Method and device for recognizing malicious users

A malicious user and user technology, applied in the server field, can solve the problems of failing to meet the accuracy requirements of identifying malicious users, prone to misjudgment and missed judgment, etc., to achieve self-adaptation, reduce misjudgment and missed judgment, and improve accuracy degree of effect

Pending Publication Date: 2017-05-31
BEIJING XIAOMI MOBILE SOFTWARE CO LTD
View PDF4 Cites 51 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the actual effect of the above-mentioned scheme depends heavily on the personal experience and personal ability of the makers of the scoring mechanism, and is inevitably subject to the subjective cognition of the makers, so it is easy to cause misjudgments and missed judgments, and the recognition cannot be achieved. Accuracy requirements for malicious users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for recognizing malicious users
  • Method and device for recognizing malicious users
  • Method and device for recognizing malicious users

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] In order to make the purpose, technical solution and advantages of the present disclosure clearer, the implementation manners of the present disclosure will be further described in detail below in conjunction with the accompanying drawings.

[0073] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0074] figure 1 is a flow chart of a method for identifying a malicious user according to an exemplary embodiment, such as figure 1 show...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for recognizing malicious users, and belongs to the field of network technology. The method includes the steps that historical behavior characteristics of a user to be recognized are acquired; a user classification model is acquired, wherein the user classification model is generated through classifier model training based on historical behavior characteristics of malicious users and historical behavior characteristics of normal users; the historical behavior characteristics of the user to be recognized are input into the user classification model to determine whether the user to be recognized is a malicious user or not. Through the user classification model obtained through classifier model training, the behavior characteristics of malicious users can be automatically analyzed according to the characteristics of a machine learning algorithm; compared with the prior art, the method and device have the advantages that the recognition process is independent of the subjective cognition of the human, and the coverage scope of behavior characteristics is wider, so that misjudgment and missed judgment are effectively reduced, and the accuracy of recognizing malicious users is improved.

Description

technical field [0001] The present disclosure relates to the field of servers, and in particular to a method and device for identifying malicious users. Background technique [0002] With the development of network technology, network servers can provide information services for a large number of access users in parallel by virtue of their powerful processing performance, such as software downloads, online chat, online shopping and so on. However, among the users who access the network server, there are often some malicious users who use technical means to damage the rights and interests of others. For example, the snap-buying of online commodities in online electronic malls is an emerging commodity sales method, which can play a role in promoting new products and attracting high-loyalty users. Damage the rights and interests of sellers and other consumers. [0003] In order to effectively stop the behavior of malicious users, there are some schemes that can identify malic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06N99/00G06Q30/02
CPCG06Q30/02G06Q30/0212G06Q30/0225G06Q30/0239G06F16/353G06F16/951G06N20/00
Inventor 孟庆迪
Owner BEIJING XIAOMI MOBILE SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products