Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for detecting abnormal user

A technology for detecting anomalies and users, applied in the Internet field, it can solve problems such as error blocking, reduction of strategy accuracy and recall rate, and deterioration of strategy effectiveness, so as to increase adaptability, reduce the influence of subjective factors, and reduce workload. Effect

Inactive Publication Date: 2018-04-06
BEIJING BAISHANCLOUD TECH CO LTD
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 3. When the structure or function of the customer site changes, or when the business grows, the correct rate and recall rate of the strategy will decrease
[0008] 4. Changes in website access user characteristics will lead to poor policy effectiveness, and even wrong blocking
[0009] 5. Regular artificial correction of corresponding parameters greatly increases the cost of protection and guarantee

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting abnormal user
  • Method and device for detecting abnormal user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0056] figure 1 is a flowchart of a method for detecting abnormal users in an embodiment; the method includes:

[0057] Step 1, collecting logs;

[0058] Step 2, cl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for detecting an abnormal user. The method comprises the steps that logs are acquired; the acquired logs are classified; the various classes are scored according to access parameters in the various classes, the classes with the scores ranking the first N are selected, and the logs in the N classes are taken as key logs; and group characteristics of the key logs are extracted according to a characteristic extraction algorithm, individual characteristics of a log of a target user are extracted according to the characteristic extraction algorithm, and whether or not the target user is an abnormal user is judged according to the similarity of the group characteristics and the individual characteristics. The device is independent of a real-time strategy system, has a longer time window and can obtain more accurate characteristics of the user.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method and device for detecting abnormal users. Background technique [0002] Existing network security products generally use several rules or strategies to describe the user's behavior boundaries, and if a certain feature of the user breaks through the threshold of normal users, it will trigger a processing action. [0003] In the rule-based network security protection scheme, the parameters such as the threshold value and algorithm of the rules are very dependent on the experience of the rule maker and are relatively fixed. After the configuration is completed, it cannot be adapted to changes in business development and website structure and functions. [0004] There are following shortcoming in prior art: [0005] 1. It is necessary to understand the structure and functions of the customer site in advance. [0006] 2. Customize security policies for different interfa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425
Inventor 陈哲丛磊
Owner BEIJING BAISHANCLOUD TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products