Website malicious attack prevention method and system

A malicious attack, website technology, applied in transmission systems, electrical components, etc., can solve the problem of high operating costs, and achieve the effect of reducing marketing costs

Inactive Publication Date: 2015-09-23
GUANGZHOU PINWEI SOFTWARE
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the wide source of API data, multiple data sources are required for each request and then the user's level can be obtained through logical function calculations. The traditional method of preventing malicious website attacks has the disadvantage of high operating costs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Website malicious attack prevention method and system
  • Website malicious attack prevention method and system
  • Website malicious attack prevention method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] A method for preventing malicious website attacks, which can be applied to monitor and control abnormal account activities such as gift coupon lottery, fraudulent transaction identification, various market activities, large-value orders, and large-scale cash-on-delivery orders during the big promotion period. Such as figure 1 As shown, the website malicious attack prevention method includes the following steps:

[0025] Step S100: Extracting data from user behavior to obtain feature data that can characterize user behavior. By tracking user behavior for data statistics and extraction, feature data that can characterize user behavior characteristics are obtained.

[0026] In one of the examples, as figure 2 As shown, step S100 includes step S110 and step S120.

[0027] Step S110: Perform data statistics on user behavior to obtain user metadata.

[0028] User behavior may specifically include at least one of the number of browsed product pages, whether an order has b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a website malicious attack prevention method and system, comprising extracting data of user behaviors to obtain characteristic data representing user behavior characteristics; and setting permissions of corresponding users in dependence on extracted characteristic data, thereby identifying user identifications so as to take corresponding prevention measures, and to effectively prevent malicious users from profiting. In a marketing communication period before an activity, if similar malicious users are intercepted, the users can be directly filtered, thereby reducing sending of ineffective mails and short messages, substantially reducing marketing cost, and providing user identification support for fraudulent trading.

Description

technical field [0001] The invention relates to the field of risk control data storage and calculation, in particular to a method and system for preventing malicious website attacks. Background technique [0002] Nowadays, many business websites often hold promotional activities to increase the registration rate of new customers and the purchase rate of old customers on the website. Each activity will randomly select users to give a large number of gift cards, vouchers and other event gifts. Some malicious users take this opportunity to batch Create an account to swipe gifts to profit from it, especially during the promotion period, there will be a huge increase in malicious users. [0003] The traditional method of preventing malicious website attacks is to call the API (Application Programming Interface, application programming interface) to pass in the user ID, transfer data from the wallet API, User table and TopN table respectively, calculate the score according to the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/123H04L63/1458
Inventor 王润辉乔西洋
Owner GUANGZHOU PINWEI SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products