A method for identifying webpage operation behavior, server, and terminal

A web page operation and identification method technology, applied in the field of information processing, can solve the problems of inability to backtrack, offensive and defensive upgrades, etc., to avoid offensive and defensive confrontation, reduce the update cycle, and overcome the effect of hysteresis

Active Publication Date: 2021-08-17
ALIBABA GRP HLDG LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen from this that the confrontational front-end technology can easily lead to an upgrade of offense and defense, and it is necessary to continuously establish new rules to fight against
[0005] Among them, the identification technology based on case-driven rules mainly has the disadvantage of lag. For example, if a website finds that a certain IP address has a large number of abnormal access requests through a large number of cases that have occurred, it will blacklist the IP address. , to prevent the IP address from continuing to perform abnormal access
However, there is no way to trace back the abnormal access requests before the IP address was blacklisted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for identifying webpage operation behavior, server, and terminal
  • A method for identifying webpage operation behavior, server, and terminal
  • A method for identifying webpage operation behavior, server, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Before discussing the exemplary embodiments in more detail, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although the flowcharts describe operations as sequential processing, many of the operations may be performed in parallel, concurrently, or simultaneously. In addition, the order of operations can be rearranged. The process may be terminated when its operations are complete, but may also have additional steps not included in the figure. The processing may correspond to a method, function, procedure, subroutine, subroutine, or the like.

[0027] The term "computer equipment" in this context, also referred to as "computer", refers to an intelligent electronic device that can perform predetermined processing procedures such as numerical calculations and / or logic calculations by running predetermined programs or instructions, which may include a processor and The memory is realized by the processor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application provides an identification method for web page operation behavior, a server, and a terminal. The method includes: obtaining data on web page operation behavior to be processed; Obtaining one or more clusters corresponding to the webpage operation behavior data to be processed, wherein each cluster in the historical webpage operation behavior information base is based on predetermined clustering rules for multiple pieces of historical webpage operation behavior information Based on the aggregation degree of the corresponding one or more clusters obtained in advance, identify whether the webpage operation behavior to be processed is a malicious operation behavior. According to the identification method, server, and terminal of the present application, it is possible to efficiently identify whether a webpage operation behavior is a malicious operation behavior.

Description

technical field [0001] The present application relates to the field of information processing, and in particular to an identification method for web page operation behavior, a server, and a terminal. Background technique [0002] For websites in the Internet field, it is common that in order to stimulate user growth, the website will promote the number of user registrations on the website by issuing electronic vouchers to new registered users. Under normal circumstances, each user completes the registration through a series of operations such as inputting and clicking on the registration page. However, in order to seek illegitimate interests in a short period of time, individual users adopt malicious webpage operation behaviors, such as designing programs to automatically and quickly complete the registration of batch accounts, thereby avoiding the real operation of registering by manually entering real registration information again and again Behavior, this kind of high-fr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/958G06F16/957
Inventor 方圆刘永凯程荣李东
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products