application.

所述电子设备1中的所述存储器11存储的基于大数据分析的拦截反馈处理程序是多个指令的组合,在所述处理器10中运行时,可以实现:The interception feedback processing program based on big data analysis stored in the memory 11 in the electronic device 1 is a combination of multiple instructions. When running in the processor 10, it can realize:

基于由业务服务系统进行目标拦截的拦截日志,获取所述业务服务系统的拦截决策依据;Based on the interception log of the target interception by the business service system, the interception decision basis of the business service system is obtained;

对所述拦截决策依据进行向量转换,得到向量拦截决策依据,根据所述向量拦截决策依据提取所述拦截决策依据的核心决策语义;Performing vector conversion on the interception decision basis to obtain the vector interception decision basis, and extracting the core decision semantics of the interception decision basis according to the vector interception decision basis;

根据所述核心决策语义构建第一子决策树集群,并将所述第一子决策树集群聚合为决策树模型;Constructing a first sub-decision tree cluster according to the core decision semantics, and aggregating the first sub-decision tree cluster into a decision tree model;

实时获取所述业务服务系统的访问主体的访问信息,利用所述决策树模型对所述访问信息进行拦截评分;Obtaining the access information of the access subject of the business service system in real time, and using the decision tree model to intercept and score the access information;

对所述拦截评分大于预设评分阈值的访问信息进行拦截,并提取拦截评分大于预设评分阈值的访问信息的核心信息语义;Intercepting the access information whose interception score is greater than the preset scoring threshold, and extracting the core information semantics of the access information whose interception score is greater than the preset scoring threshold;

利用所述核心信息语义构建第二子决策树集群,并利用所述第二子决策树集群对所述决策树模型进行反馈调整。Using the semantics of the core information to construct a second sub-decision tree cluster, and using the second sub-decision tree cluster to perform feedback adjustment on the decision tree model.

具体地,所述处理器10对上述指令的具体实现方法可参考附图对应实施例中相关步骤的描述,在此不赘述。Specifically, for the specific implementation method of the above instructions by the processor 10, reference may be made to the description of relevant steps in the corresponding embodiments in the drawings, and details are not repeated here.

进一步地,所述电子设备1集成的模块/单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读存储介质中。所述计算机可读存储介质可以是易失性的,也可以是非易失性的。例如,所述计算机可读介质可以包括:能够携带所述计算机程序代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROM,Read-Only Memory)。Further, if the integrated modules/units of the electronic device 1 are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium. The computer-readable storage medium may be volatile or non-volatile. For example, the computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, U disk, removable hard disk, magnetic disk, optical disk, computer memory, read-only memory (ROM, Read-Only Memory).

本发明还提供一种计算机可读存储介质,所述可读存储介质存储有计算机程序,所述计算机程序在被电子设备的处理器所执行时,可以实现:The present invention also provides a computer-readable storage medium, the readable storage medium stores a computer program, and when the computer program is executed by a processor of an electronic device, it can realize:

基于由业务服务系统进行目标拦截的拦截日志,获取所述业务服务系统的拦截决策依据;Based on the interception log of the target interception by the business service system, the interception decision basis of the business service system is obtained;

对所述拦截决策依据进行向量转换,得到向量拦截决策依据,根据所述向量拦截决策依据提取所述拦截决策依据的核心决策语义;Performing vector conversion on the interception decision basis to obtain the vector interception decision basis, and extracting the core decision semantics of the interception decision basis according to the vector interception decision basis;

根据所述核心决策语义构建第一子决策树集群,并将所述第一子决策树集群聚合为决策树模型;Constructing a first sub-decision tree cluster according to the core decision semantics, and aggregating the first sub-decision tree cluster into a decision tree model;

实时获取所述业务服务系统的访问主体的访问信息,利用所述决策树模型对所述访问信息进行拦截评分;Obtaining the access information of the access subject of the business service system in real time, and using the decision tree model to intercept and score the access information;

对所述拦截评分大于预设评分阈值的访问信息进行拦截,并提取拦截评分大于预设评分阈值的访问信息的核心信息语义;Intercepting the access information whose interception score is greater than the preset scoring threshold, and extracting the core information semantics of the access information whose interception score is greater than the preset scoring threshold;

利用所述核心信息语义构建第二子决策树集群,并利用所述第二子决策树集群对所述决策树模型进行反馈调整。Using the semantics of the core information to construct a second sub-decision tree cluster, and using the second sub-decision tree cluster to perform feedback adjustment on the decision tree model.

在本发明所提供的几个实施例中,应该理解到,所揭露的设备,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。In the several embodiments provided by the present invention, it should be understood that the disclosed devices, devices and methods can be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the modules is only a logical function division, and there may be other division methods in actual implementation.

所述作为分离部件说明的模块可以是或者也可以不是物理上分开的,作为模块显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。The modules described as separate components may or may not be physically separated, and the components shown as modules may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this embodiment.

另外,在本发明各个实施例中的各功能模块可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能模块的形式实现。In addition, each functional module in each embodiment of the present invention may be integrated into one processing unit, or each unit may physically exist separately, or two or more units may be integrated into one unit. The above-mentioned integrated units can be implemented in the form of hardware, or in the form of hardware plus software function modules.

对于本领域技术人员而言,显然本发明不限于上述示范性实施例的细节,而且在不背离本发明的精神或基本特征的情况下,能够以其他的具体形式实现本发明。It will be apparent to those skilled in the art that the invention is not limited to the details of the above-described exemplary embodiments, but that the invention can be embodied in other specific forms without departing from the spirit or essential characteristics of the invention.

因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本发明的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本发明内。不应将权利要求中的任何附关联图标记视为限制所涉及的权利要求。Accordingly, the embodiments should be regarded in all points of view as exemplary and not restrictive, the scope of the invention being defined by the appended claims rather than the foregoing description, and it is therefore intended that the scope of the invention be defined by the appended claims rather than by the foregoing description. All changes within the meaning and range of equivalents of the elements are embraced in the present invention. Any reference sign in a claim should not be construed as limiting the claim concerned.

本申请实施例可以基于人工智能技术对相关的数据进行获取和处理。其中,人工智能(Artificial Intelligence,AI)是利用数字计算机或者数字计算机控制的机器模拟、延伸和扩展人的智能,感知环境、获取知识并使用知识获得最佳结果的理论、方法、技术及应用系统。The embodiments of the present application may acquire and process relevant data based on artificial intelligence technology. Among them, artificial intelligence (AI) is a theory, method, technology and application system that uses digital computers or machines controlled by digital computers to simulate, extend and expand human intelligence, perceive the environment, acquire knowledge and use knowledge to obtain the best results. .

此外,显然“包括”一词不排除其他单元或步骤,单数不排除复数。系统权利要求中陈述的多个单元或装置也可以由一个单元或装置通过软件或者硬件来实现。第一、第二等词语用来表示名称,而并不表示任何特定的顺序。In addition, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or devices stated in the system claims may also be realized by one unit or device through software or hardware. The terms first, second, etc. are used to denote names and do not imply any particular order.

最后应说明的是,以上实施例仅用以说明本发明的技术方案而非限制,尽管参照较佳实施例对本发明进行了详细说明,本领域的普通技术人员应当理解,可以对本发明的技术方案进行修改或等同替换,而不脱离本发明技术方案的精神和范围。Finally, it should be noted that the above embodiments are only used to illustrate the technical solutions of the present invention without limitation. Although the present invention has been described in detail with reference to the preferred embodiments, those of ordinary skill in the art should understand that the technical solutions of the present invention can be Modifications or equivalent replacements can be made without departing from the spirit and scope of the technical solutions of the present invention.

Claims (7)

1.一种基于大数据分析拦截的拦截反馈处理方法,其特征在于,所述方法包括:1. an interception feedback processing method based on big data analysis interception, it is characterized in that, described method comprises: S1、基于由业务服务系统进行目标拦截的拦截日志,获取所述业务服务系统的拦截决策依据;S1. Obtain the interception decision basis of the business service system based on the interception log of the target interception by the business service system; S2、对所述拦截决策依据进行向量转换,得到向量拦截决策依据,根据所述向量拦截决策依据提取所述拦截决策依据的核心决策语义;S2. Perform vector conversion on the interception decision basis to obtain a vector interception decision basis, and extract core decision semantics of the interception decision basis according to the vector interception decision basis; S3、根据所述核心决策语义构建第一子决策树集群,并将所述第一子决策树集群聚合为决策树模型;S3. Construct a first sub-decision tree cluster according to the core decision semantics, and aggregate the first sub-decision tree cluster into a decision tree model; S4、实时获取所述业务服务系统的访问主体的访问信息,利用所述决策树模型对所述访问信息进行拦截评分,其中所述利用所述决策树模型对所述访问信息进行拦截评分,包括:S4. Obtain the access information of the access subject of the business service system in real time, and use the decision tree model to intercept and score the access information, wherein the use of the decision tree model to intercept and score the access information includes: : S41、将预获取的训练数据集输入至所述决策树模型中,得到得分数据集;S41. Input the pre-acquired training data set into the decision tree model to obtain a score data set; S42、根据所述得分数据集和预设的损失函数计算所述决策树模型的损失值,其中所述预设的损失函数包括:S42. Calculate the loss value of the decision tree model according to the score data set and a preset loss function, wherein the preset loss function includes:
Figure 729393DEST_PATH_IMAGE001
Figure 729393DEST_PATH_IMAGE001
其中,
Figure 160374DEST_PATH_IMAGE002
为损失值,
Figure 460906DEST_PATH_IMAGE003
为所述得分数据集中的得分数据,
Figure 559312DEST_PATH_IMAGE004
为预设的真实得分数据,
Figure 919886DEST_PATH_IMAGE005
为决策树的棵数,
Figure 41426DEST_PATH_IMAGE006
为反余弦函数,
Figure 958697DEST_PATH_IMAGE007
为对数函数;
in,
Figure 160374DEST_PATH_IMAGE002
is the loss value,
Figure 460906DEST_PATH_IMAGE003
is the score data in the score dataset,
Figure 559312DEST_PATH_IMAGE004
is the preset real score data,
Figure 919886DEST_PATH_IMAGE005
is the number of decision trees,
Figure 41426DEST_PATH_IMAGE006
is the inverse cosine function,
Figure 958697DEST_PATH_IMAGE007
is a logarithmic function;
S43、当所述损失值大于或等于预设的损失阈值时,对所述决策树模型进行决策树添加处理操作,直到所述损失值小于所述损失阈值时,输出当前的决策树模型为拦截评分模型;S43. When the loss value is greater than or equal to the preset loss threshold, perform a decision tree addition processing operation on the decision tree model until the loss value is less than the loss threshold, output the current decision tree model as intercept scoring model; S44、将所述访问信息输入至所述拦截评分模型中,得到所述访问信息的拦截评分;S44. Input the access information into the intercept scoring model to obtain the intercept score of the access information; S5、对所述拦截评分大于预设评分阈值的访问信息进行拦截,并提取拦截评分大于预设评分阈值的访问信息的核心信息语义;S5. Intercept the access information whose interception score is greater than the preset scoring threshold, and extract the core information semantics of the access information whose interception score is greater than the preset scoring threshold; S6、利用所述核心信息语义构建第二子决策树集群,并利用所述第二子决策树集群对所述决策树模型进行反馈调整。S6. Construct a second sub-decision tree cluster by using the semantics of the core information, and use the second sub-decision tree cluster to perform feedback adjustment on the decision tree model.
2.如权利要求1所述的基于大数据分析拦截的拦截反馈处理方法,其特征在于,所述获取所述业务服务系统的拦截决策依据,包括:2. The interception feedback processing method based on big data analysis interception as claimed in claim 1, wherein said obtaining the interception decision-making basis of said business service system comprises: 提取所述拦截日志中的拦截参数;extracting interception parameters in the interception log; 根据所述拦截参数生成所述业务服务系统的拦截决策依据。An interception decision basis of the business service system is generated according to the interception parameters. 3.如权利要求1所述的基于大数据分析拦截的拦截反馈处理方法,其特征在于,所述根据所述向量拦截决策依据提取所述拦截决策依据的核心决策语义,包括:3. The interception feedback processing method based on big data analysis interception as claimed in claim 1, wherein the core decision semantics of extracting the interception decision-making basis according to the vector interception decision-making basis includes: 利用预设的Bert模型提取所述向量拦截决策依据中每个决策词向量的第一注意力权重;Utilize the preset Bert model to extract the first attention weight of each decision word vector in the vector intercept decision basis; 根据每个决策词向量的位置编码将相同决策词向量的所述第一注意力权重进行相加,得到第二注意力权重;According to the position coding of each decision word vector, the first attention weight of the same decision word vector is added to obtain the second attention weight; 选取第二注意力权重最高的决策词向量为核心决策语义。Select the decision word vector with the highest second attention weight as the core decision semantics. 4.如权利要求1所述的基于大数据分析拦截的拦截反馈处理方法,其特征在于,所述根据所述核心决策语义构建第一子决策树集群,包括:4. the interception feedback processing method based on big data analysis interception as claimed in claim 1, is characterized in that, described according to described core decision semantics constructs the first sub-decision tree cluster, comprising: 对所述核心决策语义进行分类标注,得到所述核心决策语义对应的决策标注;Classifying and labeling the core decision semantics to obtain the decision label corresponding to the core decision semantics; 逐一选取所述决策标注作为第一根节点,在所述第一根节点上分裂第一左节点和第一右节点;Selecting the decision labels one by one as the first root node, splitting the first left node and the first right node on the first root node; 将所述核心决策语义分配至所述第一左节点和所述第一右节点,得到子决策树;assigning the core decision semantics to the first left node and the first right node to obtain a sub-decision tree; 汇集所述子决策树为所述第一子决策树集群。Aggregating the sub-decision trees into the first cluster of sub-decision trees. 5.如权利要求1所述的基于大数据分析拦截的拦截反馈处理方法,其特征在于,所述将所述第一子决策树集群聚合为决策树模型,包括:5. the interception feedback processing method based on big data analysis interception as claimed in claim 1, is characterized in that, described first sub-decision tree cluster is aggregated into a decision tree model, comprising: 利用如下的信息增益算法计算所述第一子决策树集群中子决策树根节点对应决策标注的第一信息增益:Using the following information gain algorithm to calculate the first information gain corresponding to the decision label of the sub-decision tree root node in the first sub-decision tree cluster:
Figure 583713DEST_PATH_IMAGE008
Figure 583713DEST_PATH_IMAGE008
其中,
Figure 177506DEST_PATH_IMAGE009
为所述第一信息增益,
Figure 520763DEST_PATH_IMAGE010
为第
Figure 490993DEST_PATH_IMAGE012
类决策标注所占的比例,
Figure 236095DEST_PATH_IMAGE013
为对数函数,
Figure 788DEST_PATH_IMAGE014
为所述核心决策语义的决策语义样本数量,
Figure 831341DEST_PATH_IMAGE015
为第
Figure 588950DEST_PATH_IMAGE012
类决策标注中决策语义样本数量,
Figure 188559DEST_PATH_IMAGE016
为所述决策标注对应属性的数量;
in,
Figure 177506DEST_PATH_IMAGE009
is the first information gain,
Figure 520763DEST_PATH_IMAGE010
for the first
Figure 490993DEST_PATH_IMAGE012
The proportion of class decision labels,
Figure 236095DEST_PATH_IMAGE013
is a logarithmic function,
Figure 788DEST_PATH_IMAGE014
is the number of decision semantic samples of the core decision semantics,
Figure 831341DEST_PATH_IMAGE015
for the first
Figure 588950DEST_PATH_IMAGE012
The number of decision semantic samples in class decision annotation,
Figure 188559DEST_PATH_IMAGE016
Annotate the number of attributes corresponding to the decision;
选取所述第一信息增益最大的第一决策标注作为所述决策树模型的第二根节点,在所述第一决策标注对应的属性上分裂出第一左节点和第二右节点;Selecting the first decision label with the largest first information gain as the second root node of the decision tree model, splitting the first left node and the second right node on the attribute corresponding to the first decision label; 逐一在未被选取的决策标注中选取所述第一信息增益最大的第二决策标注分配至所述第一左节点和所述第二右节点中;Selecting the second decision label with the largest information gain from the unselected decision labels one by one and assigning them to the first left node and the second right node; 当所述决策标注均被选取,得到所述决策树模型。When the decision labels are all selected, the decision tree model is obtained.
6.如权利要求1至5中任一项所述的基于大数据分析拦截的拦截反馈处理方法,其特征在于,所述对所述拦截评分大于预设评分阈值的访问信息进行拦截,包括:6. The interception feedback processing method based on big data analysis interception according to any one of claims 1 to 5, wherein the interception of access information whose interception score is greater than a preset scoring threshold comprises: 提取所述访问信息的访问参数;Extracting access parameters of the access information; 利用预设的拦截器对所述访问参数进行拦截。The access parameter is intercepted by using a preset interceptor. 7.如权利要求5所述的基于大数据分析拦截的拦截反馈处理方法,其特征在于,利用所述第二子决策树集群对所述决策树模型进行反馈调整,包括:7. the interception feedback processing method based on big data analysis interception as claimed in claim 5, is characterized in that, utilizes described second sub-decision tree cluster to carry out feedback adjustment to described decision tree model, comprising: 计算所述第二子决策树集群中第二决策标注的第二信息增益;calculating a second information gain for a second decision label in the second sub-decision tree cluster; 选取所述第一信息增益和所述第二信息增益中最大的信息增益对应的决策标注为所述决策树模型的第三根节点,在所述第三根节点对应的属性上分裂出属性节点;Select the decision label corresponding to the largest information gain among the first information gain and the second information gain as the third root node of the decision tree model, and split the attribute node on the attribute corresponding to the third root node ; 利用如下的分裂算法确定所述属性节点的最佳分裂节点:Utilize the following splitting algorithm to determine the optimal splitting node of the attribute node:
Figure 327416DEST_PATH_IMAGE017
Figure 327416DEST_PATH_IMAGE017
其中,
Figure 707582DEST_PATH_IMAGE018
为所述最佳分裂节点的增益值,
Figure 691719DEST_PATH_IMAGE019
为划分搭配左子树中所有样本的梯度之和,
Figure 473730DEST_PATH_IMAGE020
为划分搭配右子树中所有样本的梯度之和,
Figure 517909DEST_PATH_IMAGE021
为划分搭配左子树中所有样本的二阶导数之和,
Figure 385371DEST_PATH_IMAGE022
为划分搭配右子树中所有样本的二阶导数之和,
Figure 173198DEST_PATH_IMAGE023
为正则化常数;
in,
Figure 707582DEST_PATH_IMAGE018
is the gain value of the best split node,
Figure 691719DEST_PATH_IMAGE019
is the sum of the gradients of all samples in the left subtree for the partition collocation,
Figure 473730DEST_PATH_IMAGE020
is the sum of the gradients of all samples in the right subtree of the partition collocation,
Figure 517909DEST_PATH_IMAGE021
is the sum of the second derivatives of all samples in the left subtree of the partition collocation,
Figure 385371DEST_PATH_IMAGE022
is the sum of the second derivatives of all samples in the right subtree of the partition collocation,
Figure 173198DEST_PATH_IMAGE023
is a regularization constant;
将所述第一决策标注对应的第一信息增益和所述第二决策标注对应的第二信息增益的最大值分配至所述最佳分裂节点中;Allocating the maximum value of the first information gain corresponding to the first decision label and the second information gain corresponding to the second decision label to the optimal split node; 当所述第一子决策树和所述第二子决策树中有未被选取的决策标注时,对所述决策树模型进行迭代,直到所述决策标注均被选取,完成所述决策树模型的反馈调整。When there are unselected decision labels in the first sub-decision tree and the second sub-decision tree, iterate the decision tree model until all the decision labels are selected, and complete the decision tree model feedback adjustments.
CN202211093209.8A 2022-09-08 2022-09-08 Interception feedback processing method based on big data analysis interception Active CN115168848B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211093209.8A CN115168848B (en) 2022-09-08 2022-09-08 Interception feedback processing method based on big data analysis interception

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211093209.8A CN115168848B (en) 2022-09-08 2022-09-08 Interception feedback processing method based on big data analysis interception

Publications (2)

Publication Number Publication Date
CN115168848A CN115168848A (en) 2022-10-11
CN115168848B true CN115168848B (en) 2022-12-16

Family

ID=83482076

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211093209.8A Active CN115168848B (en) 2022-09-08 2022-09-08 Interception feedback processing method based on big data analysis interception

Country Status (1)

Country Link
CN (1) CN115168848B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116693163B (en) * 2023-07-21 2023-12-05 耀昶嵘相变材料科技(广东)有限公司 Control method, terminal and system of sludge drying system

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107404473A (en) * 2017-06-06 2017-11-28 西安电子科技大学 Based on Mshield machine learning multi-mode Web application means of defences
CN108616498A (en) * 2018-02-24 2018-10-02 国家计算机网络与信息安全管理中心 A kind of web access exceptions detection method and device
CN108733966A (en) * 2017-04-14 2018-11-02 国网重庆市电力公司 A kind of multidimensional electric energy meter field thermodynamic state verification method based on decision woodlot
CN108764273A (en) * 2018-04-09 2018-11-06 中国平安人寿保险股份有限公司 A kind of method, apparatus of data processing, terminal device and storage medium
CN109978650A (en) * 2017-12-28 2019-07-05 北京京东尚科信息技术有限公司 Construct the method and system of decision tree
CN110311902A (en) * 2019-06-21 2019-10-08 北京奇艺世纪科技有限公司 A kind of recognition methods of abnormal behaviour, device and electronic equipment
CN110602137A (en) * 2019-09-25 2019-12-20 光通天下网络科技股份有限公司 Malicious IP and malicious URL intercepting method, device, equipment and medium
EP3869374A2 (en) * 2020-10-30 2021-08-25 Beijing Baidu Netcom Science And Technology Co., Ltd. Method, apparatus and electronic device for processing user request and storage medium
CN113364788A (en) * 2021-06-11 2021-09-07 广州洪昇软件和信息技术有限公司 Protection configuration updating method based on big data and AI and big data defense system
CN113468539A (en) * 2021-06-15 2021-10-01 江苏大学 Attack program identification method based on vulnerability attack database and decision tree
CN113658002A (en) * 2021-08-17 2021-11-16 中国平安财产保险股份有限公司 Decision tree-based transaction result generation method and device, electronic equipment and medium
CN113706322A (en) * 2021-08-31 2021-11-26 康键信息技术(深圳)有限公司 Service distribution method, device, equipment and storage medium based on data analysis
WO2021249086A1 (en) * 2020-06-12 2021-12-16 深圳前海微众银行股份有限公司 Multi-party joint decision tree construction method, device and readable storage medium
CN114117079A (en) * 2021-12-07 2022-03-01 宁安市伟恒互联网信息服务有限公司 Interception feedback processing method and information interception system based on big data analysis interception
CN114462625A (en) * 2022-02-25 2022-05-10 北京百度网讯科技有限公司 Method, device, electronic device and program product for generating decision tree

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8966074B1 (en) * 2013-09-13 2015-02-24 Network Kinetix, LLC System and method for real-time analysis of network traffic
US9565203B2 (en) * 2014-11-13 2017-02-07 Cyber-Ark Software Ltd. Systems and methods for detection of anomalous network behavior

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108733966A (en) * 2017-04-14 2018-11-02 国网重庆市电力公司 A kind of multidimensional electric energy meter field thermodynamic state verification method based on decision woodlot
CN107404473A (en) * 2017-06-06 2017-11-28 西安电子科技大学 Based on Mshield machine learning multi-mode Web application means of defences
CN109978650A (en) * 2017-12-28 2019-07-05 北京京东尚科信息技术有限公司 Construct the method and system of decision tree
CN108616498A (en) * 2018-02-24 2018-10-02 国家计算机网络与信息安全管理中心 A kind of web access exceptions detection method and device
CN108764273A (en) * 2018-04-09 2018-11-06 中国平安人寿保险股份有限公司 A kind of method, apparatus of data processing, terminal device and storage medium
CN110311902A (en) * 2019-06-21 2019-10-08 北京奇艺世纪科技有限公司 A kind of recognition methods of abnormal behaviour, device and electronic equipment
CN110602137A (en) * 2019-09-25 2019-12-20 光通天下网络科技股份有限公司 Malicious IP and malicious URL intercepting method, device, equipment and medium
WO2021249086A1 (en) * 2020-06-12 2021-12-16 深圳前海微众银行股份有限公司 Multi-party joint decision tree construction method, device and readable storage medium
EP3869374A2 (en) * 2020-10-30 2021-08-25 Beijing Baidu Netcom Science And Technology Co., Ltd. Method, apparatus and electronic device for processing user request and storage medium
CN113364788A (en) * 2021-06-11 2021-09-07 广州洪昇软件和信息技术有限公司 Protection configuration updating method based on big data and AI and big data defense system
CN113468539A (en) * 2021-06-15 2021-10-01 江苏大学 Attack program identification method based on vulnerability attack database and decision tree
CN113658002A (en) * 2021-08-17 2021-11-16 中国平安财产保险股份有限公司 Decision tree-based transaction result generation method and device, electronic equipment and medium
CN113706322A (en) * 2021-08-31 2021-11-26 康键信息技术(深圳)有限公司 Service distribution method, device, equipment and storage medium based on data analysis
CN114117079A (en) * 2021-12-07 2022-03-01 宁安市伟恒互联网信息服务有限公司 Interception feedback processing method and information interception system based on big data analysis interception
CN114462625A (en) * 2022-02-25 2022-05-10 北京百度网讯科技有限公司 Method, device, electronic device and program product for generating decision tree

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Closed-Loop Restoration Approach to Blurry Images Based on Machine Learning and Feedback Optimization;Saqib Yousaf 等;《 IEEE Transactions on Image Processing》;20151019;第24卷(第12期);5928-5941 *
基于决策属性挑选策略的改进的决策树算法;周艳等;《沈阳师范大学学报(自然科学版)》;20110115;第29卷(第01期);66-70 *
自适应软件的策略自动生成与演化;林华山 等;《计算机科学》;20171130;第44卷(第11期);9-14 *

Also Published As

Publication number Publication date
CN115168848A (en) 2022-10-11

Similar Documents

Publication Publication Date Title
US11190562B2 (en) Generic event stream processing for machine learning
US10089384B2 (en) Machine learning-derived universal connector
US20170109657A1 (en) Machine Learning-Based Model for Identifying Executions of a Business Process
CN110855648B (en) Early warning control method and device for network attack
US11042581B2 (en) Unstructured data clustering of information technology service delivery actions
US20170109676A1 (en) Generation of Candidate Sequences Using Links Between Nonconsecutively Performed Steps of a Business Process
US20170109667A1 (en) Automaton-Based Identification of Executions of a Business Process
US20170109668A1 (en) Model for Linking Between Nonconsecutively Performed Steps in a Business Process
US20170109636A1 (en) Crowd-Based Model for Identifying Executions of a Business Process
CN112732567B (en) Mock data testing method and device based on ip, electronic equipment and storage medium
US20170109639A1 (en) General Model for Linking Between Nonconsecutively Performed Steps in Business Processes
US20210150631A1 (en) Machine learning approach to automatically disambiguate ambiguous electronic transaction labels
US20170109638A1 (en) Ensemble-Based Identification of Executions of a Business Process
CN114756669A (en) Intelligent analysis method and device for problem intention, electronic equipment and storage medium
CN114844792A (en) Dynamic monitoring method, device, equipment and storage medium based on LUA language
US20170109640A1 (en) Generation of Candidate Sequences Using Crowd-Based Seeds of Commonly-Performed Steps of a Business Process
CN115168848B (en) Interception feedback processing method based on big data analysis interception
CN110572402B (en) Internet hosting website detection method and system based on network access behavior analysis and readable storage medium
US20170109637A1 (en) Crowd-Based Model for Identifying Nonconsecutive Executions of a Business Process
CN114610980A (en) Network public opinion based black product identification method, device, equipment and storage medium
US20170109670A1 (en) Crowd-Based Patterns for Identifying Executions of Business Processes
CN114518993A (en) System performance monitoring method, device, equipment and medium based on business characteristics
CN116155628A (en) Network security detection method, training device, electronic equipment and medium
CN115237941A (en) Data reporting method and device, electronic equipment and computer readable storage medium
CN114625755A (en) Script checking method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Intercept feedback processing method based on big data analysis interception

Granted publication date: 20221216

Pledgee: Bank of Beijing Limited by Share Ltd. Nanjing branch

Pledgor: Nanjing Dingshan Information Technology Co.,Ltd.

Registration number: Y2025980004736

PE01 Entry into force of the registration of the contract for pledge of patent right