Method and device for user behavior recognition

A behavioral and user-based technology, applied in the direction of computer security devices, instruments, platform integrity maintenance, etc., can solve the problems of unavailable frequency of human operations and unsatisfactory blocking effects, and achieve accurate malicious behaviors and accurate evaluation results.

Active Publication Date: 2015-04-01
XIAOMI INC
View PDF5 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This kind of high-frequency access behavior is generally realized by snapping up software, and the frequency cannot be obtained by

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for user behavior recognition
  • Method and device for user behavior recognition
  • Method and device for user behavior recognition

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0079] Here, exemplary embodiments will be described in detail, and examples thereof are shown in the accompanying drawings. When the following description refers to the drawings, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements. The implementation manners described in the following exemplary embodiments do not represent all implementation manners consistent with the present disclosure. Rather, they are merely examples of devices and methods consistent with some aspects of the present disclosure as detailed in the appended claims.

[0080] In related technologies, network activities are becoming more frequent, and online merchants often launch price-cut spike activities. In order to grab low-priced goods, users will frequently visit the merchant's website within a short period of time. Some users will realize it through some snap-up software. Panic buying software will visit the merchant's website more frequently than ord...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and a device for user behavior recognition, which are used for more efficiently and accurately recognizing malicious behaviors. The method comprises the steps of acquiring an access behavior of a terminal in a preset time sliding window; evaluating the access behavior in the time sliding window according to the access behavior in the time sliding window; determining whether the access behavior of the terminal is a malicious behavior or not according to an evaluation result.

Description

technical field [0001] The present disclosure relates to the field of communication and computer processing, and in particular to a method and device for identifying user behavior. Background technique [0002] With the development of the Internet, resource sharing has been realized through the network. People can obtain a wealth of information conveniently and quickly through the Internet. While people obtain information, many websites face various malicious attacks. [0003] The inventors of the present disclosure have found that, in related technologies, a malicious attack method is to frequently send data packets to a website within a relatively short period of time. This situation often occurs when buying goods in a hurry, and frequently visits the website in a short period of time to buy goods at reduced prices. This high-frequency access behavior is generally realized by snapping up software, and this frequency cannot be obtained by human operation. Some means in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/56
CPCH04L63/1425G06F21/552G06F2221/2133H04L43/10H04L63/1458H04L2463/142H04L2463/144
Inventor 张华夏翼洪定坤王海洲
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products