Method and system for identifying potential malicious user in website

A malicious user and user technology, applied in the field of data analysis, can solve the problems of single statistical dimension, disadvantageous identification of potential malicious users, and little retained information.

Active Publication Date: 2017-12-05
BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that the statistical dimension is relatively single, and the i...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for identifying potential malicious user in website
  • Method and system for identifying potential malicious user in website
  • Method and system for identifying potential malicious user in website

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] Other aspects, advantages and salient features of the present invention will become apparent to those skilled in the art from the following detailed description of exemplary embodiments of the present invention when taken in conjunction with the accompanying drawings.

[0012] In the present invention, the terms "include" and "comprising" and their derivatives mean to include but not limit; the term "or" is inclusive, meaning and / or.

[0013] In this specification, the various embodiments described below to describe the principles of the present invention are illustrative only and should not be construed as limiting the scope of the invention in any way. The following description with reference to the accompanying drawings is provided to assist in a comprehensive understanding of exemplary embodiments of the present invention as defined by the claims and their equivalents. The following description includes numerous specific details to aid in understanding, but these sh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for identifying a potential malicious user in a website. The method comprises the following steps: based on user basic data and service data, generating a community network map by using a FastUnfolding algorithm; obtaining community information from the community network map, wherein the community information comprises a community attribute and a map attribute of the community network map; generating a wide table based on the user basic data, the service data and the community information of the belonging community, and generating a derivative field based on the wide table, wherein the derivative field is a field that can be used for judging whether the user is a malicious user; using the feature data selected for training of the user as training data, and modeling by using a random forest algorithm to obtain a random forest model, wherein the feature data comprise basic information of the user, the community information of the user and the corresponding derivative field; and identifying the malicious user by using the random forest model. The invention further provides an apparatus for identifying the potential malicious user in the website.

Description

technical field [0001] The present invention relates generally to data analysis, and more particularly to a method and system for identifying potentially malicious users of a website. Background technique [0002] With the popularization of network technology, more and more people begin to use the network for social activities, entertainment and shopping, which brings greater challenges to website management. In particular, malicious users, that is, users with abnormal operations (such as users who maliciously receive coupons, maliciously place orders, maliciously post operations, etc.), may threaten the safe and effective operation of the website. Therefore, identifying potential malicious users is of great significance to ensure the normal and smooth operation of the website. [0003] The current malicious user identification methods are generally based on basic index modeling, index integration based on basic data table information, and a wide table is generated; then ba...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1441
Inventor 谢贵霞肖勃飞罗尚勇袁和应梅尚健
Owner BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products