Method and apparatus for detecting anomaly based on behavior-analysis
First Claim
1. A method for detecting an anomaly based on behavior-analysis, the method comprising:
- creating, by an apparatus for detecting an anomalous behavior of a user, K clusters, each cluster of the K clusters being created based on past behavior counters associated with one or more users;
designating, by the apparatus, a cluster pattern of the each cluster of the K clusters, the cluster pattern indicating a representative behavior of the past behavior counters belonging to the each cluster;
determining, by the apparatus, a past behavior pattern of a first user based on first past behavior counters associated with the first user and the each cluster of the K clusters;
obtaining, by the apparatus, first current behavior counters associated with the first user based on monitoring information from an agent software program, the agent software program being installed on a computing device of the first user and monitoring behaviors associated with the first user;
determining, by the apparatus, a current behavior pattern of the first user based on the first current behavior counters and the each cluster of the K clusters; and
detecting, by the apparatus, the anomalous behavior of the first user by comparing the past behavior pattern and the current behavior pattern of the first user,wherein the designating the cluster pattern comprises;
extracting a center vector of the each cluster of the K clusters by using values of the past behavior counters belonging to respective clusters;
calculating a mean value and a standard deviation of coordinates of the center vector for the each cluster of the K clusters;
setting a threshold value for the each cluster of the K clusters by using the mean value and the standard deviation; and
selecting a behavior corresponding to coordinates exceeding the threshold value among the coordinates of the center vector as the cluster pattern of the each cluster of the K clusters.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided are a method for detecting an anomaly based on behavior-analysis. The method comprises creating, by an apparatus for detecting an anomalous behavior of a user, K clusters, each cluster of the K clusters being created based on past behavior counters associated with one or more users, designating, by the apparatus, a cluster pattern of the each cluster of the K clusters, the cluster pattern indicating a representative behavior of the past behavior counters belonging to the each cluster, determining, by the apparatus, a past behavior pattern of a first user based on a first past behavior counters associated with the first user and the each cluster of the K clusters, obtaining, by the apparatus, a first current behavior counters associated with the first user based on monitoring information from an agent software program, the agent software program being installed on a computing device of the first user and monitoring behaviors associated with the first user, determining, by the apparatus, a current behavior pattern of the first user based on the first current behavior counters and the each cluster of the K clusters and detecting, by the apparatus, the anomalous behavior of the first user by comparing the past behavior pattern and the current behavior pattern of the first user.
6 Citations
17 Claims
-
1. A method for detecting an anomaly based on behavior-analysis, the method comprising:
-
creating, by an apparatus for detecting an anomalous behavior of a user, K clusters, each cluster of the K clusters being created based on past behavior counters associated with one or more users; designating, by the apparatus, a cluster pattern of the each cluster of the K clusters, the cluster pattern indicating a representative behavior of the past behavior counters belonging to the each cluster; determining, by the apparatus, a past behavior pattern of a first user based on first past behavior counters associated with the first user and the each cluster of the K clusters; obtaining, by the apparatus, first current behavior counters associated with the first user based on monitoring information from an agent software program, the agent software program being installed on a computing device of the first user and monitoring behaviors associated with the first user; determining, by the apparatus, a current behavior pattern of the first user based on the first current behavior counters and the each cluster of the K clusters; and detecting, by the apparatus, the anomalous behavior of the first user by comparing the past behavior pattern and the current behavior pattern of the first user, wherein the designating the cluster pattern comprises; extracting a center vector of the each cluster of the K clusters by using values of the past behavior counters belonging to respective clusters; calculating a mean value and a standard deviation of coordinates of the center vector for the each cluster of the K clusters; setting a threshold value for the each cluster of the K clusters by using the mean value and the standard deviation; and selecting a behavior corresponding to coordinates exceeding the threshold value among the coordinates of the center vector as the cluster pattern of the each cluster of the K clusters. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. An apparatus for detecting an anomalous behavior of a user based on behavior-analysis, the apparatus comprising:
-
at least one processor; a network interface; a memory configured to load a computer program; and storage configured to store the computer program which, when executed by the at least one processor, causes the at least one processor to perform operations comprising; creating K clusters, each cluster of the K clusters being created based on past behavior counters associated with one or more users; designating a cluster pattern of the each cluster of the K clusters, the cluster pattern indicating a representative behavior of the past behavior counters belonging to the each cluster; determining a past behavior pattern of a first user based on a first past behavior counter associated with the first user and the each cluster of the K clusters; obtaining first current behavior counters associated with the first user based on monitoring information from an agent software program installed on a computing device of the first user; determining a current behavior pattern of the first user based on the first current behavior counters and the each cluster of the K clusters; and detecting the anomalous behavior of the first user by comparing the past behavior pattern and the current behavior pattern of the first user, wherein the designating the cluster pattern comprises; extracting a center vector of the each cluster of the K clusters by using values of the past behavior counters belonging to respective clusters; calculating a mean value and a standard deviation of coordinates of the center vector for the each cluster of the K clusters; setting a threshold value for the each cluster of the K clusters by using the mean value and the standard deviation; and selecting a behavior corresponding to coordinates exceeding the threshold value among the coordinates of the center vector as the cluster pattern of the each cluster of the K clusters.
-
-
17. A non-transitory computer-readable storage medium storing instructions which, when executed by a processor, cause the processor to perform operations comprising:
-
creating K clusters, each cluster of the K clusters being created based on past behavior counters associated with one or more users; designating a cluster pattern of the each cluster of the K clusters, the cluster pattern indicating a representative behavior of the past behavior counters belonging to the each cluster; determining a past behavior pattern of a first user based on a first past behavior counter associated with the first user and the each cluster of the K clusters; obtaining first current behavior counters associated with the first user based on monitoring information from an agent software program installed on a computing device of the first user; determining a current behavior pattern of the first user based on the first current behavior counters associated with the first user and the each cluster of the K clusters; and detecting an anomalous behavior of the first user by comparing the past behavior pattern and the current behavior pattern of the first user, wherein the designating the cluster pattern comprises; extracting a center vector of the each cluster of the K clusters by using values of the past behavior counters belonging to respective clusters; calculating a mean value and a standard deviation of coordinates of the center vector for the each cluster of the K clusters; setting a threshold value for the each cluster of the K clusters by using the mean value and the standard deviation; and selecting a behavior corresponding to coordinates exceeding the threshold value among the coordinates of the center vector as the cluster pattern of the each cluster of the K clusters.
-
Specification