SYSTEM FOR DETECTING ABNORMAL BEHAVIOR BY ANALYZING PERSONALIZED INITIAL USE BEHAVIOR PATTERN

Information

  • Patent Application
  • 20160197948
  • Publication Number
    20160197948
  • Date Filed
    January 16, 2015
    9 years ago
  • Date Published
    July 07, 2016
    8 years ago
Abstract
An abnormal behavior detection system includes a context information reception unit receiving a variety of types of context information from a context information collection system, a context information processing unit generating a corresponding detection request message when context information about web service use is received and transfer the corresponding detection request message to an abnormal detection unit, an abnormal detection unit comparing sequence of a use page and use speed, performed right after user access, with a pattern in the past access through an analysis of an initial use behavior pattern when the detection request message is received and to detect an abnormal use behavior, a profile management unit profiling pieces of context information according to various use behaviors of the user and store and manage the pieces of profiled context information, and an information analysis unit analyzing web site or DB use information.
Description
CROSS REFERENCE TO RELATED APPLICATION

The present application claims the benefit of Korean Patent Application No. 10-2015-0000990 filed in the Korean Intellectual Property Office on Jan. 6, 2015, the entire contents of which are incorporated herein by reference.


BACKGROUND OF THE INVENTION

1. Technical Field


The present invention relates to a bring your own device (BYOD) and a system for protecting internal resources in a smart work environment, more particularly, to a BYOD and system for detecting an abnormal behavior in a smart work environment.


2. Description of the Related Art


The spread of internet infrastructure and the development of mobile communication have resulted in a significant change that may be a revolution in our society. In particular, mobile devices, such as smart phones, have been deeply seated in our life out of simple communication means. This trend spreads to our jobs at work, and thus a new business environment of a concept of a BYOD has emerged. The BYOD is a concept in which personal devices are used in tasks. The BYOD refers to all the technologies, concepts, and policies for accessing IT resources within companies, such as databases and applications within the companies, and processing tasks using personal mobile devices, such as smart phones, laptops, and tablets. The BYOD may expect speed, efficiency, and productivity of tasks through more efficient task processing and has no economic burden of supplying separate task devices because personal devices are used from a viewpoint of companies. For this reason, many companies are taking into consideration the successful introduction of the BYOD. Furthermore, it has been found that users already use their personal devices in tasks before companies are read.


The formation of the BYOD and smart work environments, that is, new IT environments, has been accelerated due to the construction of wireless Internet environments, the popularization of smart devices, such as tablet PCs and smart phones, the virtualization of desktops, an increase of cloud service utilization, and attaching greater importance to real-time communication and business continuity.


Furthermore, as a BYOD era arrives, infrastructure within a company changes from a closed environment to an open environment. Access to company infrastructure using personal devices are permitted at any time, and anywhere.


Company infrastructure can be accessed using personal devices through wireless sharers (APs) and switches within companies. Company infrastructure may also be accessed using personal devices outside companies over mobile communication networks, Wi-Fi, and VPNs.


As described above, a change to an open environment has obtained business continuity and convenience. In contrast, security threats that have not been expected before may occur. If personal devices access infrastructure within companies, a possibility that data within the companies may leak is increased. That is, there is a possibility that data within companies may leak due to a loss or theft of personal devices, and company IT assets may be threatened because personal devices affected with malware access internal intranets.


SUMMARY OF THE INVENTION

Accordingly, the present invention has been made keeping in mind the above problems occurring in the prior art, and an object of the present invention is to provide an abnormality detection system for processing information about the situations of BYOD and smart work environments, configuring a user profile, and detecting an abnormal behavior based on the processed information and the configured user profile in order to detect abnormal access using devices and real-time abnormal use behaviors.


Another object of the present invention is to provide an abnormal behavior detection system for comparing sequence of a use page and use speed, performed right after user access, with a pattern in the past access through an analysis of an initial use behavior pattern and detecting an abnormal use behavior.


Additional characteristics and advantages of the present invention will be described in the following description and will be partially made evident by the description or understood by the execution of the present invention. The object and other advantages of the present invention will be implemented by, in particular, structures written in the claims in addition to the following description and the accompanying drawings.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is an exemplary diagram illustrating BYOD and smart work environments;



FIG. 2 is a block diagram of an abnormal behavior detection system in accordance with an embodiment of the present invention;



FIG. 3 is a block diagram of an abnormal detection unit in accordance with an embodiment of the present invention;



FIG. 4 is a flowchart illustrating the operation of a context information processing unit in accordance with an embodiment of the present invention;



FIG. 5A is a flowchart illustrating the operation of an abnormal detection unit in accordance with an embodiment of the present invention;



FIG. 5B is a flowchart illustrating an initial use behavior pattern analysis procedure in accordance with an embodiment of the present invention;



FIG. 5C is a flowchart illustrating a comparison between LCSs in accordance with an embodiment of the present invention;



FIG. 6A is a diagram illustrating a current occurrence context information processing table for analyzing and detecting an initial use behavior pattern;



FIG. 6B is a diagram illustrating a past behavior information processing table for analyzing and detecting an initial use behavior pattern; and



FIG. 7 is an exemplary diagram of an operation for analyzing and detecting an initial use behavior pattern in accordance with an embodiment of the present invention.





DESCRIPTION OF REFERENCE NUMERALS OF PRINCIPAL ELEMENTS IN THE DRAWINGS


100: context information collection system



200: abnormal behavior detection system



210: context information reception unit



220: context information processing unit



230: abnormal detection unit



250: profile management unit



260: information analysis unit



270: storage unit



300: control system 400: personal device



500: security system


DETAILED DESCRIPTION

In accordance with an embodiment of the present invention, an abnormal behavior detection system for detecting an abnormal use behavior of a user in bring your own device (BYOD) and smart work environment is configured to include a context information reception unit configured to receive a variety of types of context information from a context information collection system, a context information processing unit configured to generate a corresponding detection request message when context information about “web service use” is received and transfer the corresponding detection request message to an abnormal detection unit, an abnormal detection unit configured to compare sequence of a use page and use speed, performed right after user access, with a pattern in past access through an analysis of an initial use behavior pattern when the detection request message is received and to detect an abnormal use behavior, a profile management unit configured to profile pieces of context information according to various use behaviors of the user and store and manage the pieces of profiled context information, and an information analysis unit configured to analyze web site or DB use information based on the pieces of received context information.


In accordance with an embodiment of the present invention, an abnormal behavior method of detecting an abnormal use behavior of a user in bring your own device (BYOD) and smart work environments includes generating a corresponding detection request message when context information about “termination or access termination” is received from a context information collection system and transferring the corresponding detection request message to an abnormal detection unit, detecting an abnormal use behavior by comparing sequence of a use page and use speed, performed right after user access, with a pattern in past access through an analysis of an initial use behavior pattern after the abnormal detection unit receives the detection request message, and generating normal or abnormal detection result information based on a result of the analysis of the continuous use behavior pattern and transferring the normal or abnormal detection result information to a control system.


Hereinafter, some embodiments of the present invention are described in detail with reference to the accompanying drawings in order to those skilled in the art to which the present invention pertains to easily practice the present invention. The same or similar reference numerals are used to denote the same or similar functions throughout the drawings.


A BYOD and smart work service determine whether a user behavior is abnormal in real time by analyzing context information about a user who accesses/uses service within a company and may control the access/use of a corresponding user, if necessary. The abnormal behavior detection system in accordance with an embodiment of the present invention determines whether a user behavior is abnormal based on a previously constructed normal profile, a predetermined security policy, or a behavior that is now being generated.


The context information means information that is collected by a collection system and transmitted to the abnormal behavior detection system and that is related to the access, use, and termination of a user. The profile is an information set that is used to identify a user and that is quantified information of behaviors of the user. The profile is user information that has been accumulated and patterned from the past. A series of behaviors for managing a profile, such as the creation, modification, deletion, and storage of the profile, is called profiling.



FIG. 1 is an exemplary diagram illustrating BYOD and smart work environments.


As illustrated in FIG. 1, the BYOD and smart work environments are implemented to include a context information collection system 100, an abnormal behavior detection system 200, a control system 300, a personal device 400, and a security system 500 (e.g., an MDM server or an NAC server).


The context information collection system 100 collects pieces of context information related to certification, access, and access termination from the personal device 400 and an MDM agent device.


The collected context information may include an access address (e.g., an ID, his/her place, right, and a current state), access patterns (a result of certification and the number of certification failures), network behavior information (e.g., an access time and a location), and access termination time information. The context information consists of periodic transmission data and real-time transmission data. The context information collection system 100 considers both the periodic transmission data and the real-time transmission data to be real-time transmission data and collects them.


The abnormal behavior detection system 200 basically includes a context information reception unit, a context information processing unit, and an abnormal behavior detection unit. As illustrated in FIG. 1, the abnormal behavior detection system 200 receives context information from the context information collection system 100, detects an abnormal behavior, and sends the detected results to the control system 300 (e.g., dynamic access control middleware).


The abnormal behavior detection system 200 sorts pieces of the context information, received from the context information collection system 100, according to service access sessions, processes the pieces of context information, if necessary, and generates an access ID and a device ID and additional information, such past behavior pattern information. Furthermore, the abnormal behavior detection system 200 patterns accumulated data for each user ID and generates and updates a profile. The abnormal behavior detection system 200 determines whether a user behavior is abnormal using processed information regarding service access and a user in accordance with a security policy and the normal profile of a corresponding user. The detection results of the abnormal behavior detection system 200 are transmitted to the control system 300 in real time.


The control system 300 receives pieces of abnormal behavior information detected by the abnormal behavior detection system 200, performs control through a control GUI or establishes and manages a security policy, and operates in conjunction with external security devices. The control system 300 is connected to the abnormal behavior detection system 300 and external security devices (e.g., GENIAN and WAPPLES).


The personal device 400 is a personal mobile device, such as a smart phone, a laptop computer, or a tablet computer, and is capable of accessing IT resources within a company, such as a database or an application. A user processes tasks through the personal device 400.


The personal device 400 generates context information related to the certification, access, and access termination in the bring your own device (BYOD) and smart work environments. In this case, the context information is the same as that described above.


The security system 500 is placed in a DMZ or screened subnet, and it performs certification connection between an internal network and the personal device 400 and a gateway function for communication, such as direct push update. A plurality of agents accesses the security system 500, thus generating the aforementioned context information.



FIG. 2 is a block diagram of the abnormal behavior detection system in accordance with an embodiment of the present invention.


As illustrated in FIG. 2, the abnormal behavior detection system 200 in accordance with an embodiment of the present invention is configured to include a context information reception unit 210, a context information processing unit 220, an abnormal detection unit 230, a profile management unit 250, an information analysis unit 260, and a storage unit 270.


The context information reception unit 210 receives a variety of types of context information, such as the “network access”, “service use”, “access termination” of a user, from the context information collection system 100 physically separated from the abnormal behavior detection system 200 and transfer the variety of types of context information to the context information processing unit 220 and the information analysis unit 260.


All the pieces of context information are transferred to the context information processing unit 220, whereas pieces of user context information, such as web service use request/response information, DB SQL batch request/response information, and DB RPC request/response information, are transferred to the information analysis unit 260. The information analysis unit 260 receives the pieces of context information and analyzes web site and DB use information.


As illustrated in FIG. 4, the context information processing unit 220 sorts pieces of context information received from the context information collection system 100 according to their types, processes the pieces of context information, and stores the pieces of context information based on each access session of a user.


The context information processing unit 220 processes the pieces of context information, such as “network access”, “service use”, and “access termination” received from the context information reception unit 210, and stores the pieces of context information in a temporary repository on one side of the storage unit 270. In this case, the type of temporary repository may be a DB, a file, or memory.


The context information processing unit 220 combines and processes the pieces of context information based on each access ID, stores the pieces of context information in the temporary repository, and uses information processed by a detection module. The access ID may have a combination of an access address and a session ID.


If context information about “network access” is received, the context information processing unit 220 performs a process of adding or updating access information depending on a result of certification and whether user access information is present. The context information related to the “network access” may include a normal certification success, a normal certification failure, enhanced certification, agent installation certification, and agent access information.


If context information about “service use” is received, the context information processing unit 220 updates service use information based on the same access ID.


Furthermore, if context information about “DB use” is received, the context information processing unit 220 updates corresponding information with processed information. Furthermore, if context information about “change of agent” is received, the context information processing unit 220 examines an UAID and updates user's processed information that complies with corresponding information. Furthermore, if context information about “access termination” is received, the context information processing unit 220 updates the termination processing and access termination time of a current access ID.


After all the pieces of context information are received, the context information processing unit 220 generates a detection request message and sends it to the abnormal detection unit 230.


The abnormal detection unit 230 sorts detection request messages and analyzes and detects an abnormal behavior for a user's network use. As illustrated in FIG. 3, the abnormal detection unit 230 is configured to include a detection request classification module 232, an abnormal behavior analysis module 234, and an abnormal behavior detection module 236. FIG. 3 is a block diagram of the abnormal detection unit in accordance with an embodiment of the present invention.


When a variety of types of context information are received, the detection request classification module 232 sorts detection request messages and transfers them to the analysis units 234a to 234g of the abnormal behavior analysis module 234 for executing analyses.


The abnormal behavior analysis module 234 is a module for analyzing a variety of types abnormal behaviors and is configured to include normal profile-based behavior analysis units 234a, 234b, and 234c, a continuous behavior analysis unit 234d, an abnormal web path use analysis unit 234e, a policy analysis unit 234f, and an abnormal DB use user tracking unit 234g. The analysis units 234a to 234g of the abnormal behavior analysis module 234 perform different information analyses depending on the type of received context information.


The normal profile-based behavior analysis units 234a, 234b, and 234c compare a user behavior during the entire access period, an initial use behavior, and an abnormal access behavior with the analysis values of pieces of the past normal profile information and analyze differences from normal behaviors.


The continuous behavior analysis unit 234d analyzes whether pieces of use context information consecutively received in a current access session repetitively execute the same behavior.


The abnormal web path use analysis unit 234e performs a comparison on the URI of use context information that is currently received in the previous service use page of a user through a previously analyzed service web site structure and analyzes an abnormal behavior that is unable to be accessed by the behaviors of the user.


The policy analysis unit 234f determines whether user-processed information that is now being subject to service access and used and a profile is abnormal. The policy analysis unit 234f determines normality and abnormality based on a preset security policy.


A security policy set by an administrator includes control results applied when a series of conditions (or criteria) are satisfied. The security policy of an individual system to be developed is set using user-processed information and the type of information that is used to configure profile information.


If an abnormal behavior is detected according to a policy set based on DB use context information, the abnormal DB use user tracking unit 234g tracks a user who may generate an abnormal behavior using previously written DB-query occurrence information.


If a behavior analysis result is stored in the abnormal behavior analysis module 234, the abnormal behavior detection module 236 determines whether a behavior analysis value is abnormal, generates detection information, and transfers the detection information to the control system 300. If an abnormal behavior is not detected when user access termination context information is received, the abnormal behavior detection module 236 sends a profile creation message to a profile management unit 250. Furthermore, the profile management unit 250 generates a profile based on the contents of normal/access termination.


As illustrated in FIG. 6B, the profile management unit 250 generates profile information by profiling pieces of context information according to various use behaviors of a user and stores and manages the profile information.


When the context information reception unit 210 receives a variety of types of context information, such as “network access”, “service use”, and “access termination” related to a user, the information analysis unit 260 analyzes web site and DB use information based on the pieces of received context information.


Next, the storage unit 270 stores profile information and information processed into access, use, and agent context information. Pieces of context information collected by the context information collection system 100 is processed into access, use, and agent context information, and context information upon access termination is processed into profile information and stored in the storage unit 270.


In this case, the stored profile information includes a user profile, a terminal device profile, and an access behavior profile. The user profile includes user right information, a total number of certification failures, the latest access date, the first access date, a total user time, and a total access number. The terminal device profile includes a device ID, a type, an OS, a browser, a device name, MAC, whether an agent has been installed, whether a screen has been locked, installed program information, automatic login setting, and the latest access date. Furthermore, the access behavior profile includes access behavior pattern information.



FIG. 4 is a flowchart illustrating the operation of the context information processing unit 220 in accordance with an embodiment of the present invention.


As illustrated in FIG. 4, the context information processing unit 220 in accordance with an embodiment of the present invention sorts pieces of context information by context information code, processes the pieces of processed information, and stores them in a temporary repository.


Pieces of context information received through the context information reception unit 210 are sorted by context information because they are different in the type of information and are stored based on information capable of identifying users, such as an access ID, a user ID, and an UAID.


In the case of “access” context information, if current access information is not present, the context information processing unit 220 generates the “access” context information as new access. If existing access information is present, the context information processing unit 220 updates the corresponding information.


In the case of “service use” context information, the context information processing unit 220 searches for a session that is being accessed based on an access ID, updates service use information, and computes related behavior analysis information.


In the case of “DB use” context information, the context information processing unit 220 continues to store the corresponding information in a repository until the corresponding information is used and deletes the past list of a certain time or more.


Furthermore, in the case of “change of agent/termination information, the context information processing unit 220 searches for a user who has a corresponding UAID and updates change information.


Furthermore, in the case of “termination” context information, the context information processing unit 220 terminates access to a corresponding access ID and updates processed information.



FIG. 5A is a flowchart illustrating the operation of the abnormal detection unit 230 in accordance with an embodiment of the present invention and relates to, in particular, the analysis of a user behavior pattern during the entire access period by the normal profile-based behavior analysis units that form the abnormal detection unit.


The abnormal detection unit 230 in accordance with an embodiment of the present invention sorts detection request messages and analyzes and detects an abnormal behavior for a user's network use. As illustrated in FIG. 3, the abnormal detection unit 230 is configured to include the detection request classification module 232, the abnormal behavior analysis module 234, and the abnormal behavior detection module 236.


The abnormal behavior analysis module 234 is a module for analyzing various patterns of abnormal behaviors and is configured to include the normal profile-based behavior analysis units 234a, 234b, and 234c, the continuous behavior analysis unit 234d, the abnormal web path use analysis unit 234e, the policy analysis unit 234f, and the abnormal DB use user tracking unit 234g.


The normal profile-based behavior analysis units 234a, 234b, and 234c compare a user behavior pattern during the entire access period, an initial use behavior pattern, and an abnormal access behavior pattern with the analysis values of pieces of the past normal profile information and analyze differences from normal behaviors. FIG. 6A is a diagram illustrating a current occurrence context information processing table for analyzing and detecting an initial use behavior pattern, and FIG. 6B is a diagram illustrating a past behavior information processing table for analyzing and detecting an initial use behavior pattern.


The normal profile-based behavior analysis unit in accordance with an embodiment of the present invention includes, in particular, the initial use behavior analysis unit 234b and performs pattern analyses of a user behavior during the entire access period, as illustrated in FIG. 3.


When context information about “web service use information” is input to the abnormal behavior detection system 200 and a corresponding detection request message is received from the context information processing unit 220, as illustrated in FIG. 5A, the initial use behavior analysis unit 234b first checks a service page use amount N in a current access session at steps S10-S20. In this process, the initial use behavior analysis unit 234b groups use behaviors for each service unit and counts the number of user behaviors in each service unit, as illustrated in a) of FIG. 7. FIG. 7 is an exemplary diagram of an operation for analyzing and detecting an initial use behavior pattern in accordance with an embodiment of the present invention.


At step S20, if the service page use amount N is greater than a reference value (e.g., 3), the initial use behavior analysis unit 234b determines that an initial behavior for analyzing an abnormal behavior has been sufficiently performed and starts analyzing an initial use behavior pattern.


In order to analyze the initial use behavior pattern, first, the initial use behavior analysis unit 234b obtains a current-initial service page use sequence and calculates use speed at step S30. Furthermore, the initial use behavior analysis unit 234b examines the past-initial service page use sequence having the same access pattern with reference to the profile management unit 250 and calculates the past average use speed at step S40.


Thereafter, as illustrated in FIG. 5B, the initial use behavior analysis unit 234b determines whether a user behavior is an abnormal behavior by performing a “service page use sequence similarity comparison” and a “user speed comparison” through an initial use behavior pattern analysis procedure at step S50. FIG. 5B is a flowchart illustrating an initial use behavior pattern analysis procedure in accordance with an embodiment of the present invention.


For the “service page use sequence similarity comparison”, as illustrated in FIG. 5C, first, the initial use behavior analysis unit 234b generates a specific comparison matrix in order to compare current “initial service page use sequence” at step S30 with the past “initial service page use sequence” at step S40. Next, the initial use behavior analysis unit 234b resets the value of each of the rows and columns of the comparison matrix to “0” at step S52a. FIG. 5C is a flowchart illustrating a comparison between LCSs in accordance with an embodiment of the present invention.


Thereafter, as illustrated in FIG. 5C, the initial use behavior analysis unit 234b calculates a similarity between the current and past “service page use sequence” and stores the calculated similarity at steps S52b and S52c. Furthermore, the initial use behavior analysis unit 234b repetitively performs such a similarity calculation procedure (S52a) and the comparison between LCSs and thus calculates similarity for all the past behaviors at step S52d.


Furthermore, the initial use behavior analysis unit 234b calculates the average of all the obtained similarity result values using Equation 1 below at step S54. In this case, the calculated average value is an occurrence probability P of a current-initial page sequence.





Occurrence probability P=similarity sum/total query item  (1)


Thereafter, as illustrated in b) of FIG. 7, the initial use behavior analysis unit 234b compares the occurrence probability P of Equation 1 with a reference value (e.g., X) at step S56.


If the occurrence probability P is the reference value (e.g., X) or more, the initial use behavior analysis unit 234b compares current-initial use speed with the past-initial use speed as illustrated in c) of FIG. 7, at step S58.


At step S59, the initial use behavior analysis unit 234b finally determines whether the current use behavior of the user is an abnormal behavior based on a result of the comparison at step S58.


If, as a result of the comparison, the current-initial use speed is within a normal range (e.g., within Z%) of the past-initial use speed, the initial use behavior analysis unit 234b determines the current use behavior of the user to be a normal behavior.


In contrast, if the occurrence probability P is found to be less than the reference value (e.g., X) or the current-initial use speed is out of the normal range (e.g., within Z%) of the past-initial use speed, the initial use behavior analysis unit 234b determines the current use behavior of the user to be an abnormal behavior.


After the current use behavior of the user is determined to be a normal or abnormal behavior, the abnormal behavior detection module 236 generates corresponding normal or abnormal detection result information and transfers the normal or abnormal detection result information to the control system 300.


If the current use behavior of the user is determined to be a normal behavior at step S60, the abnormal behavior detection module 236 generates a normal behavior detection result and updates processed information (e.g., initial use service) at steps S70 and S80.


If the current use behavior of the user is determined to be an abnormal behavior at step S60, the abnormal behavior detection module 236 generates an abnormal detection result and transfers a generated detection result (e.g., a normal behavior or an abnormal behavior) to the control system 300 at steps S90 and S95.


The abnormal behavior detection system 200 in accordance with an embodiment of the present invention may be implemented into a computer-readable recording medium using software or hardware or a combination of them.


According to hardware implementations, the abnormal behavior detection system 200 described in the present invention may be implemented using at least one of application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPD), programmable logic devices (PLDs), field programmable gate arrays (FPGAs), processors, controllers, microprocessors, and an electronic unit designed to perform a function. In some cases, the embodiments described in this specification may be implemented into the abnormal behavior detection system 200 itself.


As described above, in accordance with an embodiment of the present invention, unlike in existing security equipment based on a network through network traffic analyses, a scheme for patterning a behavior based on various behavior factors, such as the time, location, access network, and use device of a target object, and detecting an abnormal behavior has been implemented.


The abnormal behavior detection system in accordance with an embodiment of the present invention has been intended to improve the system security of BYOD and smart work environments. The abnormal behavior detection system processes pieces of context information into access, use, and agent context information and profile information and detects a behavior, such as the abnormal access and use of a terminal device, using an analysis of a personalized initial use behavior pattern.


In accordance with an embodiment of the present invention, in order to detect an abnormal access/use behavior, system security in BYOD and smart work environments has been improved using informal data that may occur in task scenarios, that is, the type and access time (e.g., business hours and out of hours) of a user device, an access location (e.g., in the company and outside the company), and a use time as user behavior patterns.


Although the present invention has been described with reference to the embodiments illustrated in the drawings, the embodiments are only illustrative. Those skilled in the art to which the present invention pertains may understand that various other modifications and equivalent embodiments are possible and some of or all the embodiments may be selectively combined. Accordingly, the true scope of the present invention should be determined by the technical spirit of the following claims.

Claims
  • 1. An abnormal behavior detection system for detecting an abnormal use behavior of a user in bring your own device (BYOD) and smart work environments, the system is configured to comprise: a context information reception unit configured to receive a variety of types of context information from a context information collection system;a context information processing unit configured to generate a corresponding detection request message when context information about “web service use” is received and transfer the corresponding detection request message to an abnormal detection unit;an abnormal detection unit configured to compare sequence of a use page and use speed, performed right after user access, with a pattern in past access through an analysis of an initial use behavior pattern when the detection request message is received and to detect an abnormal use behavior;a profile management unit configured to profile pieces of context information according to various use behaviors of the user and store and manage the pieces of profiled context information; andan information analysis unit configured to analyze web site or DB use information based on the pieces of received context information.
  • 2. The abnormal behavior detection system of claim 1, wherein the abnormal detection unit is configured to comprise: a detection request classification module configured to sort received detection request messages and transfer the sorted detection request messages to analysis units of the abnormal behavior analysis module;an abnormal behavior analysis module configured to analyze whether the web service use is normal by performing a “service page use sequence similarity comparison” and a “user speed comparison” through an initial use behavior pattern analysis procedure; andan abnormal behavior detection module configured to generate corresponding normal or abnormal detection result information when a result of the analysis of the abnormal behavior analysis module is stored and to transfer the corresponding normal or abnormal detection result information to the control system.
  • 3. The abnormal behavior detection system of claim 1, wherein the abnormal behavior analysis module is configured to: check a service page use amount N of a current access session,determine that an initial behavior for analyzing the abnormal behavior has been sufficiently performed if the service page use amount N is greater than a reference value and perform a specific initial use behavior pattern analysis procedure, anddetermine whether a current use behavior of a user is an abnormal behavior by performing a “service page use sequence similarity comparison” and a “user speed comparison” through the initial use behavior pattern analysis procedure.
  • 4. The abnormal behavior detection system of claim 3, wherein the initial use behavior pattern analysis procedure comprises: obtaining current-initial service page use sequence and calculating use speed;examining past-initial service page use sequence having an identical access pattern and calculating past average use speed;calculating an occurrence probability P of current-initial page sequence by calculating a similarity between the current “service page use sequence” and all the past “service page use sequences”;comparing current-initial use speed with past-initial use speed if the occurrence probability P is a reference value (e.g., X) or more; anddetermining the current use behavior of the user to be a normal behavior if the current-initial use speed is within a normal range of the past-initial use speed.
  • 5. The abnormal behavior detection system of claim 4, wherein calculating the occurrence probability P comprises: generating a specific comparison matrix in order to compare the current “service page use sequence” with the past “service page use sequence” and resetting a value of each of rows and columns of the comparison matrix;calculating the similarity between the current “service page use sequence” and all the past “service page use sequences”; andaveraging all similarity result values obtained in calculating the similarity and calculating the occurrence probability P of the current-initial page sequence.
  • 6. An abnormal behavior method of detecting an abnormal use behavior of a user in bring your own device (BYOD) and smart work environments, the method comprising: generating a corresponding detection request message when context information about “termination or access termination” is received from a context information collection system and transferring the corresponding detection request message to an abnormal detection unit;detecting an abnormal use behavior by comparing sequence of a use page and use speed, performed right after user access, with a pattern in past access through an analysis of an initial use behavior pattern after the abnormal detection unit receives the detection request message; andgenerating normal or abnormal detection result information based on a result of the analysis of the continuous use behavior pattern and transferring the normal or abnormal detection result information to a control system.
  • 7. The abnormal behavior method of claim 6, wherein detecting the abnormal use behavior comprises: checking a service page use amount N of a current access session,determining that an initial behavior for analyzing the abnormal behavior has been sufficiently performed if the service page use amount N is greater than a reference value and performing a specific initial use behavior pattern analysis procedure, anddetermining whether a current use behavior of the user is an abnormal behavior by performing a “service page use sequence similarity comparison” and a “user speed comparison” through an initial use behavior pattern analysis procedure.”
  • 8. The abnormal behavior method of claim 7, wherein the initial use behavior pattern analysis procedure comprises: obtaining current-initial service page use sequence and calculating use speed;examining past-initial service page use sequence having an identical access pattern and calculating past average use speed;calculating an occurrence probability P of current-initial page sequence by calculating a similarity between the current “service page use sequence” and all the past “service page use sequences”;comparing current-initial use speed with past-initial use speed if the occurrence probability P is a reference value (e.g., X) or more; anddetermining the current use behavior of the user to be a normal behavior if the current-initial use speed is within a normal range of the past-initial use speed.
  • 9. The abnormal behavior method of claim 8, wherein calculating the occurrence probability P comprises: generating a specific comparison matrix in order to compare the current “service page use sequence” with the past “service page use sequence” and resetting a value of each of rows and columns of the comparison matrix;calculating the similarity between the current “service page use sequence” and all the past “service page use sequences”; andaveraging all similarity result values obtained in calculating the similarity and calculating the occurrence probability P of the current-initial page sequence.
Priority Claims (1)
Number Date Country Kind
10-2015-0000990 Jan 2015 KR national