A kind of illegal request identification method, device and electronic equipment

An identification method and illegal technology, applied in the computer field, can solve the problem of low identification accuracy of illegal requests

Active Publication Date: 2021-09-10
MICRO DREAM TECHTRONIC NETWORK TECH CHINACO
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides an illegal request identification method to solve the problem of low accuracy of illegal request identification in the prior art
[0006] The embodiment of the present application also provides an illegal request identification device to solve the problem of low accuracy of illegal request identification in the prior art
[0007] The embodiment of the present application also provides an electronic device to solve the problem of low identification accuracy of illegal requests in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of illegal request identification method, device and electronic equipment
  • A kind of illegal request identification method, device and electronic equipment
  • A kind of illegal request identification method, device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0069] Determine the target similarity that satisfies the third preset condition among the similarities among the illegal URLs; use the illegal URL corresponding to the target similarity as the target illegal URL. Since the target similarity is calculated from two illegal URLs, the illegal URLs corresponding to the target similarity are the two illegal URLs from which the target similarity is calculated.

[0070] The third preset condition includes at least one of the following:

[0071] The similarity is greater than the set similarity threshold, which can be set according to manual experience, for example, it can be 90%;

[0072] The order of the similarity in the similarity sorting is higher than the second preset order, and the similarity sorting is a sorting in descending order of the similarity.

[0073] The similarities between illegal URLs can be calculated in pairs to obtain multiple similarities, and then sort the obtained similarities. For example, if the second pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses a method for identifying illegal requests, which is used to solve the problem of low identification accuracy of illegal requests in the prior art. The method includes: after receiving a data access request, determining a target uniform resource locator URL of the request; determining the similarity between the target URL and a predetermined target illegal URL, and the target illegal URL is partially or completely illegal URL, where the illegal URL is a URL that an illegal user requests to access; if the similarity satisfies a first preset condition, it is determined that the data access request is an illegal request. The application also discloses an illegal request identification device, electronic equipment and a computer-readable storage medium.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to an illegal request identification method, device, electronic equipment and computer-readable storage medium. Background technique [0002] In computer technology, Internet sites can provide users with rich information, which greatly promotes the dissemination of information. However, for various reasons, some illegal users will use machines to simulate normal users to send webpage access requests to the website. The amount of such requests is often large and frequent, which will have a negative impact on the website server. Therefore, it is necessary to identify and block Illegal request. [0003] In the prior art, when identifying illegal requests, the number of visits of each Internet Protocol (Internet Protocol, IP) address in the past period of time will be counted. For an IP with too high number of visits, the user using the IP will be considered For illega...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 王嘉伟
Owner MICRO DREAM TECHTRONIC NETWORK TECH CHINACO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products