Unified user malicious behavior detecting method and system in social network

A technology of social network and detection method, applied in the direction of data exchange network, transmission system, digital transmission system, etc., can solve the problems of difficult accuracy, unsatisfactory detection effect, and relatively difficult combination, and achieve high detection accuracy Effect

Inactive Publication Date: 2018-09-14
王欣明
View PDF12 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Due to the prevalence and complexity of malicious behaviors in online social networks, each of the methods based on the above two models is only a specific malicious behavior detection for a specific social network, so the detection ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unified user malicious behavior detecting method and system in social network
  • Unified user malicious behavior detecting method and system in social network
  • Unified user malicious behavior detecting method and system in social network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The specific embodiment of the present invention will be further described below in conjunction with accompanying drawing:

[0028] refer to figure 1 , a unified user malicious behavior detection method in a social network, comprising the following steps:

[0029] A. Establish predicates and functions according to the characteristics of multiple online social networks;

[0030] Given an online social network (Online Social Networks, OSN) relationship graph G and activity traces S, including the following definitions:

[0031] (1) Rule: Malicious behavior detection rules are expressed as , where F is a first-order logic formula including constants, variables, predicates, and functions, and w is the value weight of F.

[0032] (2) Constant (Constant): all users User={u appearing in the relationship graph G and activity trace S 1 ,u 2 ,...,u k}, objects such as blog posts, topics, etc., non-negative integer time.

[0033] (3) Function (Function): The function realize...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a unified user malicious behavior detecting method and system in a social network. The method comprises the steps of: establishing predicates and functions according to characteristics of multiple OSNs, collecting relation graph G and activity traces S, and constructing structural closed atoms and active closed atoms, then extracting the structural closed atoms, and mergingto form a training database; obtaining the first-order logic detecting and judging the malicious behavior; learn the weight of the first-order logic rule based on detecting results and the training database and establishing an MLN model; collecting a relationship diagram and activity traces of to-be-detected OSN and constructing structural closed atoms and active closed atoms, forming a to-be-detected database, and using the MLN model for detection. The unified user malicious behavior detecting method and system in the social network combines the OSN malicious behavior detection methods through the MLN model, realizes the joint detection of multiple malicious behaviors at the same time, and achieves higher detection accuracy. The unified user malicious behavior detecting method and systemin the social network can be widely applied in the field of information security.

Description

technical field [0001] The invention relates to the field of information security, in particular to a unified user malicious behavior detection method and system in a social network. Background technique [0002] In recent years, online social networks (OSNs for short) such as Facebook, Google+, Renren, Sina Weibo, etc., have been accepted and used by more and more people, accumulating a large number of users. But at the same time, OSNs are also subject to a large number of security and privacy threats, including privacy violations, spam, Sybil attacks, phishing, etc. These malicious behaviors violate the rights and interests of users and cause a lot of inconvenience to users and everyone and loss. Therefore, a malicious behavior detection system that can effectively protect users has important practical significance. [0003] Current malicious behavior detection can be broadly classified into structure-based and activity-based. Structure-based malicious behavior detectio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30G06F21/56H04L12/24
CPCG06F21/562H04L41/145
Inventor 王欣明赵淦森李振宇赵淑娴纪求华
Owner 王欣明
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products