Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Abnormal access detection method and device

A detection method and abnormal technology, applied in the Internet field, can solve the problems of inaccuracy and effectiveness, and insufficient use of data, and achieve the effect of ensuring stability and security.

Active Publication Date: 2020-07-31
ALIBABA DAMO (HANGZHOU) TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] However, the inventor found in the process of implementing this application that the existing outlier detection algorithm with time series data either only utilizes the characteristic data of the visiting user itself for clustering, and can only reflect the characteristics of the visiting user's attributes; or only Using the time series data of access, manually set the threshold to find some abnormal points (that is, confirm that the current access is abnormal)
These two methods do not give full play to the value of the data, and the results are often not very accurate and effective

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal access detection method and device
  • Abnormal access detection method and device
  • Abnormal access detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] As mentioned in the background technology, further improving the accuracy and effectiveness of outlier detection is a key issue related to the accurate and effective operation of the system in view of the characteristics of time-series application data, and it is also a technical problem to be solved by this application.

[0069] In order to solve the above technical problems, this application proposes an outlier detection method, which combines user statistical data and time-series access data, gives a preliminary label according to the rules through the time-series data, and adopts the method of logistic regression to analyze the preliminary label and user The attribute is trained to obtain the final result, so that the result of outlier judgment can be further improved.

[0070] Such as figure 2 As shown, it is a schematic flow chart of an abnormal point detection method proposed in this application, which includes the following steps:

[0071] S201 Acquire attribu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses an abnormal access detection method, by extracting the time-series data features corresponding to each sample access request, obtaining the value of the corresponding label, and then generating detection according to the value of the label and attribute data corresponding to each sample access request parameter, so after obtaining the attribute data of the access request to be detected, an abnormal probability corresponding to the access request is generated according to the attribute data and detection parameters, and after judging whether the abnormal probability is greater than the preset abnormal threshold, the size of the two can be Check whether the access request is an abnormal access request. Therefore, it is possible to accurately identify and process abnormal access requests among a large number of access requests, ensuring the stability and security of the network.

Description

technical field [0001] The present application relates to the technical field of the Internet, in particular to a method for detecting abnormal access. The present application also relates to an abnormal access detection device. Background technique [0002] Data mining is the process of extracting potential, implicit, and valuable knowledge, patterns, or rules from large-scale data sets. Patterns mined from large-scale data sets can generally be divided into five categories: association rules, classification and prediction, clustering, evolution analysis, and outlier detection. The mining of outlier data includes two parts: outlier data detection and outlier data analysis. Outliers are data that are inconsistent with the general behavior or model of the data. They are outliers in the data set that are not random deviations but arise from entirely different mechanisms. Outlier data mining has a wide range of applications, such as fraud detection, using outlier detection t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L9/40
Inventor 付子豪张凯蔡宁杨旭褚崴
Owner ALIBABA DAMO (HANGZHOU) TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products