Abnormal account detection method and device

A detection method and technology of a detection device are applied in the field of network security and can solve the problems of low determination accuracy of abnormal accounts, misjudged abnormal accounts, etc.

Active Publication Date: 2015-09-16
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF6 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, hackers can bypass the above detection methods by means of dialing, proxy IP, etc., and judging the IP segment is also easy to misjudge the normal account

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal account detection method and device
  • Abnormal account detection method and device
  • Abnormal account detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0026] Unless the context clearly states otherwise, the number of elements and components in the present invention can exist in a single form or in multiple forms, and the present invention is not limited thereto. Although the steps in the present invention are arranged with labels, they are not used to limit the order of the steps. Unless the order of the steps is clearly stated or the execution of a certain step requires other steps as a basis, the relative order of the steps can be adjusted. It can be understood that the term "and / or" used herein refers to and covers any and all possible combina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an abnormal account detection method. The method includes the following steps that: an uploaded service request is received, and an initiating account corresponding to the service request is searched; corresponding request parameters are extracted from the service request, wherein the request parameters comprise at least one behavior tag, and the tag types of the behavior tags include at least one kind of type selected from service identifier, time interval, IP address, initiating position, system type, version identifier, service data numerical interval or related account; statistics information corresponding to the initiating account is updated according to the request parameters, wherein the statistics information includes the number of the times of visits corresponding to each behavior tag; and whether the initiating account is an abnormal account can be judged according to the statistics information. The invention also provides an abnormal account detection device. With the above abnormal account detection method and device adopted, accuracy can be improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for detecting an abnormal account. Background technique [0002] At present, account password leakage on the Internet is very serious, and hacking incidents often occur. After stealing account passwords, hackers usually send pornographic advertisements, scams, virus links and other messages to friends corresponding to the stolen account, disrupting the daily life of users. Therefore, it is necessary to detect such abnormal accounts. [0003] The method for detecting abnormal accounts in the traditional technology is usually based on the IP segment, and judges whether the IP segment is occupied by account hackers by counting the distribution of received command types, so as to determine the account under the IP segment as an abnormal account. [0004] However, hackers can bypass the above detection methods by means of dialing, proxy IP, etc., and judg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/26H04L29/06
Inventor 张杰陈敏浩廖晨林宇东刘海生
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products