Unlock instant, AI-driven research and patent intelligence for your innovation.

A method, device and storage medium for identifying malicious users

A malicious user and user technology, applied in the field of identifying malicious users, can solve the problem of low accuracy in mining malicious users

Active Publication Date: 2021-07-23
WUHAN DOUYU NETWORK TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a method, device, and storage medium for identifying malicious users, which are used to solve the problem of low accuracy in mining malicious users in existing mechanisms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device and storage medium for identifying malicious users
  • A method, device and storage medium for identifying malicious users
  • A method, device and storage medium for identifying malicious users

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0044] refer to figure 1 , a method for identifying a malicious user in an embodiment of the present invention is introduced below. The method includes:

[0045] 101. Acquire a training sample set.

[0046]Wherein, the training sample set is a regression tree structure, the training sample set includes features of the training samples and labels corresponding to the training samples, and the labels corresponding to the training samples are used to identify whether the user is a malicious user.

[0047] In some implementations, the characteristics of the training samples include at least the number of user's abnormal barrage, the number of users playing, the number of comments published by the user within the first period, the number of identical comments issued by the user within the second period, and the balance of the user's account .

[0048] 102. Determine an optimal segmentation feature and segmentation threshold from the training sample set.

[0049] 103. Split the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a method, device, and storage medium for identifying malicious users. The method includes: obtaining a training sample set, the training sample set includes features of the training samples and labels corresponding to the training samples, and the training samples correspond to The label is used to identify whether the user is a malicious user; determine the optimal segmentation feature and segmentation threshold from the training sample set; split the training sample set to obtain the first sample set and the second sample set, and the first sample set The average value of each feature in the set and the second sample set is used as the target output value; judge whether the user is a malicious user according to the target output value; judge the label corresponding to the training sample of the malicious user in the first sample set and the second sample set Set as a malicious user, and set the label corresponding to the training sample judged to be a non-malicious user as a non-malicious user. By adopting this scheme, the user's behavior characteristics can be accurately analyzed, and malicious users can be identified according to the behavior characteristics.

Description

technical field [0001] The present invention relates to the technical field of software, in particular to a method, device and storage medium for identifying malicious users. Background technique [0002] During the development of the live broadcast platform, in order to achieve private purposes, some black production groups often register many platform accounts in batches, and use these accounts for malicious activities such as commenting, barrage, and popularity, in an attempt to increase the popularity of a certain live broadcast room. It makes the resources of the entire live broadcast platform unequal and profits from it. The live broadcast platform needs to ban the users of these malicious accounts. However, it is difficult to directly mine the behavior of malicious accounts from massive data. It is a feasible idea to use algorithms to mine malicious users. [0003] Since malicious users operate in batches of illegal products, their behaviors and actions often have c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/62G06F16/9535H04N21/4788H04N21/488
CPCH04N21/4788H04N21/4884G06F18/24323G06F18/214
Inventor 王非池
Owner WUHAN DOUYU NETWORK TECH CO LTD