Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for abnormal flow monitoring

An abnormal flow, to-be-detected technology, applied in the field of communications, can solve problems such as low detection accuracy, and achieve the effect of improving detection accuracy and increasing relevance.

Active Publication Date: 2021-07-30
MIAOZHEN INFORMATION TECH CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The applicant found in the research that the current abnormal traffic detection method for push messages has the problem of low detection accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for abnormal flow monitoring
  • Method and device for abnormal flow monitoring
  • Method and device for abnormal flow monitoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] see figure 1 As shown, it is a flow chart of the abnormal traffic monitoring method provided in Embodiment 1 of the present application, and the method includes steps S101 to S104, wherein:

[0057] S101: Acquire total click logs and total exposure logs of push messages to be detected, and determine multiple target devices based on the total click logs and total exposure logs.

[0058] S102: For each target device, determine the target log of the target device from the total click log and the total exposure log; any target log is one of the click log or the exposure log.

[0059] S103: Determine at least one set of log groups from the target logs of the target device; each log group includes multiple target logs with associated relationships.

[0060] S104: If any target log of the target device is confirmed as an abnormal traffic log, based on the log group, other target logs associated with the any target log are also determined as abnormal traffic logs.

[0061] Th...

Embodiment 2

[0091] refer to image 3 As shown, it is a schematic diagram of an abnormal traffic monitoring device provided in Embodiment 2 of the present application, and the device includes: an acquisition module 31, a determination module 32, and a filtering module 33:

[0092] The obtaining module 31 is used to obtain the total click log and the total exposure log of the push message to be detected, and determine multiple target devices based on the total click log and the total exposure log;

[0093] The determining module 32 is configured to, for each target device, determine the target log of the target device from the total click log and the total exposure log; any of the target logs is one of the click log or the exposure log kind;

[0094] The determination module 32 is further configured to determine at least one group of log groups from the target log of the target device; each log group includes multiple target logs with associated relationships;

[0095] The determination m...

Embodiment 3

[0109] The embodiment of the present application also provides a computer device 400, such as Figure 4 As shown, it is a schematic structural diagram of the computer device 400 provided in the embodiment of the present application, including:

[0110] Processor 41, memory 42, and bus 43; Memory 42 is used for storing execution order, comprises memory 421 and external memory 422; Memory 421 here is also called internal memory, is used for temporarily storing the operation data in processor 41, and with The data exchanged by the external memory 422 such as hard disk, the processor 41 exchanges data with the external memory 422 through the memory 421, when the computer device 400 is running, the processor 41 communicates with the memory 42 through the bus 43, so that The processor 41 executes the following instructions in the user mode:

[0111] Obtain the total click log and the total exposure log of the push message to be detected, and determine multiple target devices based ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a method and device for abnormal traffic monitoring, wherein the method includes: it can obtain the total click log and the total exposure log of the push messages to be detected, and based on the total click log and the total exposure log, Determining multiple target devices; for each target device, from the total click log and the total exposure log, determine the target log of the target device; any of the target logs is one of the click log or the exposure log From the target log of the target device, determine at least one set of log groups; each log group includes multiple target logs with correlation; if any target log of the target device is confirmed as an abnormal traffic log, then based on the According to the above log group, other target logs associated with any target log are also determined as abnormal traffic logs. The abnormal flow monitoring method provided in the present application improves the accuracy of abnormal flow monitoring.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular, to a method and device for monitoring abnormal traffic. Background technique [0002] With the continuous development of network information technology, network push messages are flooding people's lives, and it has also attracted many publishers to release push messages in the network. However, some loopholes in the current Internet technology will bring a large amount of abnormal traffic. For example, after a message is pushed, some push platforms will charge the publisher based on the number of clicks or exposures of the push message; in order to make illegal profits, there may be a large number of abnormal clicks or exposure behaviors. [0003] The applicant found in the research that the current abnormal traffic detection method for push messages has the problem of low detection accuracy. Contents of the invention [0004] In view of this, the purpose o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/26
CPCH04L43/106H04L43/16H04L63/1425
Inventor 洪妍妍
Owner MIAOZHEN INFORMATION TECH CO LTD