Method and device for abnormal flow monitoring
An abnormal flow, to-be-detected technology, applied in the field of communications, can solve problems such as low detection accuracy, and achieve the effect of improving detection accuracy and increasing relevance.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] see figure 1 As shown, it is a flow chart of the abnormal traffic monitoring method provided in Embodiment 1 of the present application, and the method includes steps S101 to S104, wherein:
[0057] S101: Acquire total click logs and total exposure logs of push messages to be detected, and determine multiple target devices based on the total click logs and total exposure logs.
[0058] S102: For each target device, determine the target log of the target device from the total click log and the total exposure log; any target log is one of the click log or the exposure log.
[0059] S103: Determine at least one set of log groups from the target logs of the target device; each log group includes multiple target logs with associated relationships.
[0060] S104: If any target log of the target device is confirmed as an abnormal traffic log, based on the log group, other target logs associated with the any target log are also determined as abnormal traffic logs.
[0061] Th...
Embodiment 2
[0091] refer to image 3 As shown, it is a schematic diagram of an abnormal traffic monitoring device provided in Embodiment 2 of the present application, and the device includes: an acquisition module 31, a determination module 32, and a filtering module 33:
[0092] The obtaining module 31 is used to obtain the total click log and the total exposure log of the push message to be detected, and determine multiple target devices based on the total click log and the total exposure log;
[0093] The determining module 32 is configured to, for each target device, determine the target log of the target device from the total click log and the total exposure log; any of the target logs is one of the click log or the exposure log kind;
[0094] The determination module 32 is further configured to determine at least one group of log groups from the target log of the target device; each log group includes multiple target logs with associated relationships;
[0095] The determination m...
Embodiment 3
[0109] The embodiment of the present application also provides a computer device 400, such as Figure 4 As shown, it is a schematic structural diagram of the computer device 400 provided in the embodiment of the present application, including:
[0110] Processor 41, memory 42, and bus 43; Memory 42 is used for storing execution order, comprises memory 421 and external memory 422; Memory 421 here is also called internal memory, is used for temporarily storing the operation data in processor 41, and with The data exchanged by the external memory 422 such as hard disk, the processor 41 exchanges data with the external memory 422 through the memory 421, when the computer device 400 is running, the processor 41 communicates with the memory 42 through the bus 43, so that The processor 41 executes the following instructions in the user mode:
[0111] Obtain the total click log and the total exposure log of the push message to be detected, and determine multiple target devices based ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


