Detection method for abnormal user in social network based on network mapping

A network mapping and social network technology, applied in the field of network data detection, can solve the problems of low accuracy, inability to accurately detect, and difficult to distinguish abnormal users.

Active Publication Date: 2018-03-23
SUN YAT SEN UNIV
View PDF10 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although these detection methods have been widely used in practice, these methods can only achieve good results in specific application scenarios, the generalization ability is not strong, and they are not universal, so they cannot meet the actual needs very well.
Specifically, although behavioral feature-based and content-based detection methods have high accuracy, they need to mark the sample data in advance because of the supervised learning method, which takes a lot of time and labor costs, and can only detect existing Known abnormal types, when the abnormal user changes its appearance, it cannot be accurately detected
Although the graph-based detection method has strong robustness, the accuracy rate is low, and it can only detect abnormal users who are connected with other users. It is still in the theoretical research stage.
The method based on unsupervised learning does not need to mark the sample data in advance, which saves time and labor costs, so it can quickly form a detection system and detect unknown attack behaviors, but it is not easy to distinguish different types of abnormal users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method for abnormal user in social network based on network mapping
  • Detection method for abnormal user in social network based on network mapping
  • Detection method for abnormal user in social network based on network mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The present invention will be further described below in conjunction with specific embodiment:

[0051] See attached Figure 1-3 As shown, a method for detecting abnormal users in a social network based on network mapping described in this embodiment includes the following steps:

[0052] S1. Using web crawler technology to crawl the user data of the WeChat social network platform, see Table 1 for detailed data to be crawled.

[0053]

[0054]

[0055] Table 1 Feature types and corresponding user data

[0056] S2. Preprocessing the crawled user data to construct a user social relationship network graph G; the preprocessing steps are as follows:

[0057] S21. Divide the crawled user data into four dimensions, which are user basic information, user behavior characteristics, user hobbies, and user friendship;

[0058] S22. The user data in the three dimensions of user basic information, user behavior characteristics, and user interests and hobbies described in ste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a detection method for an abnormal user in a social network based on network mapping. The method comprises the following steps of S1, crawling user data of a social network platform by using a web crawler technology; S2, preprocessing the crawled user data, and building a user social relation network graph G; S3, using node2vec to convert the social relation of a user intoa low-dimensional vector representation based on the user social relation network graph G; S4, fusing the multidimensional vector representations of the user to acquire a final vector representation;and S5, clustering based on feature vectors of the user, predicting the user is a normal user or the abnormal user, and if the user is the abnormal user, giving an abnormal type. The method providedby the invention has the advantages that the time and labor cost overheads are low, the various abnormal user types can be recognized, the new abnormal user type can be recognized, the multidimensional attribute features of the user can be comprehensively considered, and the accuracy is high.

Description

technical field [0001] The invention relates to the technical field of network data detection, in particular to a method for detecting abnormal users in a social network based on network mapping. Background technique [0002] A series of excellent features such as convenience, entertainment, and real-time nature of social networks have attracted a large number of users, and a virtual society has been built in cyberspace. At the same time, the huge user base of social networks has attracted a large number of attackers. By creating a large number of fake accounts and stealing normal accounts, attackers spread rumors in social networks, or publish advertisements, phishing, pornographic information, etc., or use these accounts to maliciously increase the reputation of other accounts, such as mass follow, malicious points Like and so on. These attackers are collectively referred to as anomalous users. Therefore, abnormal user detection in social networks is of great significan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/58
CPCH04L51/23H04L51/52
Inventor 郑子彬叶方华周育人
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products