Fake user detection method based on hierarchical clustering.

A detection method and hierarchical clustering technology, applied in the field of data security, can solve problems such as not being able to resist attacks well, and achieve the effect of small dependence on data characteristics

Inactive Publication Date: 2017-11-17
SICHUAN UNIV
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This defense is also not very good against attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fake user detection method based on hierarchical clustering.
  • Fake user detection method based on hierarchical clustering.
  • Fake user detection method based on hierarchical clustering.

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The present invention will be further described below in conjunction with accompanying drawing:

[0014] figure 1 In , a method of false user detection based on hierarchical clustering, including the following steps:

[0015] (1) Back up the user data table, obtain the data set from the data table, and then determine which columns can be used as user unique identification fields;

[0016] (2) Map the user's unique identification field into a string pattern and store it in another data table to ensure data integrity, and at the same time pre-classify massive data according to different string composition patterns;

[0017] (3) For each classification, use each element in the classification as a set, calculate the similarity between data sets based on string similarity, and merge the two sets with the highest similarity;

[0018] (4) Repeatedly calculate the similarity between new sets, and merge the sets with the highest similarity. Until the minimum similarity reache...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a fake user detection method based on hierarchical clustering. The method comprises the following steps: backing up a website user data table, mapping a user unique identification field into a string composition mode, and pre-classifying massive data according to different composition modes; calculating the string similarity between the elements in each classification; and setting a suitable threshold to carry out hierarchical clustering on each category, and then discovering fake accounts in group hidden in the massive registration data. Experiments show that the method proposed by the present invention is effective and the method has less dependence on data dimension and data characteristics than the prior art; and the method proposed by the invention can be applied to the fake user detection under the current big data environment.

Description

technical field [0001] The invention relates to a false user discovery technology in a big data environment, in particular to a hierarchical clustering-based false user detection technology, which belongs to the field of data security. Background technique [0002] In the era of Web 2.0, users obtain information resources, communicate and share through online websites. The Internet has changed people's lives. However, there are some users who abuse Internet services to gain improper benefits. These malicious users disrupt the order of the Internet by publishing spam, false information, and phishing information. When some service providers set up new websites or launch new businesses, service providers will conduct some promotional rebate activities online to attract customers. Malicious users directly obtain economic benefits by registering a large number of false accounts. When these web service providers no longer have promotional activities, these false accounts becom...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06K9/62
CPCG06F21/31G06F18/231
Inventor 方勇刘亮黄诚刘道胜李扬
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products