Identification method, server and terminal for webpage operation behavior

A web page operation and identification method technology, applied in the field of information processing, can solve problems such as inability to trace back, attack and defense upgrades, etc., to achieve the effects of avoiding attack and defense confrontation, reducing update cycles, and overcoming hysteresis

Active Publication Date: 2018-01-23
ALIBABA GRP HLDG LTD
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen from this that the confrontational front-end technology can easily lead to an upgrade of offense and defense, and it is necessary to continuously establish new rules to fight against
[0005] Among them, the identification technology based on case-driven rules mainly has the disadvantage of lag. For example, if a website fin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification method, server and terminal for webpage operation behavior
  • Identification method, server and terminal for webpage operation behavior
  • Identification method, server and terminal for webpage operation behavior

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0026] Before discussing the exemplary embodiments in more detail, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although the flowchart describes the operations as sequential processing, many of the operations can be implemented in parallel, concurrently, or simultaneously. In addition, the order of various operations can be rearranged. The processing may be terminated when its operation is completed, but may also have additional steps not included in the drawings. The processing may correspond to methods, functions, procedures, subroutines, subroutines, and so on.

[0027] In the context, "computer equipment", also known as "computer", refers to an intelligent electronic device that can execute predetermined processing procedures such as numerical calculations and / or logical calculations by running predetermined programs or instructions. It can include a processor and In the memory, the processor executes t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application provides an identification method, server and terminal for a webpage operation behavior. The identification method for the webpage operation behavior comprises the following steps: obtaining webpage operation behavior data to be processed; obtaining one or more class clusters corresponding to the webpage operation behavior data to be processed from the historical webpage operationbehavior information database pre-classified the class clusters based on the predetermined acquisition rules, wherein each of the class clusters in the historical webpage operation behavior information database is obtained by aggregating a plurality pieces of historical webpage operation behavior information based on predetermined clustering rules; and identifying whether the webpage operation behavior to be processed is a malicious operation behavior or not based on the pre-calculated aggregation degree of the corresponding one or more class clusters. According to the identification method, server and terminal for the webpage operation behavior, whether the webpage operation behavior is a malicious operation behavior or not can be effectively identified.

Description

technical field [0001] The present application relates to the field of information processing, and in particular to an identification method for web page operation behavior, a server, and a terminal. Background technique [0002] For websites in the Internet field, it is common that in order to stimulate user growth, the website will promote the number of user registrations on the website by issuing electronic vouchers to new registered users. Under normal circumstances, each user completes the registration through a series of operations such as inputting and clicking on the registration page. However, in order to seek illegitimate interests in a short period of time, individual users adopt malicious webpage operation behaviors, such as designing programs to automatically and quickly complete the registration of batch accounts, thereby avoiding the real operation of registering by manually entering real registration information again and again Behavior, this kind of high-fr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30
Inventor 方圆刘永凯程荣李东
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products