User request detection method and device, computer equipment and storage medium

A technology of user requests and detection methods, applied in the financial field, can solve problems such as reducing the accuracy of detecting abnormal behaviors, poor models, and difficult-to-classify features, so as to avoid one-sided problems, reduce inaccuracies, and improve accuracy.

Active Publication Date: 2019-06-25
PING AN TECH (SHENZHEN) CO LTD
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the data of the eye version are basically nominal attributes, only a small number of data are numerical. For the data of nominal attributes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User request detection method and device, computer equipment and storage medium
  • User request detection method and device, computer equipment and storage medium
  • User request detection method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0070] Example

[0071] Those skilled in the art can understand that the "terminal" and "terminal equipment" used here not only include wireless signal receiver equipment, which only has wireless signal receiver equipment without transmission capabilities, but also include receiving and transmitting hardware. A device having receiving and transmitting hardware capable of performing bi-directional communication over a bi-directional communication link. Such equipment may include: cellular or other communication equipment, which has a single-line display or a multi-line display or a cellular or other communication equipment without a multi-line display; PCS (Personal Communications Service, personal communication system), which can combine voice, data Processing, facsimile and / or data communication capabilities; PDA (Personal Digital Assistant, Personal Digital Assistant), which may include radio frequency receiver, pager, Internet / Intranet access, web browser, notepad, calendar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a user request detection method and device, computer equipment and a storage medium. The method comprises the following steps: obtaining equipment data of a terminal sending a user request; constructing a feature set by adopting a preset score feature pair combined features extracted from the equipment data; inputting the feature set into a plurality of anomaly detection models according to the type of the feature set, obtaining a detection result for judging whether the user request is abnormal or not; and judging the detection result by adopting a preset judgment method so as to determine whether the user request is abnormal or not, and training the abnormal detection model to a convergence state by adopting a positive sample or negative sample feature set in advance, thereby carrying out security classification on the terminal through the feature set. According to the method, a feature set is constructed for text type equipment data with nominal attributes, an effective classification feature set can be mined, and the recognition accuracy is improved.

Description

technical field [0001] The embodiments of the present invention relate to the financial field, in particular, a method, device, computer equipment, and storage medium for detecting user requests. Background technique [0002] With the development of Internet technology, the network plays an increasingly important role in people's work, life and study. In order to ensure the user's network security, it is necessary to detect whether there is any abnormality in the network user from time to time. Abnormal behavior refers to the behavior that affects the normal operation of the network. [0003] Usually, when detecting whether there is an anomaly in a user, the result is usually inaccurate due to a poor detection model. For example, when sending a user registration request or a verification request, the server obtains the device data of the terminal as sample data, and uses the sample data to build a model. However, since the data of the eye version are basically nominal att...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L9/40
Inventor 黎立桂
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products