Unlock instant, AI-driven research and patent intelligence for your innovation.

User request detection method, device, computer equipment and storage medium

A technology of user requests and detection methods, applied in the network field, can solve problems such as difficult classification features, reduce the accuracy of detecting abnormal behaviors, poor models, etc., and achieve the effect of improving accuracy

Active Publication Date: 2022-05-13
PING AN TECH (SHENZHEN) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the data of the eye version are basically nominal attributes, only a small number of data are numerical. For the data of nominal attributes, it is difficult to mine effective classification features, resulting in poor models, which in turn reduces the accuracy of detecting abnormal behaviors.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User request detection method, device, computer equipment and storage medium
  • User request detection method, device, computer equipment and storage medium
  • User request detection method, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0061] Those skilled in the art can understand that the "terminal" and "terminal equipment" used here not only include wireless signal receiver equipment, which only has wireless signal receiver equipment without transmission capabilities, but also include receiving and transmitting hardware. A device having receiving and transmitting hardware capable of performing bi-directional communication over a bi-directional communication link. Such equipment may include: cellular or other communication equipment, which has a single-line display or a multi-line display or a cellular or other communication equipment without a multi-line display; PCS (Personal Communications Service, personal communication system), which can combine voice, data Processing, facsimile and / or data communication capabilities; PDA (Personal Digital Assistant, Personal Digital Assistant), which may include radio frequency receiver, pager, Internet / Intranet access, web browser, notepad, calendar and / or GPS (Globa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a user request detection method, device, computer equipment and storage medium, including the following steps: acquiring the equipment data of the terminal sending the user request; According to the type of the feature set, the feature set is input into the anomaly detection model to obtain the detection result of whether the user request is abnormal, wherein the anomaly detection model is pre- The positive sample or negative sample feature set is used to train to the convergence state, and the detection model is used to classify the security of the terminal through the feature set. In this method, a feature set is constructed for the text-type device data with nominal attributes, and an effective classification feature set can be mined to improve the accuracy of recognition.

Description

technical field [0001] The embodiments of the present invention relate to the field of network technology, in particular, a method, device, computer equipment, and storage medium for detecting user requests. Background technique [0002] With the development of Internet technology, the network plays an increasingly important role in people's work, life and study. In order to ensure the user's network security, it is necessary to detect whether there is any abnormality in the network user from time to time. Abnormal behavior refers to the behavior that affects the normal operation of the network. [0003] Usually, when a user requests to detect whether there is an anomaly, the result is usually inaccurate due to a poor detection model. For example, when sending a user registration request or a verification request, the server obtains the device data of the terminal as sample data, and uses the sample data to build a model. However, since the data of the eye version are bas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/60
Inventor 黎立桂
Owner PING AN TECH (SHENZHEN) CO LTD