Risk behavior recognition method, storage medium, device and system

A recognition method and behavior technology, applied in the transmission system, electrical components, etc., can solve the problems of complex cheating methods and poor recognition effect of strong rules, and achieve good recognition effect

Active Publication Date: 2018-07-03
WUHAN DOUYU NETWORK TECH CO LTD
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, strong rules can only find out those malicious users with obvious characteristics, and can do nothing for other users with less obvious characteristics
Moreover, the cheating methods of malicious users have become more complicated at present. By disguising the behavior of malicious users and normal users, the behavior of malicious users is becoming more and more similar to that of normal users, and the strong rule recognition effect is not good.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk behavior recognition method, storage medium, device and system
  • Risk behavior recognition method, storage medium, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.

[0042] see figure 1 As shown, the embodiment of the present invention provides a risky behavior identification method, the method includes the following steps:

[0043] S1. According to the behavior log data, extract the specific behaviors of each user in the set user set, and sort all the specific behaviors of each user in time within the time window to obtain the specific behavior sequence of each user;

[0044] Among them, specific behaviors include registration, login, watching live broadcast, posting barrage, etc. These behaviors are for states in a Markov chain, a stochastic process that describes a sequence of states whose value for each state depends on a finite number of previous states. The Markov transition probability is the possibility of the transition of adjacent states before and after the Markov chain. Specific behaviors ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a risk behavior recognition method, a storage medium, a device and a system, and relates to the field of big data risk control. The method comprises the steps of extracting, according to behavior log data, each specific behavior of each user in a set user set, and obtaining a specific behavior sequence for each user; using pre-defined strong rules to find high-risk suspected users in the set user set, recording the suspected users as a first user set, and recording the remaining users in the set user set as a second user set; setting specific behavior pairs, and calculating a first transition probability and a second transition probability; for the same specific behavior pair, judging whether the difference between the first transition probability and the second transition probability is within a preset range, and if not, recording the specific behavior pair as a risk specific behavior pair; and calculating the information entropy of each risk specific behaviorpair group, and judging whether the user is a suspected user according to the size of the information entropy. The risk behavior recognition method in the invention can find malicious users whose cheating characteristics are not obvious.

Description

technical field [0001] The invention relates to the field of big data risk control, in particular to a risk behavior identification method, storage medium, equipment and system. Background technique [0002] There are some malicious users on the live broadcast platform. These users usually do some behaviors of falsely following or gaining popularity. Finding such malicious users will help maintain the order of the live broadcast platform and ensure the long-term healthy development of the platform. [0003] For the identification of such malicious users, the usual method is to use strong rules, that is, for example (1) one account is logged in on multiple devices; (2) the user's behavior log is abnormal, such as the user sent a barrage but did not click on the barrage button etc. However, strong rules can only find out those malicious users with obvious characteristics, and can do nothing for other users with less obvious characteristics. Moreover, the cheating methods of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 王璐张文明陈少杰
Owner WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products