Malicious clicking behavior detection method and device

A malicious click and detection method technology, applied in the Internet field, can solve the problems of poor real-time performance and poor user experience, and achieve the effect of good real-time detection and good user experience.

Inactive Publication Date: 2015-12-23
北京博雅立方科技有限公司
View PDF6 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a malicious click behavior detection m

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious clicking behavior detection method and device
  • Malicious clicking behavior detection method and device
  • Malicious clicking behavior detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] figure 1 It is a schematic flow chart of a method for real-time detection of malicious click behavior provided by Embodiment 1 of the present invention. The method can be executed by a device for real-time detection of malicious click behavior. The device is implemented by software, and the device can be built into the Internet SEM ( On a physical device (such as a server) in the SearchEngineMarketing (search engine marketing) system, or built into the physical device that the merchant provides website services to customers. see figure 1 , a method for real-time detection of malicious click behavior provided in this embodiment, specifically includes the following operations:

[0025] Operation S100, adopting a stream processing method to acquire click behavior information on webpages collected by the terminal.

[0026] Each time the terminal monitors a click behavior on a web page, it will generate a corresponding piece of click behavior information and upload it in a...

Embodiment 2

[0035] figure 2 It is a flow chart of updating the distributed index relationship operation in the real-time detection method for malicious click behavior provided by Embodiment 2 of the present invention. On the basis of Embodiment 1, this embodiment further adds: based on the consistent hash algorithm, create The distributed index relationship;

[0036] The method further adds: when a new node access is detected, the distributed index relationship is updated according to the consistent hash algorithm; the stored index relationship is re-stored according to the updated distributed index relationship. Individual click behavior information.

[0037] refer to figure 2 As shown, the method for real-time detection of malicious click behavior includes the following operations:

[0038] Operation S200: Create the distributed index relationship based on a consistent hash algorithm.

[0039] Monitor the click behavior information of a single website within a set time window (whi...

Embodiment 3

[0046] image 3 It is a flow chart of a real-time detection method for malicious click behavior provided by Embodiment 3 of the present invention. On the basis of the above embodiment, this embodiment further stores the click behavior information on the web page on the corresponding target node The specific optimization is: send the click behavior information on the webpage to the target node, so that the target node stores the click behavior on the webpage according to the pre-created sub-index relationship and the time sequence of receiving the click behavior information information, wherein the sub-index relationship describes the corresponding relationship between each time period when the target node receives click behavior information and each storage area.

[0047] Searching for each piece of click behavior information stored on the target node within the latest set time window is specifically optimized as follows: according to the sub-index relationship, determine that...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a malicious clicking behavior detection method and device. The method includes the steps that a streaming treatment mode is adopted for obtaining clicking behavior information, collected by a terminal, of a web page; according to a distributed index relation, the clicking behavior information of the web page is stored on a corresponding target node, wherein the distributed index relation describes corresponding relations between all web pages and all nodes; all the clicking behavior information, stored on the target node and within the closest set time window, of the web page is searched for, and according to the search result, whether a malicious clicking behavior of the web page exists or not is detected in real time. According to the technical scheme, the problem that through an existing post-event analysis detection mechanism, a merchant can not learn about the malicious clicking behavior, performed on an own website, of a lawbreaker in time is solved, good detection real-time performance is achieved, and better user experience is achieved.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of the Internet, and in particular to a method and a device for detecting malicious click behavior. Background technique [0002] At present, on the one hand, the Internet SEM (SearchEngineMarketing, search engine marketing) system usually bills the merchants who place advertisements based on the number of clicks on the advertisements presented in the search results by web browsers. Malicious clicks on advertisements by certain means will bring serious economic losses to the merchants who placed the advertisements; on the other hand, in order to adjust their websites and increase the rate of return, merchants often record the click behavior information of viewers on their websites , for subsequent other business analysis, and malicious clicks will not be conducive to merchants' analysis of browser behavior. Therefore, the malicious click detection algorithm is very important, which...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30
CPCG06F16/951
Inventor 裴向宇田传钊付军辉
Owner 北京博雅立方科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products