Abnormal service request identification method and terminal equipment

A technology of business request and identification method, which is applied in the field of data processing, can solve problems such as poor real-time performance, and achieve the effect of ensuring normal operation

Pending Publication Date: 2019-03-19
PING AN TECH (SHENZHEN) CO LTD
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides a method for identifying abnormal service requests and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal service request identification method and terminal equipment
  • Abnormal service request identification method and terminal equipment
  • Abnormal service request identification method and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.

[0021] In order to illustrate the technical solutions of the present invention, specific examples are used below to illustrate.

[0022] figure 1 The implementation flow of the method for identifying abnormal service requests provided by the embodiment of the present invention is shown, and the flow of the method includes steps S101 to S107. The specific implementation principle of each step is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applicable to the technical field of data processing, and provides an abnormal service request identification method and terminal equipment, and the method comprises the steps: storing a service request received in a preset time period into a preset database, deleting the service request received before the preset time period, and updating the preset database in real time; if thereceiving time of each service request in the preset database conforms to the preset time distribution standard, converting the corresponding relationship between the data type and the data value contained in the service request into a service matrix corresponding to each service request; calculating a preset number of clustering center matrixes of all the service matrixes, if the similarity between one clustering center matrix and all preset reference matrixes is smaller than a similarity threshold value, determining that the clustering center matrix is smaller than the preset reference matrixes; if yes, it is judged that the service request in the preset time period is abnormal, so that a user can grasp the abnormal condition of the service request in real time by shortening the preset time period, corresponding measures are taken in time, and normal operation of the server is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of data processing, and in particular relates to an identification method and terminal equipment for abnormal service requests. Background technique [0002] Currently, the server of a large organization needs to process a large number of business requests in a short period of time, but due to malicious attacks or system abnormalities of the business requester, a large number of abnormal business requests appear in a short period of time, and these abnormal business requests may give the server’s Normal operation causes harm and wastes processing resources of the server. [0003] It is difficult for the existing security defense system to judge in real time whether there are many abnormal business requests in a very short period of time. It often requires engineering personnel to identify abnormal business requests through post-event analysis after a long interval. And lock the time period when a large numb...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/57
CPCG06F21/566G06F21/57
Inventor 唐振华
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products