Method and device for identifying abnormal behavior users

A user and behavior technology, applied in the computer field, can solve problems such as distribution outliers, and achieve the effect of avoiding abnormal operation

Active Publication Date: 2019-12-24
JINGDONG TECH HLDG CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing anomaly detection algorithms mainly construct continuous features. For normal users, the distribution is usually relatively concentrated on each feature dimension; however, for users with abnormal behavior, it may appear on a specific feature distribution outliers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying abnormal behavior users
  • Method and device for identifying abnormal behavior users
  • Method and device for identifying abnormal behavior users

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present disclosure will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0034] It should be noted that, in the case of no conflict, the embodiments in the present disclosure and the features in the embodiments can be combined with each other. The present disclosure will be described in detail below with reference to the accompanying drawings and embodiments.

[0035] figure 1 An exemplary system architecture 100 of an embodiment of a method for identifying users with abnormal behavior or an apparatus for identifying users with abnormal behavior according to embodiments of the present disclosure is shown.

[0036] Such as fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method and device for identifying an abnormal behavior user. A specific embodiment of the method comprises the steps of obtaining the operation informationof an operation executed on a target application by a user in a preset user set in a target time period; based on the obtained operation information, generating a frequent pattern tree, wherein a pathof the frequent pattern tree is used for indicating an operation sequence executed on the target application by the user in the preset user set in the target time period; and based on the frequent pattern tree, identifying the abnormal behavior users from the preset user set. According to the embodiment, by generating the frequent pattern tree, the abnormal behavior users in the user set are determined based on the operation sequence executed by the users, and the situations that the operation of the target application is abnormal, the abnormal behavior users earn the profits illegally and the like caused by the operations of the abnormal behavior users, are avoided.

Description

technical field [0001] The embodiments of the present disclosure relate to the field of computer technology, and in particular to a method and device for identifying users with abnormal behavior. Background technique [0002] Traditional anomaly detection for identifying users with abnormal behaviors usually detects intrusion behaviors based on abnormal behaviors (system behaviors or user behaviors) or use of abnormal computer resources, and then determines users with abnormal behaviors. The key is to establish the user's normal behavior profile (Profile), and judge whether it deviates from the normal profile by detecting the actual activity. [0003] Existing anomaly detection algorithms mainly construct continuous features. For normal users, the distribution is usually relatively concentrated on each feature dimension; however, for users with abnormal behavior, it may appear on a specific feature distribution outliers. [0004] The current anomaly detection algorithm mai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/34
CPCG06F11/3438
Inventor 黄婉棉程建波彭南博
Owner JINGDONG TECH HLDG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products