Malicious user identification method and apparatus

A malicious user and identification method technology, applied in character and pattern recognition, instruments, electrical components, etc., can solve the problems of missing malicious behavior characteristics, not obvious malicious users, etc.

Active Publication Date: 2018-06-15
WUHAN DOUYU NETWORK TECH CO LTD
View PDF5 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When identifying malicious users in the prior art, in order to prevent normal users from being identified as malicious users, stricter rules are often adopted, and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious user identification method and apparatus
  • Malicious user identification method and apparatus
  • Malicious user identification method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0043] In order to make the purpose, technical solutions and advantages of the embodiments of this application clearer, the technical solutions in the embodiments of this application will be described clearly and completely in conjunction with the drawings in the embodiments of this application. Obviously, the described embodiments It is a part of the embodiments of this application, but not all the embodiments. The components of the embodiments of the present application generally described and shown in the drawings herein may be arranged and designed in various different configurations.

[0044] Therefore, the following detailed description of the embodiments of the present application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the present application. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without cr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a malicious user identification method and apparatus. The method comprises the following steps: obtaining bullet screen sending behavior features of a plurality of users; calculating a similarity value of each two users in the plurality of users according to the bullet screen sending behavior features; setting a suspect degree value of a malicious user as a first initial suspect value, and setting the suspect degree value of a to-be-identified user as a second initial suspect value; for each user, performing iterative computation on the suspect degree value of the user through a probabilistic graphical model according to the current suspect degree value of the user and the similarity value of the user and the other users; and after multiple iterative computations, using the to-be-identified user with the suspect degree value greater than a suspect threshold as the malicious user. Therefore, according to the association of the to-be-identified user and the determined malicious user on the bullet screen sending behavior features, the malicious users with unobvious malicious behavior features can be effectively screened out.

Description

technical field [0001] The present application relates to the technical field of big data processing, in particular, to a malicious user identification method and device. Background technique [0002] The live broadcast platform is an Internet social platform that provides broadcasters with a channel to display live video and interact with other users online. There are often some malicious users seeking illegitimate interests through improper means on the live broadcast platform. For example, the live video platform reflects the influence and attention of the anchor through the attention of users to the anchor. Malicious users may gain benefits by creating a large number of false attention, which will destroy the ecology of the live broadcast platform and damage the interests of other normal users. In view of this situation, malicious users need to be identified to block or display the behavior of these malicious users on the live broadcast platform. When identifying malic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N21/442H04N21/466H04N21/4788H04N21/488G06K9/62
CPCH04N21/44213H04N21/4667H04N21/4788H04N21/4884G06F18/22
Inventor 王璐陈少杰张文明
Owner WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products