Abstract: Method of processing security data of a computer network (R) including a plurality of users (U1-U4), this method including the following steps:—analyzing data relating to at least one content or service accessed by at least one of the users (U1-U4) through the network (R); —as a function of the analysis, determining data relating to the behavior of the user (U1-U4), the data making up a so-called behavioral signature (SCU1-SCU4) of the user (U1-U4); —comparing the behavioral signature (SCU1-SCU4) with at least one so-called reference signature (SR1-SRn), the reference signature including data representing a predefined model behavior; and —triggering at least one so-called security action as a function of the comparison.