Processing method, device for network request, electronic device and storage medium

A network request and processing method technology, applied in the field of Internet security, can solve problems such as error-prone, missed or false positive, easy to bypass abnormal login/registration behaviors, etc.

Active Publication Date: 2019-03-22
BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD +1
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In short, the existing solutions can be divided into two categories: one type of security policy is relatively simple, so the defense effect is not good, and it is easy to bypass abnormal login / registration behavior; The front and back ends of the platform set complex logic to collect a large amount of data, and sometimes this logic adjustment becomes a burden on the main business (login / registration behavior, etc.)
Moreover, in the above-mentioned solutions, on the one hand, a large amount of manual burying work needs to be carried out according to the actual needs of the network platform, which is not only a heavy workload but also prone to errors. The false positive rate or false negative rate of behaviors increases; on the other hand, manual tracking can only collect operation information after the tracking time, and cannot count the operation information before the tracking time, so it is easy to detect some abnormal login / registration behaviors. False report
[0004] In short, the existing manual burying technology is used to block or alarm the abnormal login / registration behavior of the network platform, which is prone to false negatives or false positives.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Processing method, device for network request, electronic device and storage medium
  • Processing method, device for network request, electronic device and storage medium
  • Processing method, device for network request, electronic device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0097] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0098] In order to improve the effect of blocking or alarming the abnormal login / registration behavior of the network platform, and reduce the false negative rate or false positive rate of the abnormal login / registration behavior of the network platform, the embodiment of the present invention provides a network request processing method , devices, electronic equipment and storage media.

[0099] The present invention will be described in detail below through ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a processing method, a device for network requests, an electronic device and a storage medium. The method comprises the following steps: obtaining IP attributeinformation corresponding to network requests; scoring the network requests for the first time according to a preset first scoring rule and the IP attribute information; determining whether the firstscoring score is lower than a preset first scoring threshold; if yes, blocking the network requests; if no, obtaining IP behavior information corresponding to the network requests; scoring the network requests for the second time according to a preset second scoring rule and the IP behavior information; determining whether the second scoring score is lower than a preset second score threshold; ifyes, sending an alert to the network requests. The embodiment of the invention blocks or alerts the network requests according to the IP attribute information and the IP behavior information corresponding to the network requests, thereby improving the blocking or alarming effect on the abnormal login / registration behavior of the network platform.

Description

technical field [0001] The invention relates to the technical field of Internet security, in particular to a network request processing method, device, electronic equipment and storage medium. Background technique [0002] With the development of Internet technology, in order to enable users to better experience network products and services and better manage various information of users, some network platforms generally set up functions that allow users to register or log in. For example, many online shopping platforms In order to facilitate online shopping for users, the function of registering or logging in is enabled for users, which not only facilitates users to manage their shopping information, but also enables the online shopping platform to provide better services for users. However, the user login or registration information of the network platform is also vulnerable to attacks by network hackers. On the one hand, network hackers steal information such as user logi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0815H04L63/0861H04L63/1425H04L67/60H04L65/40
Inventor 彭正茂王生新孟伟
Owner BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products