Abnormal account detection method and device

An account and exception technology, applied in the field of network security, can solve problems such as easy failure of identification methods

Inactive Publication Date: 2019-03-08
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the embodiment of the present invention discloses an abnormal account detection method and device,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal account detection method and device
  • Abnormal account detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0049] refer to figure 1 , which shows a schematic flowchart of a method for detecting an abnormal account provided by an embodiment of the present invention. In this embodiment, the method includes:

[0050] S101: Obtain a sample data set to be analyzed;

[0051] In this embodiment, the sample data set to be analyzed includes account information and device information. Wherein, the sample data set may be log information, and the log informatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an abnormal account detection method and device. The method comprises the steps of obtaining a to-be-analyzed sample data set; obtaining associated account information and equipment information from the sample data set; obtaining identification information of equipment from the equipment information, and establishing a complex network between the identification informationof the equipment and accounts associated with the identification information according to the equipment information; carrying out community mining on the complex network according to a preset community mining algorithm, thereby obtaining a plurality of community clusters, wherein each community cluster comprises a plurality of associated account nodes; and extracting target community clusters of which number of account nodes is greater than a preset threshold from all community clusters, and determining accounts contained in the target community clusters as abnormal accounts. The problem thatin the prior art, a conventional abnormal account identification method is liable to lose efficacy is solved, and the purpose of relatively comprehensively and deeply identifying the abnormal accountsare realized.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method and device for detecting abnormal accounts. Background technique [0002] With the development of the Internet industry, Internet companies have launched more and more applications, and in order to provide users with more targeted services, generally, customers are required to register an account to use the applications. Accounts are not only the private assets of customers, but also the core assets of Internet companies. [0003] With the vigorous development of the Internet O2O, the subsidies given to customers by the platform are emerging one after another. In this context, the "Wool Party" that specializes in collecting various promotional activities and benefits on each platform has grown stronger, for example: obtaining benefits from the platform by registering multiple accounts , these accounts are not accounts registered by normal users. In order to "sweep the w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/142H04L63/0876H04L63/1416
Inventor 宗志远
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products